Nizich Provides Insight Into Infostealer Malware
Communications of the ACM delves into how cybercriminals are getting their hands on so much information. 鈥淭he evidence and the headlines point to one malware category: infostealers,鈥 the article states. 鈥淲e can trace infostealers to 2006 when the ZeuS Trojan stole users鈥 online credentials, accessing their banking services,鈥 said聽, ETIC director and adjunct associate professor of computer science. Trojan horse malware tricks users into installing it, appearing to be a legitimate program. As with other malware, infostealer families evolve as malware programmers create, use, and market the initial software.