- US military agencies and defense contractors affected by infoTeals malware
- Malware can Exfiltrate the victim’s data
- Scientists discovered thousands of infected devices
Despite their billions of dollars, US agencies have been infected by infoTeals malware and have had credentials and information stolen from official devices.
A report from Hudson Rock has revealed as little as $ 10 per Computer, criminals can ‘buy stolen data from employees working in classified defense and military sectors’.
Infostealers is a type of malware that has evolved as a crucial tool for cyber criminals. As the name suggests, the sensitive information stored on a victim’s device usually collects, usually to exploit identity theft, extortion or financial fraud – but in this case, it is probably confidential or classified data that potentially relate to national security.
Infostealers are not dependent on brute -force attacks, but swap instead of human error -here’s what we know so far.
Supply chain compromise
Researchers found infected users from six contractors; Lockheed Martin, Bae Systems, Boeing, Honeywell, L3harris and Leidos. These defense contractors work on seriously advanced military technology, including warships, f -35 jet and more -Lockheed Martin alone was awarded $ 5.1 billion of the Department of Defense Department in 2024.
In total, 472 third-party company information was postponed, including Cisco, SAP integrations and Microsoft from contractors. Businesses, organizations and even government departments are increasingly interdependent, and suppliers of the supply chain have often been used in attacks “If an opponent wanted to infiltrate a defense contractor’s supply chain, this would be their golden ticket,” the report confirms.
The report outlined an example of how Honeywell’s infrastructure was compromised – including its internal intranet, an Active Directory Federation Services login and an identity and access management system. Researchers discovered 398 infected employees and 18,527 infected users for Honeywell systems over the years, and only a compromised employee held 56 company information for Honeywell’s infrastructure as well as 45 additional third -party credentials -showing the extent of the risk.
But contractors were not the only victims, with infections found in the US Army, the US Navy, the FBI and the Government’s Responsibility Office (GAO) system opponent could move laterally inside military systems.
Third-party data violations have become a major security problem, and new threats have found that almost all (98%) of European companies have experienced a third-party break in the past year.
At the end of 2024, the US Ministry of Finance declared a ‘major incident’ after experiencing a breach through its supplier ‘Beyondtrust’ – so these threats are not only hypothetical. There are real dangers associated with national security if third -party providers are compromised, especially if the suppliers have classified information.
InfoTeals risk
How serious is this? That’s not good. As the report points out, “If Infostealers can violate Lockheed, Boeing, the US Army and the FBI, they can break someone”. These violations reinforce the idea that any organization, no matter how good their cyber hygiene is or how strong their cyber security defense can be compromised.
The most common infostealers are lumma stealer, vidar, redline and Medusa – and these can exfilter your data in less than a minute, so here are some tips to stay in security.
Unfortunately, there is no way to avoid infoTeals, it’s mostly about keeping good cyberhygiene. Infostealers are primarily dependent on user errors, which accidentally downloading an infected PDF, pirated software crack or clicking on a malicious link.
As with social engineering attacks, the best defense is to pay attention and remain vigilant. Do not click on links you do not trust, do not visit non -verified sites, and if you work in an industry such as defense, security or a government agency – it is probably best to stick strictly to official places.
Infostealers is a type of malware, so implementing the best malware -removing software can make sure there is no lingering threat – but to avoid the threat you have to be on the ball.
Make sure you have a strong password and use unique credentials for each login – it’s a FAFF, but it keeps you protected. If a password is compromised, everyone else may be if you reuse your passwords.
Organizations need to be sure to run regular and thorough cybersecurity training sessions for all employees at all levels, so everyone understands the risks and severity of a break.
Evaluation of the security position for software vendors and suppliers can save you from a critical violation, and with violations that often cost millions of dollars and damage an organization’s reputation, this can be an important security policy for your business.



