SHARE
Facebook X Pinterest WhatsApp

Record-Breaking Data Theft: 3.9 Billion Passwords Compromised by Infostealer Malware

Hackers leaked 3.9 billion stolen passwords, exposing data from 4.3 million infected devices — a stark reminder to strengthen cybersecurity.

Written By
thumbnail Liz Ticong
Liz Ticong
Feb 27, 2025
eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

A new report from cyber firm KELA exposes a massive surge in infostealer malware, which has compromised 3.9 billion credentials from millions of infected devices. Researchers warn that stolen login data is fueling cybercrime, putting both individuals and businesses at risk.

Cybercriminals actively trade these stolen credentials on dark web forums, giving threat actors easy access to personal accounts, corporate systems, and financial platforms. KELA’s findings indicate that a staggering 330 million credentials have been stolen as infostealer infections hit 4.3 million devices in 2024.

As stolen login data circulates among hackers, the risk of account takeovers, identity theft, and large-scale security breaches continues to grow.

What is infostealer malware?

Infostealer malware is a silent but devastating cyber threat that infiltrates devices and extracts sensitive data, often without victims realizing it.

These programs target login credentials, financial information, browser cookies, and autofill data across devices. Unlike traditional cyberattacks that rely on brute force or phishing, infostealers quietly harvest and export data in bulk. This allows cybercriminals to evade security measures and gain direct access to accounts.

According to KELA’s report, the top three infostealers strains — Lumma, StealC, and RedLine — were responsible for over 75% of infected machines. These malware variants spread through malicious downloads and phishing links, covertly embedding into devices.

Businesses at risk as employee credentials go up for sale

Cybercriminals are monetizing stolen credentials at an unprecedented scale, putting firms in the crosshairs.

Once installed, infostealer malware steals vast amounts of sensitive data, which is then sold or exploited on underground markets. KELA’s report tracked 5,230 victims whose compromised corporate logins have been leaked, fueling a growing economy of breached accounts.

These stolen credentials are increasingly used in extortion campaigns, where attackers demand payment to prevent data leaks or disrupt business operations. Cybercriminals use employee logins to penetrate networks, steal proprietary information, and even launch ransomware attacks.

3 ways to protect your company from infostealer attacks

Businesses are already paying the price for leaked credentials, whether through financial fraud, data breaches, or unauthorized access to critical systems. Cybercriminals are turning stolen logins into a commodity, giving attackers direct access to enterprise systems and sensitive data.

The longer companies go without addressing infostealer risks, the greater the chance of a costly security breach.

You must take immediate action to protect your business:

Relying on passwords alone is no longer enough — real-time monitoring and proactive defense are imperative. The cost of inaction is far greater than the investment in cybersecurity.

Recommended for you...

Best AI Deepfake and Scam Detection Tools for Security
Matt Gonzales
Jul 16, 2025
Best Secure Tools for Protecting Remote Teams in 2025
Kezia Jungco
Jun 30, 2025
Protect Your Privacy: Best Secure Messaging Apps in 2025
Liz Ticong
Jun 25, 2025
NVIDIA: Agentic AI Is Reshaping Cybersecurity Defense
Aminu Abdullahi
Apr 30, 2025
eSecurity Planet Logo

eSecurity Planet is a leading resource for IT professionals at large enterprises who are actively researching cybersecurity vendors and latest trends. eSecurity Planet focuses on providing instruction for how to approach common security challenges, as well as informational deep-dives about advanced cybersecurity topics.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.