What do infostealers do, and how do they work?
Infostealers are a type of malware created to infect computer systems to steal locally stored data such as saved usernames and passwords, browser autofill entries, financial information, and other personally identifiable information (PII).
A common tactic is to lure a victim into running a booby-trapped file or installer. Attackers typically do this through phishing, malvertising, or “click-to-fix” style social engineering. Once the malware runs, it harvests data from common storage points (such as web browsers, email clients, and password managers), then packages the stolen information into a log file, and sends it to an attacker-controlled infrastructure server. Many operations use a back-end panel that receives these logs, organizes them, and makes them easy to search.
After data exfiltration, infostealer operators sell the logs for profit, trade them in private communities, or pass them to their criminal peers who then use the stolen data for follow-up attacks such as account takeover and fraud.
How infostealers get on a device
Infostealers typically infect a device when a user is tricked into running a malicious file themselves. Attackers use social engineering and distribution channels that make malware look legitimate, useful, or urgent. The most common infection paths include:
Cracked software, cheats, mods, and “free” tools
Infostealers can be distributed through cracked software, game cheats or mods, and unofficial installers, where malware piggybacks on legitimate programs. These files are shared on torrent sites, file-hosting platforms, forums, and in video descriptions, where users tend to disable warnings or ignore security prompts. Once executed, the laced malware runs alongside the advertised software and harvests stored data.
Fake download pages, malvertising, and sponsored search traps
Infostealers are also spread through fraudulent ads, sponsored search results, and fake download pages that mirror real software sites. These pages surface when people search for popular tools, updates, or patches and are polished just enough to pass a quick visual check. But one careless click on a fake download button can swap the legitimate software for an infostealer payload.
Malicious browser extensions
Infostealers can also be delivered through malicious browser extensions that pose as legitimate tools, such as ad blockers, productivity add-ons, or price trackers. When added to a browser, these extensions operate inside its trusted environment, with direct access to stored passwords, cookies, and active sessions. Because of that camouflage, a malicious extension can stay in place long after it has already taken the data it came for.
Links and files shared through chat apps and cloud storage
Infostealers can also get on a device through links and files shared in chat platforms such as group chats, servers, and direct messages, as well as through cloud storage links posted on forums or social media. Attackers share “free tools,” “premium content,” or “fixes,” then use built-in file hosting or shared folders to deliver infected archives and installers. When a victim opens the file, the infostealer executes and begins harvesting locally stored data.
Loader networks and pay-per-install campaigns
Sometimes infostealers are pushed to devices by loader malware, which is a small program already running on a device that exists solely to download and launch other malicious files. Loaders are typically installed the same way infostealers do (booby-trapped downloads, phishing attachments, or laced links), but they just stay on the devices so attackers can deploy new payloads later. Criminal operators pay these loader networks to push infostealers to infected computers by country or volume. This model removes the need to trick the same user twice and turns malware delivery into an automated service.
Victim profiles infostealers hit most
The users affected most by infostealers are usually the ones whose devices contain a dense mix of saved passwords, synced logins, and open tabs with active sessions. Across a large number of cases, the same types of users keep showing up, shaped by what they do online and which tools they use. The profiles below sketch out common victim types and show how seemingly normal behavior can add up to a tempting target.
The “always-logged-in” profile
The “always-logged-in” profile describes mostly Windows users who stay signed in to their accounts and spend a lot of time on social networks (like Facebook, Instagram, and X), paid media and streaming platforms, online shopping sites, and personal finance services. These users tend to save passwords and keep sessions active because they use their accounts daily and rarely log out. And from an attacker’s perspective, that’s low-hanging fruit.
The “gamer” profile
The “gamer” profile includes users who spend time in large gaming ecosystems and regularly install game launchers, mods, cheats, and third-party add-ons to customize or unlock gameplay. This group runs more third-party files than most users, which increases the odds of executing a booby-trapped download and creating an easy entry point for attackers. Infostealers infect devices of targeted “gamers” through cracked games, unofficial mods, or “free” performance tools laced with malware. Gaming accounts usually store payment details and digital purchases, and their browser sessions usually stay active, which helps explain why infostealer operators favor this group.
The “IT pro” profile
Ironic as it may sound, the “IT pro” profile is a prime target for bad actors. Infostealers hit IT professionals hard because their endpoints (mostly PCs used for engineering or IT administration) concentrate high-value credentials and admin access in one place. They often store admin logins, API tokens, and remote access credentials alongside everyday browsing data. If an infostealer lands on a device like this, stolen browser data can become the first domino toward accessing internal tools and infrastructure.
Why cookie theft can beat passwords and MFA
As login security has improved over time, infostealer tactics have changed with it. Infostealer operators today target authentication cookies and session tokens more often than raw passwords. This change reflects how people now log in to their accounts. More users rely on password managers and multifactor authentication (MFA), so attackers go after data that can sidestep these defenses.
Cookies and tokens are issued after a successful login, which means they can sometimes let an attacker walk into an account without triggering another login screen or MFA prompt. What amplifies the risk is how long a session stays valid. A stolen token can be reused until the session expires or the service revokes it, giving attackers a window to move through logged-in services.
On underground marketplaces, stolen session data is now treated as its own commodity, with the “freshness” of a log directly dictating its price. The move from password theft to session cookie and token theft is a good example of how attackers respond and adapt to stronger authentication defenses.
How to reduce the risk of your device getting infected with infostealer malware
To reduce the risk of your device getting infected with infostealer malware, limit how much account access your device stores at once and therefore how far an attacker can move if an infostealer compromises your device. The idea is to shrink the blast radius by tightening the accounts and sessions that unlock other accounts or services. The steps below outline ways to do this without rebuilding your online routine.
- Protect your most sensitive accounts first. Think in terms of gateways, not the sheer number of accounts. Lock down your main email and identity login first, then apply the same protections to banking, shopping, and key work services. Use MFA and passkeys wherever they're supported and try not to leave those core accounts protected by passwords alone.
- Make your browser remember less. Regularly go through the passwords your browser or password manager is storing, delete ones you no longer use, and log out of any sessions that look unfamiliar. Keep your operating system and browser up to date as well because older versions are easier to exploit and harder to recover after an infostealer infection.
- Treat downloads and “free” tools with caution. Avoid installing unofficial launchers or cracked software. And if a tool asks you to disable protections or bypass security prompts to install it, treat that friction as a warning sign and walk away.
- Watch for takeover signals and rotate access fast. Treat unexpected login alerts, password reset emails you didn’t request, and new device sign-ins as signals of account takeover. Change passwords using another device (not the one you suspect was infected), revoke active sessions where the service allows it, and review account recovery settings so attackers can’t reenter through email or backup codes.
Online security starts with a click.
Stay safe with the world’s leading VPN