{"id":10888,"date":"2025-06-23T13:28:25","date_gmt":"2025-06-23T13:28:25","guid":{"rendered":"https:\/\/www.forenova.com\/de\/blog\/\/"},"modified":"2025-08-21T06:46:19","modified_gmt":"2025-08-21T06:46:19","slug":"was-ist-infostealer-malware","status":"publish","type":"post","link":"https:\/\/www.forenova.com\/de\/blog\/was-ist-infostealer-malware\/","title":{"rendered":"Was ist Infostealer-Malware?"},"content":{"rendered":"\n<p>Infostealers are a type of malicious software (malware) designed to infiltrate computer systems and steal sensitive information. They collect various types of data that are used by cybercriminals to gain access to restricted data, such as\u00a0<\/p>\n\n<ul class=\"wp-block-list\">\n<li>Login credentials\u00a0<\/li>\n<\/ul>\n\n<ul class=\"wp-block-list\">\n<li>Bank\/Card information\u00a0<\/li>\n<\/ul>\n\n<ul class=\"wp-block-list\">\n<li>Personal data (home address, security number, phone number, etc.)\u00a0<\/li>\n<\/ul>\n\n<ul class=\"wp-block-list\">\n<li>Browser history data and cookies information\u00a0<\/li>\n<\/ul>\n\n<ul class=\"wp-block-list\">\n<li>Crypto wallets and keys\u00a0<\/li>\n<\/ul>\n\n<ul class=\"wp-block-list\">\n<li>Device-specific details (OS name, version, IP, installed software, etc.)\u00a0<\/li>\n<\/ul>\n\n<h2 class=\"wp-block-heading\"><strong>Infostealers are the most frequent type of attack in 2025<\/strong>\u00a0<\/h2>\n\n<p>In 2024, infostealer malware infected approximately 4.3 million devices, compromising around 3.9 billion credentials, including passwords and other sensitive data.\u00a0<\/p>\n\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><a href=\"http:\/\/www.esecurityplanet.com\/cybersecurity\/data-theft-infostealer-malware-2025\/.\"><img decoding=\"async\" data-id=\"10902\" src=\"https:\/\/www.forenova.com\/wp-content\/uploads\/2025\/06\/2-4-1024x1024.png\" alt=\"\" class=\"wp-image-10902\"\/><\/a><\/figure>\n<\/figure>\n\n<ol start=\"1\" class=\"wp-block-list\">\n<li><strong>Malware-as-a-Service on the rise<\/strong>\u00a0<\/li>\n<\/ol>\n\n<p>Underground forums represent a great source for potential hackers with minimal technical expertise to purchase this type of service (malware-as-a-service).\u00a0<\/p>\n\n<ol start=\"2\" class=\"wp-block-list\">\n<li><strong>The rise in cryptocurrency adoption<\/strong>\u00a0<\/li>\n<\/ol>\n\n<p>As the acceptance of cryptocurrency expands globally, hackers stand to gain significant returns on investment by obtaining wallet\/key information.\u00a0<\/p>\n\n<ol start=\"3\" class=\"wp-block-list\">\n<li><strong>Remote workforce &amp; more online accounts than ever<\/strong>\u00a0<\/li>\n<\/ol>\n\n<p>People manage more online accounts and digital assets than ever before, and with more employees working from home on potentially less secure networks, it creates the perfect storm conditions for hackers to exploit.\u00a0<\/p>\n\n<h2 class=\"wp-block-heading\"><strong>How do Infostealers get in?<\/strong>\u00a0<\/h2>\n\n<h3 class=\"wp-block-heading\"><strong><span style=\"background-color: rgb(255, 255, 255);\">1.<\/span> The classic bait and switch with phishing attackers distributing malicious payloads through deceptive communications.\u00a0<\/strong><\/h3>\n\n<p>These often take the form of malicious document attachments that exploit application vulnerabilities when opened. They also employ links directing users to credential harvesting sites or malware downloads disguised as legitimate resources. \u00a0<\/p>\n\n<h3 class=\"wp-block-heading\">2. <strong>Compromised Websites<\/strong> \u00a0<\/h3>\n\n<p>Hackers can unknowingly distribute malware on regular websites. Some attacks automatically download malicious files when you simply visit an infected site.\u00a0<\/p>\n\n<p>Harmful ads placed on legitimate websites can redirect visitors to dangerous content. Software downloads may contain hidden malware alongside the intended program.\u00a0<\/p>\n\n<h3 class=\"wp-block-heading\">3. <strong>Social Engineering<\/strong> \u00a0<\/h3>\n\n<p>Criminals may pretend to be technical support staff to convince victims to grant them remote access to computers. Deceptive messages on social media platforms exploit existing relationships to spread malicious links. Public QR codes can also lead individuals to risky websites.