1.7 billion passwords filtered on the dark website and why theirs is at risk
Cybercriminals not only pursue great objectives.
They go after everyone, and they are doing it with infottealer malware. These small cunning programs are stealing passwords in silence, browser data and tokens login from everyday devices.
A new report shows how out of control the problem has become, with the activity of Infontes de Infovealer jumping 500% in just one year, reaping more than 1.7 billion fresh credentials.
Usa to the “Cyberguy Free Report: Obtain my expert technology advice, critical security alerts and exclusive offers, in addition to instant access to my Survival guide for the free final scam “ When you register!

A hacker at work (Kurt “Cyberguy” Knutsson)
The industrialization of credentials
In 2024, cybersecurity researchers in Fortinet observed an amazing increase in the stolen login data that are exchanged in the dark network. More than 1.7 billion credentials not of old violations were harvested but through active infections in user devices.
In the heart of this epidemic there is a class of malware called Infotealers, which are specifically designed programs to extract confidential information such as user names, passwords, browser cookies, email session, email session, cryptographic wallets and session tokens. Unlike large -scale data violations that are directed to centralized databases, infants of infants operate in individual machines. They do not enter the servers of a company; They compromise the end user, often without the victim not noticing.
These records are added and sold by initial access runners, intermediaries that sell compromised credentials and access tokens to other cybercriminal groups, including ransomware operators. The market has matured to the point where access to a corporate VPN, an administration board or even a personal bank account can be purchased at a scale, with verified functionality and specific prices in the region.
Fortinet’s 2025 global threats panorama report Identified a 500% increase in credential records of infections for infants infections during the past year. Among the most widespread and dangerous infans identified in the report are Redline, Vidar and Raccoon.

A hacker at work (Kurt “Cyberguy” Knutsson)
200 million social media records filtered in data violation x Major X
How infoster work
Infantes infants are generally distributed through phishing emails, malicious browser extensions, fake software installers or cracked applications. Once installed on a device, the browser databases, automatic approach records, saved passwords and local files scan for any data related to credentials. Many also look for digital wallets, FTP credentials and cloud service loggers.
Crucially, many infants of infants also exfiltrate session tokens and authentication cookies, which means that even users who trust multifactorial authentication are not entirely insurance. With a stolen token, an attacker can avoid multifactorial authentication completely and assume control of the session without logging manually.
Once collected, the data is charged to a command and a control server. From there, it is used directly by attackers or included in records and is sold in forums. These records may include everything from the victim’s IP address and geolocation to the fingerprint of your browser and the complete list of credentials, giving attackers everything they need to carry out greater exploitation or impersonation.
What is artificial intelligence (AI)?

A man who works on his personal and work laptops (Kurt “Cyberguy” Knutsson)
The human resources firm confirms the 4m records set out in the main trick
5 ways to stay safe from infant malware
Since infoteale malware becomes a growing threat, protecting your data requires a combination of smart security habits and reliable tools. Here are five effective ways to maintain your safe information.
1. Use a password administrator: Many infants of infants go to passwords saved in web browsers. Instead of trusting your browser to store credentials, use a dedicated password administrator. Our selection No. 1 has an incorporated Data violation scanner That allows you to verify if your information has been exposed in known violations. Get more details about me The best password administrators reviewed by experts from 2025 here.
2. Enable two factors authentication (2FA): Even if their credentials are stolen, 2fa Add an additional safety layer to require a second form of verification, such as a code of an authentication application or biometric confirmation. Cybercriminals are based on user names and stolen passwords to divide in accounts, but with 2FA enabled, they cannot obtain access without the additional security step. Be sure to enable 2FA in important accounts such as email, banking and session related to work.
3. Use strong antivirus software and be careful with downloads and links: Infotealer malware often extends through malicious downloads, pHishing emails and false websites. Avoid unloading software or files from non -reliable sources and always verify the links before clicking on them. The attackers disguise malware such as legitimate software, games of games or cracked applications, so it is better to meet the official websites and application stores for downloads.
The best way to safeguard the malicious links that install malware, which potentially access their private information, is to have strong antivirus software installed on all its devices. This protection can also alert it to the PHISHING Electronic Correos and Ransomware scams, maintaining their personal information and their safe digital assets. Get my elections from the best antivirus protection winners 2025 for your Windows, Mac, Android and iOS devices.
Get the News business on the fly by clicking here
4. Keep updated software: Cybercriminals exploit obsolete software to deliver malware. Maintaining your operating system, browsers and updated safety software Ensures that known vulnerabilities are paveled. Enable automatic updates whenever possible and install an antivirus of good reputation or final point protection software that can detect and block the threats of infants infants before compromising your system.
5. Consider a personal data disposal service: These services can help eliminate their personal information from Data Broker sites, reducing their risk of identity theft, spam and specific scams. While no service can guarantee the complete elimination of your Internet data, a data removal service is really an intelligent option. They are not cheap, and it is not your privacy either.
These services do all the work by you by actively monitoring and systematically erasing your personal information from hundreds of websites. It is what gives me peace of mind and has proven to be the most effective way to erase your personal internet data. By limiting the available information, it reduces the risk of cross -references data of infractions with information they can find in the dark network, which makes it difficult to be pointed out. See my best selections to obtain data removal services here.
How to fight against debit card pirates looking for their money
Kurt key takeway
The 1.7 billion passwords filtered in 2024 are not a relic of past violations. They are evidence of an economy of evolution industrialized cyber crimes built in the back of unsuspecting users and silently infected devices. The tools are cheap, the scale is massive and the impact is personal. If you have ever saved a password in a browser, you downloaded an unofficial application or click on a link in an incomplete email, your credentials may already be in circulation.
Click here to get the News application
Who believes that it should be the main responsible for protecting personal and organizational data from cyber threats: individual users, companies, software suppliers or government agencies? Because? Get us knowing in Cyberguy.com/contact.
To obtain more technological tips and safety alerts, subscribe to my free Cyberguy Report newsletter when you head Cyberguy.com/newsletter.
Ask Kurt or tell us what stories you would like us to cover.
Follow Kurt in his social channels:
- YouTube
Answers to the most informed Cyberguys questions:
- What is the best way to protect your MAC devices, Windows, iPhone and Android to be pirate?
- What is the best way to stay private, safe and anonymous while navigating the web?
- How can I get rid of robocalls with data elimination applications and services?
- How do I eliminate my private internet data?
New Kurt:
- Try the new Cyberguy games (crosswords, words searches, trivia and more!)
- Cyberguy exclusive coupons and offers
- The best gifts for mom 2025
Copyright 2025 Cyberguy.com. All rights reserved.
Kurt “Cyberguy” Knutsson is a award -winning technological journalist who has a deep love for technology, equipment and devices that improve life with their contributions for News & News Business Startzing Mornings in “News & Friends”. Do you have a technological question? Get the free Kurt’s free newsletter, share your voice, an idea of the story or comment on Cyberguy.com.


