In the ever-evolving realm of technology, businesses face a daunting task: protecting their sensitive information from cybercriminals. With the rise of infostealer malware, which disguises itself as harmless files or hides within seemingly innocent emails, companies must find ways to defend against these stealthy infiltrators. These malwares make their way into employee and contractor devices, both managed and unmanaged, and quietly exfiltrate all types of data. This pilfered information is then used to launch follow-up attacks, such as ransomware, causing significant harm to organizations. The data at risk includes customer details, financial information, intellectual property, and R&D plans, all of which are stolen from compromised applications that were accessed using the authentication data obtained by infostealers, such as credentials and active session cookies or tokens. To help businesses combat this threat, this episode of the CyberWire-X podcast delves into the growing prevalence of infostealers and offers practical steps that organizations of any size or industry can take to mitigate the risk.
Hosted by Rick Howard, N2K’s CSO, Chief Analyst, and Senior Fellow, the show begins with a discussion on the history of incident response and post-infection remediation (PIR) actions. Joined by Rick Doten, a member of the Hash Table, the conversation sheds light on the early days of incident response and how the current thinking around PIR has evolved. As businesses became more vulnerable to cyber threats, the need for effective incident response and remediation became paramount. Doten shares insights into the best practices for post-infection remediation, emphasizing the importance of quickly identifying and neutralizing threats to prevent further damage.
The second half of the episode features an interview with Trevor Hilligoss, the Director of Security Research at SpyCloud and sponsor of the episode. Hilligoss joins CyberWire podcast host Dave Bittner to discuss the challenges that enterprises and security leaders face when attempting to identify stolen data from malware-infected devices. This task is particularly difficult due to the covert nature of infostealers. Hilligoss highlights the significance of implementing proper post-infection remediation into existing incident response workflows as a means of preventing stolen data from being used to launch ransomware attacks. By promptly addressing the issue and removing the potential for further harm, organizations can greatly reduce their vulnerability to cybercriminals.
During the interview, Hilligoss cites an industry report that surveyed over 300 security leaders from North America and the UK, offering insights into their perspectives on malware identification and remediation. The findings indicate that there is still work to be done in minimizing cybercriminals’ access and impact. Hilligoss identifies key areas for improvement, such as enhancing threat intelligence sharing and adopting automation tools to streamline incident response processes. By leveraging these solutions, organizations can bolster their defenses and stay one step ahead of cybercriminals.
In conclusion, the proliferation of infostealers poses a significant threat to businesses in today’s digital landscape. However, by implementing proper incident response and post-infection remediation measures, organizations can effectively mitigate this risk. The insights shared in this episode of the CyberWire-X podcast serve as a valuable resource for businesses of all sizes and industries looking to bolster their cybersecurity defenses. With the right strategies and tools in place, organizations can navigate the ever-changing cyber threat landscape and protect their sensitive information from falling into the wrong hands.

