In 2024, cybersecurity researchers observed a staggering surge in stolen login data being traded on the dark web. Over 1.7 billion credentials were harvested not from old breaches but through active infections on users’ devices. At the heart of this epidemic is a class of malware called infostealers, which are programs designed specifically to extract sensitive information like usernames, passwords, browser cookies, email logins, crypto wallets, and session tokens. Unlike large-scale data breaches that target centralized databases, infostealers operate on individual machines. They don’t break into a company’s servers; they compromise the end user, often without the victim ever noticing.
The Rise of Infostealers
Infostealers are typically distributed through phishing emails, malicious browser extensions, fake software installers, or cracked applications. Once installed on a device, they scan browser databases, autofill records, saved passwords, and local files for any credential-related data. Many also look for digital wallets, FTP credentials, and cloud service logins. Crucially, many infostealers also exfiltrate session tokens and authentication cookies, meaning that even users who rely on multifactor authentication are not entirely safe. With a stolen session token, an attacker can bypass multifactor authentication entirely and assume control of the session without ever needing to log in manually.
How to Protect Yourself
With infostealer malware becoming a growing threat, protecting your data requires a mix of smart security habits and reliable tools. Here are five effective ways to keep your information safe:
- Use a Password Manager: Many infostealers target saved passwords in web browsers. Instead of relying on your browser to store credentials, use a dedicated password manager. Our No. 1 pick has a built-in Data Breach Scanner that lets you check if your information has been exposed in known breaches.
- Enable Multifactor Authentication (MFA): While not foolproof against infostealers, MFA adds an extra layer of security, making unauthorized access more difficult.
- Be Cautious with Downloads: Avoid downloading software or browser extensions from unverified sources. Stick to official app stores and trusted websites.
- Stay Informed: Regularly check if your credentials have been compromised and stay updated on the latest cybersecurity threats.
- Use Antivirus and Anti-Malware Tools: Employ reputable security software to detect and prevent malware infections.
Final Thoughts
The 1.7 billion passwords leaked in 2024 are not a relic of past breaches. They’re evidence of an evolving, industrialized cybercrime economy built on the backs of unsuspecting users and quietly infected devices. The tools are cheap, the scale is massive, and the impact is personal. If you’ve ever saved a password in a browser, downloaded an unofficial app, or clicked a link in a sketchy email, your credentials may already be in circulation.
GIPHY App Key not set. Please check settings