\u00a0<\/p>\n\n<h3 class=\"wp-block-heading\">4. <strong>Trojan Horse in Supply Chain<\/strong> \u00a0<\/h3>\n\n<p>Attackers often target the software development and distribution process, which may alter legitimate software updates to include malicious code. Many applications&#8216; development libraries and components are also susceptible to compromise.\u00a0<\/p>\n\n<h2 class=\"wp-block-heading\"><strong>Most popular Infostealer variants<\/strong>\u00a0<\/h2>\n\n<h3 class=\"wp-block-heading\"><strong>RedLine Stealer<\/strong>\u00a0<\/h3>\n\n<div class=\"wp-block-media-text is-stacked-on-mobile\" style=\"grid-template-columns:43% auto\"><figure class=\"wp-block-media-text__media\"><img decoding=\"async\" src=\"https:\/\/www.forenova.com\/wp-content\/uploads\/2025\/06\/1-4-1024x576.png\" alt=\"\" class=\"wp-image-10878 size-full\"\/><\/figure><div class=\"wp-block-media-text__content\">\n<p>RedLine Stealer was frequently cited as one of the most dominant infostealers throughout 2023 and 2024. One report indicated it was responsible for 43% of observed infostealer infections in 2024. It targets credentials, cookies, credit card details, FTP clients, cryptocurrency wallets, and specific files.<\/p>\n<\/div><\/div>\n\n<h3 class=\"wp-block-heading\"><strong>LummaC2 Infostealer<\/strong>\u00a0<\/h3>\n\n<div class=\"wp-block-media-text is-stacked-on-mobile\" style=\"grid-template-columns:43% auto\"><figure class=\"wp-block-media-text__media\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/www.forenova.com\/wp-content\/uploads\/2025\/06\/2-1024x576.png\" alt=\"\" class=\"wp-image-10880 size-full\" srcset=\"https:\/\/www.forenova.com\/wp-content\/uploads\/2025\/06\/2-1024x576.png 1024w, https:\/\/www.forenova.com\/wp-content\/uploads\/2025\/06\/2-300x169.png 300w, https:\/\/www.forenova.com\/wp-content\/uploads\/2025\/06\/2-768x432.png 768w, https:\/\/www.forenova.com\/wp-content\/uploads\/2025\/06\/2-1536x864.png 1536w, https:\/\/www.forenova.com\/wp-content\/uploads\/2025\/06\/2.png 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p>LumnaC2 saw a significant surge in detections in late 2024. Reports indicate massive increases in detections (e.g., a 369% increase from H2 vs. H1 2024, according to ESET), and it&#8217;s often listed among the top 3 most prevalent stealers. It targets crypto wallets, browser data (profiles, cookies, credentials), 2FA extensions, and system information.\u00a0<\/p>\n<\/div><\/div>\n\n<h3 class=\"wp-block-heading\"><strong>Rise Pro<\/strong> \u00a0<\/h3>\n\n<div class=\"wp-block-media-text is-stacked-on-mobile\" style=\"grid-template-columns:43% auto\"><figure class=\"wp-block-media-text__media\"><img decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/www.forenova.com\/wp-content\/uploads\/2025\/06\/3-1024x576.png\" alt=\"\" class=\"wp-image-10882 size-full\" srcset=\"https:\/\/www.forenova.com\/wp-content\/uploads\/2025\/06\/3-1024x576.png 1024w, https:\/\/www.forenova.com\/wp-content\/uploads\/2025\/06\/3-300x169.png 300w, https:\/\/www.forenova.com\/wp-content\/uploads\/2025\/06\/3-768x432.png 768w, https:\/\/www.forenova.com\/wp-content\/uploads\/2025\/06\/3-1536x864.png 1536w, https:\/\/www.forenova.com\/wp-content\/uploads\/2025\/06\/3.png 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p>Rise Pro is one of the most significant stealers, according to some reports (e.g., Kaspersky data places it second only to RedLine for 2024 infections).