Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

October 2025 Infostealer Trend Report

0
Medium
Published: Thu Nov 20 2025 (11/20/2025, 14:45:53 UTC)
Source: AlienVault OTX General

Description

The October 2025 Infostealer Trend Report highlights the ongoing and evolving threat posed by Infostealer malware families such as Rhadamanthys, ACRStealer, and LummaC2. Attackers have shifted distribution tactics, increasingly leveraging legitimate websites to evade detection and search engine restrictions, a technique known as SEO poisoning. A notable development is the mass distribution of a new Loader malware employing DLL sideloading to execute malicious payloads stealthily. The report also details changes in LummaC2 distribution patterns and the use of sophisticated disguise and phishing techniques to target companies. These Infostealers aim to exfiltrate sensitive information, posing risks to confidentiality and potentially enabling further attacks. The threat does not require known exploits or zero-day vulnerabilities but relies on social engineering and advanced evasion methods. European organizations are at risk due to the widespread use of affected malware and the targeting of companies via phishing. Mitigation requires proactive detection of DLL sideloading, monitoring for SEO poisoning campaigns, and enhanced phishing defenses.

AI-Powered Analysis

AILast updated: 11/20/2025, 22:24:56 UTC

Technical Analysis

This report from October 2025 provides a detailed analysis of Infostealer malware trends, focusing on the distribution volume, methods, and disguise techniques observed by AhnLab's automated detection systems. The most prevalent Infostealers identified are Rhadamanthys, ACRStealer, and LummaC2, which continue to be widely distributed. Attackers have evolved their distribution methods by exploiting legitimate websites to bypass search engine restrictions, a tactic known as SEO poisoning, which increases the likelihood of victims encountering malicious content. A significant trend is the emergence of a new Loader malware that uses DLL sideloading, a technique where a malicious DLL is loaded by a legitimate executable, allowing stealthy execution and evasion of traditional detection mechanisms. The report also notes changes in the distribution patterns of LummaC2, indicating adaptive tactics by threat actors. Phishing remains a key vector, with attackers using sophisticated disguise techniques to trick users into executing malware. The malware families involved employ various MITRE ATT&CK techniques such as T1071 (Application Layer Protocol), T1055 (Process Injection), T1102 (Web Service), T1059.001 (PowerShell), T1547.001 (Registry Run Keys/Startup Folder), T1027 (Obfuscated Files or Information), and T1204.001 (User Execution). The campaign does not rely on known exploits but rather on social engineering and advanced evasion, making detection challenging. Indicators of compromise include multiple file hashes and domains associated with the campaign. The threat landscape suggests a medium severity level due to the potential for data theft and operational disruption, combined with the ease of distribution and evasion techniques.

Potential Impact

For European organizations, this threat poses significant risks primarily to confidentiality, as Infostealers aim to exfiltrate sensitive data such as credentials, financial information, and intellectual property. The use of legitimate websites for distribution increases the risk of exposure, especially for organizations with employees who frequently access external web resources. The DLL sideloading Loader malware complicates detection and response, potentially allowing persistent footholds within networks. Phishing campaigns targeting companies can lead to initial compromise, lateral movement, and data breaches. The impact extends to operational integrity if stolen credentials are used for further attacks like ransomware or espionage. Industries with high-value data, such as finance, manufacturing, and logistics, are particularly vulnerable. The evolving tactics indicate that traditional signature-based defenses may be insufficient, requiring enhanced behavioral monitoring and threat intelligence integration. The medium severity reflects a balance between the sophistication of the attack methods and the absence of zero-day exploits, but the widespread distribution and potential for data loss remain concerning.

Mitigation Recommendations

European organizations should implement multi-layered defenses focusing on detection and prevention of DLL sideloading by monitoring for anomalous DLL loads by legitimate executables and employing application whitelisting where feasible. Enhance web filtering and DNS monitoring to detect and block access to domains involved in SEO poisoning campaigns and known malicious infrastructure. Deploy advanced email security solutions with phishing detection capabilities, including user training to recognize sophisticated disguise techniques and social engineering attempts. Utilize endpoint detection and response (EDR) tools to identify process injection and obfuscation behaviors associated with these Infostealers. Regularly update threat intelligence feeds with the provided indicators such as file hashes and domains to enable timely detection. Conduct periodic security assessments and phishing simulations to improve organizational resilience. Restrict use of PowerShell and other scripting environments to trusted administrators and monitor their usage closely. Finally, implement robust credential management and multi-factor authentication to limit the impact of stolen credentials.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://asec.ahnlab.com/en/91062"]
Adversary
null
Pulse Id
691f29a1fb65b42a9f9f4e0e
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash0223b36e193979cf72ff7dae6d2493c7
hash046a0e41374a937d30f6984a6b760b17
hash145934077f8c72f43714a6dc1567aaa2
hash158c6462ec5d3c9ea8066e6ee58d8861
hash1813d31726e022f0ee97c9e278bc3eed
hash558e748f99f5ca3c54ad425d2f3a4aa1ad67ca08
hash7308cc1bf7aef791de90106195c70a310aa6da69
hashb116f9ac43debc50402950a21025d5da5950f76c
hashd661e3990c422884a63657d58bdf7d8687714d72
hashffbd2a57bb130f76e4418bd70d0cc6c9567dd42b
hash177a3e5599e6a845705eba5ffda4b228023e9150b9b100bfed596f48e99c6cbc
hash239ec64b8c00bdc8603baaf441fc33bb14c14800051cf2d48d80345ff2966d9a
hash381a973ed8a246d736f14be643616c79e19ea3b32b706ce48148d29492eabb8e
hash8390aa85c1a686aa5d3384372479044a962b6435223e96b64cd56aa35fe4af08
hashe0748f6d9af223771ced811be0b904028d73d8e2ca9e399bc08af763866e1d00

Domain

ValueDescriptionCopy
domainevgshippingline.com
domainmijnplug.com
domainjpg.namaramalan.com
domainwww.mirado.website

Threat ID: 691f9295b342c1dca420b68d

Added to database: 11/20/2025, 10:13:41 PM

Last enriched: 11/20/2025, 10:24:56 PM

Last updated: 11/21/2025, 5:44:51 AM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats