Malware
Info Stealer
Also known as: Stealer, Information stealer
Definition
Malware that harvests credentials, cookies, tokens, crypto wallets, and other sensitive data from an infected device and exfiltrates it to the attacker.
Examples
- RedLine Stealer harvesting browser logins and crypto wallets.
- Vidar or Raccoon Stealer logs sold on underground marketplaces.
Related terms
Credential Stealer
Malware focused specifically on extracting passwords, hashes, and authentication tokens from an infected system or its memory.
Keylogger
Software or hardware that records the keystrokes a user types, used to steal passwords, financial data, or messages.
Spyware
Malware that secretly collects information about a user, device, or organization and sends it to an external party.
Banking Trojan
Malware designed to steal online-banking credentials and authorize fraudulent transactions, typically through web injects, form grabbing, or overlays.
Session Hijacking
An attack that takes over a victim's authenticated session by stealing or forging the session identifier so the attacker can act as the user without their credentials.
Credential Stuffing
An automated attack that replays large lists of username/password pairs leaked from one service against other services, exploiting password reuse to take over accounts.