\u00a0<\/p>\n<\/div><\/div>\n\n<h3 class=\"wp-block-heading\"><strong>Racoon Stealer<\/strong>\u00a0<\/h3>\n\n<div class=\"wp-block-media-text is-stacked-on-mobile\" style=\"grid-template-columns:43% auto\"><figure class=\"wp-block-media-text__media\"><img decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/www.forenova.com\/wp-content\/uploads\/2025\/06\/4-1024x576.png\" alt=\"\" class=\"wp-image-10884 size-full\" srcset=\"https:\/\/www.forenova.com\/wp-content\/uploads\/2025\/06\/4-1024x576.png 1024w, https:\/\/www.forenova.com\/wp-content\/uploads\/2025\/06\/4-300x169.png 300w, https:\/\/www.forenova.com\/wp-content\/uploads\/2025\/06\/4-768x432.png 768w, https:\/\/www.forenova.com\/wp-content\/uploads\/2025\/06\/4-1536x864.png 1536w, https:\/\/www.forenova.com\/wp-content\/uploads\/2025\/06\/4.png 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p>While its main developer was arrested, leading to a temporary dip, updated versions emerged, and it remains a frequently mentioned threat, particularly noted in some regional reports (like LACNIC for Latin America\/Caribbean) and historical data. It steals a wide range of credentials and crypto wallets.\u00a0<\/p>\n<\/div><\/div>\n\n<h2 class=\"wp-block-heading\"><strong>What IT Managers Can Do Today to Protect Against Infostealers<\/strong>\u00a0<\/h2>\n\n<ul class=\"wp-block-list\">\n<li>Start by disabling browser-based password storage across all endpoints and enforce the use of enterprise-grade password managers. This helps eliminate one of the most common data sources targeted by infostealers.\u00a0<\/li>\n<\/ul>\n\n<ul class=\"wp-block-list\">\n<li>Ensure that MFA is phishing-resistant by using hardware tokens or app-based push notifications rather than SMS codes.\u00a0<\/li>\n<\/ul>\n\n<ul class=\"wp-block-list\">\n<li>Next, segment your high-risk and legacy systems. Machines running outdated operating systems or OT equipment that can&#8217;t support modern EDR agents should be isolated using firewall rules and VLAN segmentation to prevent lateral movement.\u00a0<\/li>\n<\/ul>\n\n<ul class=\"wp-block-list\">\n<li>Secure endpoint and browser configurations by removing unnecessary software and plugins. Block installation of unsigned apps or browser extensions not vetted by your team. This reduces the potential attack surface significantly.\u00a0<\/li>\n<\/ul>\n\n<ul class=\"wp-block-list\">\n<li>Proactively monitor early signs of infostealer activity. Watch for unusual outbound connections, reuse of credentials from unknown IPs, or browser processes behaving abnormally.\u00a0<br\/>\u00a0<\/li>\n<\/ul>\n\n<p>Traditional antivirus and firewall solutions aren\u2019t built to detect credential theft as it happens. That\u2019s where Managed Detection and Response (MDR) comes in.\u00a0<\/p>\n\n<p>With solutions like <a href=\"https:\/\/www.forenova.com\/de\/managed-detection-and-response-mdr\/\" target=\"_blank\" rel=\"noreferrer noopener\">NovaMDR<\/a>, small and medium-sized businesses can gain:<\/p>\n\n<ul class=\"wp-block-list\">\n<li>We conduct 24\/7 behavioral monitoring of endpoints, networks, and cloud activity to detect abnormal data exfiltration in real-time.\u00a0<\/li>\n<\/ul>\n\n<ul class=\"wp-block-list\">\n<li>We ensure expert validation of threats to prevent false positives from overshadowing genuine alerts.\u00a0<\/li>\n<\/ul>\n\n<ul class=\"wp-block-list\">\n<li>We detect credential theft by spotting anomalies such as logins from new geographies, cookie harvesting behaviors, and password dumping tools.\u00a0<\/li>\n<\/ul>\n\n<ul class=\"wp-block-list\">\n<li>We deliver immediate response capabilities such as isolating infected endpoints, halting suspicious processes, or triggering password resets.\u00a0<\/li>\n<\/ul>\n\n<p>Ready to stop infostealers before they ruin your business? Check out <a href=\"https:\/\/www.forenova.com\/de\/managed-detection-and-response-mdr\/\" target=\"_blank\" rel=\"noreferrer noopener\">NovaMDR<\/a>.\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Infostealers are a type of malicious software (malware) designed to infiltrate computer systems and steal sensitive information. They collect various types of data that are used by cybercriminals to gain access to restricted data, such as\u00a0 Infostealers are the most frequent type of attack in 2025\u00a0 In 2024, infostealer malware infected approximately 4.3 million devices, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":10887,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[610,583,584],"tags":[423,453,468],"class_list":["post-10888","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-cyber-security-de","category-glossary-de","tag-cybersecurity","tag-mdr","tag-ransomware"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Was ist Infostealer-Malware? - Forenova<\/title>\n<meta name=\"description\" content=\"Im Jahr 2024 infizierte Infostealer 4,3 Millionen Ger\u00e4te und beeintr\u00e4chtigten 3,9 Milliarden Daten. Ergreifen Sie proaktive Ma\u00dfnahmen zum Schutz vor solchen Bedrohungen.