SHARE
Facebook X Pinterest WhatsApp

Infostealers Fuel 2.1B Credentials and 23M Host Infections

Cybercrime surged with a 33% spike in credential theft and 200 million credentials stolen in early 2025, signaling a daunting threat landscape for organizations.

Written By
thumbnail Sunny Yadav
Sunny Yadav
Mar 20, 2025
eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

Cybercriminal activity is reaching unprecedented levels, with 2024 witnessing a dramatic surge in malware-fueled attacks that have left organizations scrambling to safeguard their data.

A recent report from Flashpoint paints a stark picture of a threat landscape defined by infostealers, credential theft, and escalating vulnerabilities, urging organizations to strengthen their defenses against these relentless adversaries.

Infostealers: A rising cyberthreat

Infostealers have emerged as a preferred tool for cybercriminals due to their low cost and ease of deployment. Last year, they infected 23 million hosts, with one strain — Redline — responsible for 43% of these infections by compromising nearly 9.9 million devices.

This surge enabled the theft of 2.1 billion credentials, accounting for roughly 75% of the total 3.2 billion credentials stolen in 2024. The Flashpoint 2025 Global Threat Intelligence Report further highlights that these simple yet effective tools have become primary vectors for account takeovers and subsequent ransomware deployments, emphasizing that the threat is widespread and rapidly evolving.

Credential theft and malware tactics

The report underscores a staggering 33% year-over-year increase in compromised credentials, illustrating how cybercriminals are refining their tactics. With more than 200 million credentials already stolen in the first two months of 2025, attackers are leveraging the harvested data to infiltrate corporate networks, bypass security controls, and expand their reach. 

The ease of access to these tools on underground marketplaces — averaging around $200 per month — allows even low-skilled threat actors to launch large-scale campaigns with devastating results.

Exploiting vulnerabilities and ransomware trends

In addition to infostealers, the threat landscape has been compounded by a significant rise in exploitable vulnerabilities. Flashpoint’s report notes that over 37,000 vulnerabilities were identified in 2024, with more than 39% accompanied by public exploit code.

This environment of weakened defenses is fueling a 10% increase in ransomware attacks and a 6% rise in data breaches across all sectors. Such trends signal that attackers are diversifying their techniques and targeting the most vulnerable points in an organization’s digital infrastructure.

What this means for organizations

For organizations, these alarming trends are a call to action. The convergence of infostealer-driven credential theft, widespread vulnerability exploitation, and increased ransomware incidents demands a proactive and comprehensive security strategy.

Companies must invest in advanced threat intelligence, continuous vulnerability assessment, and robust incident response frameworks to protect critical assets. By staying informed and vigilant, organizations can mitigate risks and ensure resilience in an era defined by sophisticated cyberthreats.

Explore some top vulnerability management tools to discover security flaws in your network and cloud environments so you can make fixes before hackers can exploit them.

thumbnail Sunny Yadav

Sunny is a content writer for eSecurity Planet (eSP) with a bachelor’s degree in technology and experience writing for leading cybersecurity brands like Panda Security, Upwind, and Vanta. At eSP, he covers the latest news on cyberattacks, cryptography, data protection, and emerging threats and vulnerabilities. He also explores security policies, governance, and endpoint and mobile security. Sunny enjoys hands-on testing, rigorously evaluating tools to assess their capabilities and real-world performance. He also has extensive experience working with AI tools like ChatGPT and Gemini, experimenting with their applications in cybersecurity, content creation, and research.

Recommended for you...

Cybersecurity Starts With You: Lessons From Phishing, Ransomware, and Real-World Mistakes
Matt Gonzales
Sep 30, 2025
Wireless Network Security: WEP, WPA, WPA2 & WPA3 Explained
Maine Basan
Sep 15, 2025
From LinkedIn to Lies: What a Job Scam Looks Like Now
Aminu Abdullahi
May 21, 2025
Fake AI Video Tools Spreading New “Noodlophile” Malware, Targets Thousands on Facebook
Aminu Abdullahi
May 12, 2025
eSecurity Planet Logo

eSecurity Planet is a leading resource for IT professionals at large enterprises who are actively researching cybersecurity vendors and latest trends. eSecurity Planet focuses on providing instruction for how to approach common security challenges, as well as informational deep-dives about advanced cybersecurity topics.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.