EHA
Home Cyber Security News Cybercriminals Use $10 Infostealer Malware to Breach US Security Systems

Cybercriminals Use $10 Infostealer Malware to Breach US Security Systems

0

A recent cybersecurity report has revealed a critical vulnerability in the U.S. defense and government sectors.

For as little as $10 per compromised device, cybercriminals are leveraging infostealer malware to infiltrate some of the most secure systems in the country.

The malware has exposed sensitive credentials from employees at defense contractors such as Lockheed Martin, Boeing, and Honeywell, as well as personnel from the U.S. Army, Navy, FBI, and Government Accountability Office (GAO).

The malware works by silently exfiltrating data from infected devices, including login credentials, session cookies, browsing history, and internal documents.

This breach raises concerns about the nation’s ability to defend against more sophisticated cyberattacks.

Infostealers: A Low-Cost Threat with High Stakes

Infostealer malware operates by exploiting human error users unknowingly download malicious software through infected files such as pirated software or fake PDFs.

Once installed, the malware collects sensitive data stored on the device. This data is then sold on underground marketplaces for prices as low as $10 per infected device.

According to Hudson Rock’s findings, over 30 million computers have been infected globally by infostealers, with one in five containing corporate credentials.

Infected devices grant hackers access to:

  • VPN credentials for military and contractor networks
  • Multi-factor authentication (MFA) session cookies
  • Email logins for government agencies
  • Internal tools like GitHub, Jira, and Confluence

For example, credentials linked to “army.mil” domains have been found on these marketplaces, allowing attackers to bypass security measures like MFA and gain unauthorized access to classified systems.

Case Studies Highlight Systemic Vulnerabilities

The impact of these breaches is far-reaching. At Honeywell alone, 398 employees were infected by infostealers over several years.

This led to the exposure of 56 corporate credentials for internal systems and 472 third-party integrations with platforms like Microsoft and Cisco.

Similarly, compromised Navy personnel had authentication data for critical systems like Citrix and Confluence stolen, potentially enabling adversaries to move laterally within military networks.

These breaches not only threaten the organizations directly affected but also compromise their supply chains and partners.

Even companies with robust cybersecurity practices remain vulnerable due to their connections with infected vendors or contractors.

The scale of these infections underscores a troubling reality: if infostealers can penetrate organizations like Lockheed Martin or the FBI, no entity is immune.

The leaked credentials pose risks of supply chain attacks, insider threats, and broader national security vulnerabilities.

To mitigate such risks, organizations must implement proactive cybersecurity measures, including employee education on phishing tactics and stricter controls on downloading unverified software.

However, experts warn that without systemic changes in how sensitive data is managed across industries, these breaches may only be the beginning of larger cybersecurity disasters.

Also Read:

NO COMMENTS

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Exit mobile version