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.forenova.com\/de\/blog\/was-ist-infostealer-malware\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Was ist Infostealer-Malware? - Forenova\" \/>\n<meta property=\"og:description\" content=\"Im Jahr 2024 infizierte Infostealer 4,3 Millionen Ger\u00e4te und beeintr\u00e4chtigten 3,9 Milliarden Daten. Ergreifen Sie proaktive Ma\u00dfnahmen zum Schutz vor solchen Bedrohungen.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.forenova.com\/de\/blog\/was-ist-infostealer-malware\/\" \/>\n<meta property=\"og:site_name\" content=\"Forenova\" \/>\n<meta property=\"article:published_time\" content=\"2025-06-23T13:28:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-21T06:46:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.forenova.com\/wp-content\/uploads\/2025\/06\/What-is-Infostealer-Malware_-.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1366\" \/>\n\t<meta property=\"og:image:height\" content=\"768\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"ForeNova\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ForeNova\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.forenova.com\/de\/blog\/was-ist-infostealer-malware\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.forenova.com\/de\/blog\/was-ist-infostealer-malware\/\"},\"author\":{\"name\":\"ForeNova\",\"@id\":\"https:\/\/www.forenova.com\/de\/#\/schema\/person\/853d5bf49545ee26b44d7b446df73bda\"},\"headline\":\"Was ist Infostealer-Malware?\",\"datePublished\":\"2025-06-23T13:28:25+00:00\",\"dateModified\":\"2025-08-21T06:46:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.forenova.com\/de\/blog\/was-ist-infostealer-malware\/\"},\"wordCount\":797,\"publisher\":{\"@id\":\"https:\/\/www.forenova.com\/de\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.forenova.com\/de\/blog\/was-ist-infostealer-malware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.forenova.com\/wp-content\/uploads\/2025\/06\/What-is-Infostealer-Malware_-.png\",\"keywords\":[\"Cybersecurity\",\"MDR\",\"Ransomware\"],\"articleSection\":[\"Blog\",\"Cyber security\",\"Glossary\"],\"inLanguage\":\"de-DE\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.forenova.com\/de\/blog\/was-ist-infostealer-malware\/\",\"url\":\"https:\/\/www.forenova.com\/de\/blog\/was-ist-infostealer-malware\/\",\"name\":\"Was ist Infostealer-Malware? - Forenova\",\"isPartOf\":{\"@id\":\"https:\/\/www.forenova.com\/de\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.forenova.com\/de\/blog\/was-ist-infostealer-malware\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.forenova.com\/de\/blog\/was-ist-infostealer-malware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.forenova.com\/wp-content\/uploads\/2025\/06\/What-is-Infostealer-Malware_-.png\",\"datePublished\":\"2025-06-23T13:28:25+00:00\",\"dateModified\":\"2025-08-21T06:46:19+00:00\",\"description\":\"Im Jahr 2024 infizierte Infostealer 4,3 Millionen Ger\u00e4te und beeintr\u00e4chtigten 3,9 Milliarden Daten. Ergreifen Sie proaktive Ma\u00dfnahmen zum Schutz vor solchen Bedrohungen.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.forenova.com\/de\/blog\/was-ist-infostealer-malware\/#breadcrumb\"},\"inLanguage\":\"de-DE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.forenova.com\/de\/blog\/was-ist-infostealer-malware\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/www.forenova.com\/de\/blog\/was-ist-infostealer-malware\/#primaryimage\",\"url\":\"https:\/\/www.forenova.com\/wp-content\/uploads\/2025\/06\/What-is-Infostealer-Malware_-.png\",\"contentUrl\":\"https:\/\/www.forenova.com\/wp-content\/uploads\/2025\/06\/What-is-Infostealer-Malware_-.png\",\"width\":1366,\"height\":768,\"caption\":\"Infostealer-Malware\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.forenova.com\/de\/blog\/was-ist-infostealer-malware\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.forenova.com\/de\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Was ist Infostealer-Malware?