The 2025 Infostealer Ecosystem

If you think ransomware was the dominant cyber threat of 2025, we are here to tell you that you should re-consider :)

The 2025 Infostealer Ecosystem

If you think ransomware was the dominant cyber threat of 2025, we are here to tell you that you should re-consider :)

Infostealers don’t lock your data or demand ransom. They quietly siphon your credentials, browser history, crypto wallets, session tokens, and sometimes even keys to your digital life all without alerting you.

What’s more, in 2025 they’ve evolved from blunt credential grabbers into sophisticated tools that rival even advanced ransomware in economic and operational impact.

Let’s unpack what’s driving this surge and how the infostealer ecosystem really works.

From Credential Theft to High-Velocity Data Harvesting

The category has existed for years, primarily focused on gathering login credentials and personal information.

But the 2025 landscape is different:

These tools now routinely extract high-value artifacts like 2FA tokens, session cookies, password vaults, and wallet secrets.

Some leverage sandbox evasion, hardware fingerprinting, and AppBound bypass techniques to slip past endpoint defenses unnoticed.

Distributed through malvertising, phishing, trojanized installers, and even poisoned AI search results, they exploit modern workflows — not just naive users.

Malware-as-a-Service Fuels the Infostealer Economy

One big factor behind the rise of infostealers is the malware-as-a-service (MaaS) model.

Instead of needing deep technical skills, would-be attackers rent plug-and-play malware kits with dashboards, support, and turnkey distribution options. This has two consequences:

Barriers to entry for cybercriminals are dramatically lower.

The volume of stolen data traded on underground markets has skyrocketed with millions of compromised credentials available at tiny prices.

Infostealers are no longer niche tools; they are commercial cybercrime products with recurring revenue streams.

The Cloud SOC Analyst Manual (AWS-GCP-AZURE)
The Cloud SOC Field Guide: Multi-Cloud Forensics & Threat Hunting is a tactical, boots-on-the-ground manual…

The Big Five Leading the Charge in 2025

The infostealer ecosystem in 2025 is dominated by several prolific families, each with its own tactics, strengths, and implications:

Lumma Stealer

Once known as LummaC2, this malware is one of the most active players. It hides in plain sight using deceptive CAPTCHA pages and malvertising funnels. It also targets crypto wallets and 2FA extensions with high success.

Vidar 2.0

Now rewritten in efficient native code, Vidar extracts data in parallel, bypasses modern browser encryption, and frequently shows up bundled with other malware. Its polymorphic builds make detection harder.

RisePro

Often delivered by notorious loaders, RisePro blends into legitimate traffic and uses custom protocols to evade network inspection. When it appears, it usually signals a fully compromised environment.

Meduza

This lightweight, dependency-free stealer runs directly at the OS level and targets a very wide range of applications including minor browsers and credential stores. Its stealthy footprint makes it a nightmare for incident responders.

Atomic Stealer / AMOS

Once limited to Windows, variants of this malware now target macOS with click-based social engineering and even poisoned AI suggestions. These variants don’t just steal, they open backdoors for persistent access.

Cloud SOC Analyst Cheat Sheet | Log Analysis
This cheat sheet serves as a high-speed, tactical reference guide designed for threat detection, incident response…

Infostealers Are Harder to Spot

Historically, infostealers entered systems through obvious phishing emails or cracked software. We highlight below the most popular distribution tactics:

Malvertising : ads that drop malware behind the scenes.

AI poisoning : tricking search engines and LLMs (like ChatGPT/Grok) into recommending malicious fixes.

Legitimate platform abuse: hiding malware within trusted services (like GitHub releases).

Vidar Analysis with ANY.RUN

We know that practical demonstration of theory is crucial so lets analyse one of the sample above in a VM environment.

The sample masquerades as a legitimate GitHub release (latest-x86.rar) but executes a Vidar information-stealing payload once unpacked and run. This is a credential-theft focused infection with C2 exfiltration over Telegram-related infrastructure and dead-drop resolution.

Detonation Link:

ANY.RUN
Interactive malware hunting service. Live testing of most type of threats in any environments. No installation and no…

Initial Delivery & Masquerading

  • Payload hosted on GitHub Releases, abusing trust in legitimate platforms.
  • Filename implies HyperX / gaming software, a common lure.

This is a red flag because GitHub is often allow-listed in corporate environments where users are less suspicious of .rar installers from GitHub. SOC teams should not treat GitHub as inherently benign.

Process Analysis

Our main loader is:

  • Millennium.pif (PID 8920)

Key behaviors:

  • Executes as a disguised .pif file (legacy extension abuse).
  • Reads CPU info, Machine GUID, and product identifiers → classic fingerprinting.
  • Checks proxy configuration → network evasion & routing awareness.
  • Creates files in its execution directory → staging for payload/config.

These actions are textbook pre-exfil reconnaissance for stealers.

Persistence & Privilege Signals

Indicators raised by ANY.RUN:

  • Process added to startup
  • Integrity level elevation attempt
  • Malware configuration loaded into memory

Vidar variants commonly establish light persistence to survive reboots long enough to exfiltrate. Integrity elevation attempts suggest either:

  • UAC bypass attempts
  • Or elevated context to access browser credential stores

Network Behaviour Analysis

Telegram-based infrastructure

  • TLS SNI references to t.me
  • Known Vidar behavior: exfiltration via Telegram bots

Dead Drop Resolver (DDR)

  • Uses Steam community pages to retrieve dynamic C2 addresses.
  • This allows attackers to rotate infrastructure without changing binaries.

Generic stealer domain chains

  • Tagged as tgsteam — hybrid Telegram + Steam abuse

DDR makes static IOC blocking ineffective and Telegram traffic often blends into legitimate encrypted TLS traffic. This indicates active operator maintenance, not commodity malware left unattended.

Vidar IOCs

Hashes :

  • MD5: 8AC6AD0E64E00D87030B107A50EEE678
  • SHA1: 0E87207624F1DB7360485F6A84EA16D82F9D3DD9
  • SHA256: 50FB89C465B197416ED034E6F2C302C5B4B4A4475AF7939AA25B2CA4391324AD

Detection signals:

  • Detected by AV engines
  • Suspicious PE structure
  • Stealer-like behavioral heuristics
  • Known malware configuration present

References:

ANY.RUN
Interactive malware hunting service. Live testing of most type of threats in any environments. No installation and no…

Video Walkthrough