SHARE
Facebook X Pinterest WhatsApp

Flashpoint Releases Defender’s Guide on Infostealer Threats

Flashpoint released its Proactive Defenders’ Guide to Infostealers to aid organizations in their defense strategies against this rapidly growing threat in 2025.

Written By
thumbnail Luis Millares
Luis Millares
Oct 27, 2025
Channel Insider content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

Flashpoint has released its Proactive Defender’s Guide to Infostealers, underscoring the urgent need for proactive defense against infostealers — identified as the “most scalable entry point into enterprises” in 2025.

Proactive infostealer monitoring and defense

According to Flashpoint’s research, infostealer-driven credential theft has surged by 800% over the past year, compromising more than 1.8 billion corporate and personal accounts. Stolen data includes sensitive information such as passwords, cookies, and other confidential credentials.

Flashpoint’s guide offers organizations a roadmap for shaping their 2026 defense strategies, including an analysis of the most active infostealers, strategies for managing the identity attack surface, and practical guidance for operationalizing infostealer intelligence.

It stresses that organizations must adopt a proactive approach to counter the growing infostealer threat — leveraging infostealer threat intelligence and responding immediately when data is exfiltrated, packaged into logs, and listed for sale.

“A single log file can capture enough host and session information to enable attackers to move laterally through systems and achieve complete network compromise,” said Ian Gray, vice president of intelligence at Flashpoint.

“Given the 800 percent surge in infostealer infections during 2025, defensive strategies must shift toward proactive monitoring of stolen session cookies and corporate device metadata — eliminating the risk before attackers can orchestrate a full network breach,” Gray added.

Strategies to manage the identity attack surface

In response to the rise in infostealer-related incidents, Flashpoint advocates for Primary Source Collection (PSC). PSC involves actively capturing raw logs directly from infostealer marketplaces, Telegram channels, and underground forums. 

These raw data sets are then processed through the Flashpoint platform, where they are converted into structured intelligence that helps security teams detect and neutralize threats before they escalate.

Flashpoint CEO and co-founder Josh Lefkowitz emphasized the importance of PSC amid the rapid growth of the malware-as-a-service market.

“As organizations plan their 2026 defense strategies, defending against this trend requires a direct, unmediated view into the illicit underground where these logs are being weaponized,” Lefkowitz said.  

“Acquiring this level of visibility necessitates Primary Source Collection (PSC). Flashpoint is delivering this foundational intelligence, allowing leaders to interrupt the attacker’s chain, accelerate proactive defense strategies, and successfully pivot the business model to one of true digital resilience,” Lefkowitz added.

In August, Flashpoint also released its Global Threat Intelligence Index: 2025 Midyear Edition. Read more about its findings on attacker behavior and emerging trends within the cyber threat landscape.

thumbnail Luis Millares

Luis Millares has extensive experience reviewing virtual private networks (VPNs), password managers, and other security software. He has tested and reviewed numerous forms of tech, covering consumer technology like smartphones and laptops, all the way to enterprise software and cybersecurity products. He has authored over 450 online articles on technology and has worked for the leading tech journalism site in the Philippines, YugaTech.com. He currently contributes to the Daily Tech Insider newsletter, providing well-researched insights and coverage of the latest in technology.

Recommended for you...

Video: How MSPs Can Turn Compliance Into Profit According to Choice Cyber Solutions COO
Katie Bavoso
Oct 22, 2025
Syncro Survey Finds Backup, Security Gaps in Microsoft 365 MSPs
Luis Millares
Oct 22, 2025
ShareGate Announces New Program and Advanced Assessments
Jordan Smith
Oct 21, 2025
Silverfort Adds New Capabilities to Enhance End-to-End Identity Security
Luis Millares
Oct 21, 2025
Channel Insider Logo

Channel Insider combines news and technology recommendations to keep channel partners, value-added resellers, IT solution providers, MSPs, and SaaS providers informed on the changing IT landscape. These resources provide product comparisons, in-depth analysis of vendors, and interviews with subject matter experts to provide vendors with critical information for their operations.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.