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.forenova.com\/de\/#website\",\"url\":\"https:\/\/www.forenova.com\/de\/\",\"name\":\"Forenova\",\"description\":\"Forenova\",\"publisher\":{\"@id\":\"https:\/\/www.forenova.com\/de\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.forenova.com\/de\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de-DE\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.forenova.com\/de\/#organization\",\"name\":\"Forenova\",\"url\":\"https:\/\/www.forenova.com\/de\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/www.forenova.com\/de\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.forenova.com\/wp-content\/uploads\/2024\/10\/ForeNova_logo.webp\",\"contentUrl\":\"https:\/\/www.forenova.com\/wp-content\/uploads\/2024\/10\/ForeNova_logo.webp\",\"width\":230,\"height\":41,\"caption\":\"Forenova\"},\"image\":{\"@id\":\"https:\/\/www.forenova.com\/de\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.forenova.com\/de\/#\/schema\/person\/853d5bf49545ee26b44d7b446df73bda\",\"name\":\"ForeNova\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/www.forenova.com\/wp-content\/uploads\/2024\/10\/ForeNova-Original-Version-21-96x96.webp\",\"url\":\"https:\/\/www.forenova.com\/wp-content\/uploads\/2024\/10\/ForeNova-Original-Version-21-96x96.webp\",\"contentUrl\":\"https:\/\/www.forenova.com\/wp-content\/uploads\/2024\/10\/ForeNova-Original-Version-21-96x96.webp\",\"caption\":\"ForeNova\"},\"sameAs\":[\"https:\/\/www.forenova.com\"],\"url\":\"https:\/\/www.forenova.com\/de\/author\/forenova\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Was ist Infostealer-Malware? - Forenova","description":"Im Jahr 2024 infizierte Infostealer 4,3 Millionen Ger\u00e4te und beeintr\u00e4chtigten 3,9 Milliarden Daten. Ergreifen Sie proaktive Ma\u00dfnahmen zum Schutz vor solchen Bedrohungen.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.forenova.com\/de\/blog\/was-ist-infostealer-malware\/","og_locale":"de_DE","og_type":"article","og_title":"Was ist Infostealer-Malware? - Forenova","og_description":"Im Jahr 2024 infizierte Infostealer 4,3 Millionen Ger\u00e4te und beeintr\u00e4chtigten 3,9 Milliarden Daten. Ergreifen Sie proaktive Ma\u00dfnahmen zum Schutz vor solchen Bedrohungen.","og_url":"https:\/\/www.forenova.com\/de\/blog\/was-ist-infostealer-malware\/","og_site_name":"Forenova","article_published_time":"2025-06-23T13:28:25+00:00","article_modified_time":"2025-08-21T06:46:19+00:00","og_image":[{"width":1366,"height":768,"url":"https:\/\/www.forenova.com\/wp-content\/uploads\/2025\/06\/What-is-Infostealer-Malware_-.png","type":"image\/png"}],"author":"ForeNova","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ForeNova","Est. reading time":"5 Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.forenova.com\/de\/blog\/was-ist-infostealer-malware\/#article","isPartOf":{"@id":"https:\/\/www.forenova.com\/de\/blog\/was-ist-infostealer-malware\/"},"author":{"name":"ForeNova","@id":"https:\/\/www.forenova.com\/de\/#\/schema\/person\/853d5bf49545ee26b44d7b446df73bda"},"headline":"Was ist Infostealer-Malware?","datePublished":"2025-06-23T13:28:25+00:00","dateModified":"2025-08-21T06:46:19+00:00","mainEntityOfPage":{"@id":"https:\/\/www.forenova.com\/de\/blog\/was-ist-infostealer-malware\/"},"wordCount":797,"publisher":{"@id":"https:\/\/www.forenova.com\/de\/#organization"},"image":{"@id":"https:\/\/www.forenova.com\/de\/blog\/was-ist-infostealer-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.forenova.com\/wp-content\/uploads\/2025\/06\/What-is-Infostealer-Malware_-.png","keywords":["Cybersecurity","MDR","Ransomware"],"articleSection":["Blog","Cyber security","Glossary"],"inLanguage":"de-DE"},{"@type":"WebPage","@id":"https:\/\/www.forenova.com\/de\/blog\/was-ist-infostealer-malware\/","url":"https:\/\/www.forenova.com\/de\/blog\/was-ist-infostealer-malware\/","name":"Was