{"id":2051,"date":"2025-08-02T05:57:14","date_gmt":"2025-08-02T05:57:14","guid":{"rendered":"https:\/\/ft365.org\/index.php\/2025\/08\/02\/staggering-800-rise-in-infostealer-credential-theft\/"},"modified":"2025-08-02T05:57:14","modified_gmt":"2025-08-02T05:57:14","slug":"staggering-800-rise-in-infostealer-credential-theft","status":"publish","type":"post","link":"http:\/\/ft365.org\/index.php\/2025\/08\/02\/staggering-800-rise-in-infostealer-credential-theft\/","title":{"rendered":"Staggering 800% Rise in Infostealer Credential Theft"},"content":{"rendered":"<div>\n<p><img decoding=\"async\" src=\"https:\/\/ft365.org\/wp-content\/uploads\/2025\/06\/localimages\/ea721ff9-8ba4-4d88-b386-57e9e1606077.jpg?width=64&#038;height=64&#038;mode=crop&#038;scale=both&#038;format=webp\" alt=\"Photo of Phil Muncaster\" loading=\"lazy\"><\/p>\n<\/div>\n<div id=\"cphContent_pnlArticleBody\" data-layout-id=\"2\" data-edit-folder-name=\"text\" data-index=\"0\">\n<p>Security experts have warned of a huge surge in identity-based attacks, after revealing that 1.8 billion credentials were stolen in the first half of 2025, an 800% increase compared to\u00a0the previous six months.<\/p>\n<p>Flashpoint\u2019s <em>Global Threat Intelligence Index: 2025 Midyear Edition<\/em> is based on over 3.6 petabytes of data analyzed by the threat intelligence firm.<\/p>\n<p>The credentials were stolen from 5.8 million infected hosts and devices, it claimed.<\/p>\n<p>The trend is particularly concerning as compromised credentials can give threat actors simple and covert access to corporate resources, unless accounts are protected by multi-factor authentication (MFA).<\/p>\n<p><em>Read more on infostealers: 20,000 Asian IPs and Domains Dismantled in Infostealer Crackdown<\/em><\/p>\n<p>However, there\u2019s more in the report to concern security teams.<\/p>\n<p>Between January and June this year, the firm estimated over 20,000 disclosed vulnerabilities, 12,200 of which haven\u2019t even appeared in the National Vulnerability Database (NVD), meaning network defenders may not be aware of them. Nearly 7000 have public exploits available, putting organizations at greater risk of compromise.<\/p>\n<p>\u201cThe digital attack surface continues to expand, and the volume of disclosed vulnerabilities\u00a0is growing at a record pace \u2013 up by a staggering 246% since February 2025,\u201d the report noted.<\/p>\n<p>\u201cThis explosion, coupled with a 179% increase in publicly available exploit code, intensifies the pressure on security teams. It\u2019s no longer feasible to triage and remediate every vulnerability.\u201d<\/p>\n<h2>Ransomware and Breaches on the Rise<\/h2>\n<p>Both trends could be fuelling ransomware-related breaches, given initial access often comes via credential compromise or vulnerability exploitation.<\/p>\n<p>Confirmed ransomware breaches have risen 179% since the start of the year, with manufacturing (22%), technology (18%) and retail (13%) sectors the hardest hit.<\/p>\n<p>Perhaps also unsurprisingly, the report revealed 3104 data breaches in the first half of 2025, relating to 9.5 billion compromised records.<\/p>\n<p>\u201cOver the past four months, data breaches surged by 235%, with unauthorized access accounting for nearly 78% of all reported incidents. Data breaches are both the genesis and culmination of threat actor campaigns, serving as a source of continuous fuel for cybercrime activity,\u201d noted Flashpoint.<\/p>\n<p>\u201cAs a genesis, breaches provide attackers with various elements of personally identifiable information (PII). They are also the end result of the illicit operation, where stolen data is extorted or listed for sale for financial gain.\u201d<\/p>\n<p>Last month, the Identity Theft Resource Center (ITRC) warned that 2025\u00a0is on track to become a record year for data breaches in the US.<\/p>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Security experts have warned of a huge surge in identity-based attacks, after revealing that 1.8 billion credentials were stolen in the first half of 2025, an 800% increase compared to\u00a0the previous six months. Flashpoint\u2019s Global Threat Intelligence Index: 2025 Midyear Edition is based on over 3.6 petabytes of data analyzed by the threat intelligence firm.<\/p>\n","protected":false},"author":2,"featured_media":2052,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-2051","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"featured_image_urls":{"full":["http:\/\/ft365.org\/wp-content\/uploads\/2025\/08\/2051-06253966-aa13-4e31-bcde-0ce8b0d57993.jpg",300,300,false],"thumbnail":["http:\/\/ft365.org\/wp-content\/uploads\/2025\/08\/2051-06253966-aa13-4e31-bcde-0ce8b0d57993-150x150.jpg",150,150,true],"medium":["http:\/\/ft365.org\/wp-content\/uploads\/2025\/08\/2051-06253966-aa13-4e31-bcde-0ce8b0d57993.jpg",300,300,false],"medium_large":["http:\/\/ft365.org\/wp-content\/uploads\/2025\/08\/2051-06253966-aa13-4e31-bcde-0ce8b0d57993.jpg",300,300,false],"large":["http:\/\/ft365.org\/wp-content\/uploads\/2025\/08\/2051-06253966-aa13-4e31-bcde-0ce8b0d57993.jpg",300,300,false],"1536x1536":["http:\/\/ft365.org\/wp-content\/uploads\/2025\/08\/2051-06253966-aa13-4e31-bcde-0ce8b0d57993.jpg",300,300,false],"2048x2048":["http:\/\/ft365.org\/wp-content\/uploads\/2025\/08\/2051-06253966-aa13-4e31-bcde-0ce8b0d57993.jpg",300,300,false],"morenews-featured":["http:\/\/ft365.org\/wp-content\/uploads\/2025\/08\/2051-06253966-aa13-4e31-bcde-0ce8b0d57993.jpg",300,300,false],"morenews-large":["http:\/\/ft365.org\/wp-content\/uploads\/2025\/08\/2051-06253966-aa13-4e31-bcde-0ce8b0d57993.jpg",300,300,false],"morenews-medium":["http:\/\/ft365.org\/wp-content\/uploads\/2025\/08\/2051-06253966-aa13-4e31-bcde-0ce8b0d57993.jpg",300,300,false],"crawlomatic_preview_image":["http:\/\/ft365.org\/wp-content\/uploads\/2025\/08\/2051-06253966-aa13-4e31-bcde-0ce8b0d57993-146x146.jpg",146,146,true]},"author_info":{"display_name":"henry","author_link":"http:\/\/ft365.org\/index.php\/author\/henry\/"},"category_info":"<a href=\"http:\/\/ft365.org\/index.php\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>","tag_info":"Uncategorized","comment_count":"0","_links":{"self":[{"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/posts\/2051","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/comments?post=2051"}],"version-history":[{"count":0,"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/posts\/2051\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/media\/2052"}],"wp:attachment":[{"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/media?parent=2051"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/categories?post=2051"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/tags?post=2051"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}