ist Infostealer-Malware? - Forenova","isPartOf":{"@id":"https:\/\/www.forenova.com\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.forenova.com\/de\/blog\/was-ist-infostealer-malware\/#primaryimage"},"image":{"@id":"https:\/\/www.forenova.com\/de\/blog\/was-ist-infostealer-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.forenova.com\/wp-content\/uploads\/2025\/06\/What-is-Infostealer-Malware_-.png","datePublished":"2025-06-23T13:28:25+00:00","dateModified":"2025-08-21T06:46:19+00:00","description":"Im Jahr 2024 infizierte Infostealer 4,3 Millionen Ger\u00e4te und beeintr\u00e4chtigten 3,9 Milliarden Daten. Ergreifen Sie proaktive Ma\u00dfnahmen zum Schutz vor solchen Bedrohungen.","breadcrumb":{"@id":"https:\/\/www.forenova.com\/de\/blog\/was-ist-infostealer-malware\/#breadcrumb"},"inLanguage":"de-DE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.forenova.com\/de\/blog\/was-ist-infostealer-malware\/"]}]},{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/www.forenova.com\/de\/blog\/was-ist-infostealer-malware\/#primaryimage","url":"https:\/\/www.forenova.com\/wp-content\/uploads\/2025\/06\/What-is-Infostealer-Malware_-.png","contentUrl":"https:\/\/www.forenova.com\/wp-content\/uploads\/2025\/06\/What-is-Infostealer-Malware_-.png","width":1366,"height":768,"caption":"Infostealer-Malware"},{"@type":"BreadcrumbList","@id":"https:\/\/www.forenova.com\/de\/blog\/was-ist-infostealer-malware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.forenova.com\/de\/"},{"@type":"ListItem","position":2,"name":"Was ist Infostealer-Malware?"}]},{"@type":"WebSite","@id":"https:\/\/www.forenova.com\/de\/#website","url":"https:\/\/www.forenova.com\/de\/","name":"Forenova","description":"Forenova","publisher":{"@id":"https:\/\/www.forenova.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.forenova.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de-DE"},{"@type":"Organization","@id":"https:\/\/www.forenova.com\/de\/#organization","name":"Forenova","url":"https:\/\/www.forenova.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/www.forenova.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/www.forenova.com\/wp-content\/uploads\/2024\/10\/ForeNova_logo.webp","contentUrl":"https:\/\/www.forenova.com\/wp-content\/uploads\/2024\/10\/ForeNova_logo.webp","width":230,"height":41,"caption":"Forenova"},"image":{"@id":"https:\/\/www.forenova.com\/de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.forenova.com\/de\/#\/schema\/person\/853d5bf49545ee26b44d7b446df73bda","name":"ForeNova","image":{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/www.forenova.com\/wp-content\/uploads\/2024\/10\/ForeNova-Original-Version-21-96x96.webp","url":"https:\/\/www.forenova.com\/wp-content\/uploads\/2024\/10\/ForeNova-Original-Version-21-96x96.webp","contentUrl":"https:\/\/www.forenova.com\/wp-content\/uploads\/2024\/10\/ForeNova-Original-Version-21-96x96.webp","caption":"ForeNova"},"sameAs":["https:\/\/www.forenova.com"],"url":"https:\/\/www.forenova.com\/de\/author\/forenova\/"}]}},"_links":{"self":[{"href":"https:\/\/www.forenova.com\/de\/wp-json\/wp\/v2\/posts\/10888","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.forenova.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.forenova.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.forenova.com\/de\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.forenova.com\/de\/wp-json\/wp\/v2\/comments?post=10888"}],"version-history":[{"count":0,"href":"https:\/\/www.forenova.com\/de\/wp-json\/wp\/v2\/posts\/10888\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.forenova.com\/de\/wp-json\/wp\/v2\/media\/10887"}],"wp:attachment":[{"href":"https:\/\/www.forenova.com\/de\/wp-json\/wp\/v2\/media?parent=10888"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.forenova.com\/de\/wp-json\/wp\/v2\/categories?post=10888"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.forenova.com\/de\/wp-json\/wp\/v2\/tags?post=10888"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}