PaymentsJournal
No Result
View All Result
SIGN UP
  • Commercial
  • Credit
  • Debit
  • Digital Assets & Crypto
  • Digital Banking
  • Emerging Payments
  • Fraud & Security
  • Merchant
  • Prepaid
PaymentsJournal
  • Commercial
  • Credit
  • Debit
  • Digital Assets & Crypto
  • Digital Banking
  • Emerging Payments
  • Fraud & Security
  • Merchant
  • Prepaid
No Result
View All Result
PaymentsJournal
No Result
View All Result

To Track Down Stolen Data, Dark Web Threat Intelligence Is Key

By Wesley Grant
December 30, 2025
in Cybersecurity, Featured Content
0
0
SHARES
0
VIEWS
Share on FacebookShare on TwitterShare on LinkedIn
What Is the "Dark Web" and Why Should Fraud Analysts Be Paying Attention?, Dark web bank account value

What Is the "Dark Web" and Why Should Fraud Analysts Be Paying Attention?

In just two months of investigation, a form of malware known as Lumma Stealer was found on nearly 400,000 computers. This infostealer, which pilfers personal credentials like passwords, credit card numbers, bank account information, and cryptocurrency wallet logins, was ultimately shut down through a joint effort by Microsoft and law enforcement agencies.

However, the damage from Lumma has likely already been done. The infostealer has been around for years and remain popular with cybercriminals due to its efficiency and effectiveness. Even more concerning, new variants of this malware—and others like it—are constantly emerging.

Since most stolen credentials end up for sale on the dark web, it has become critical for organizations to integrate tools that can detect and protect against compromised data.

As Tracy Goldberg, Director of Cybersecurity at Javelin Strategy & Research, outlined in the report, Dark Web Threat Intel: Critical Pillar of Modern Cybersecurity, adopting these tools is just the first step that organizations must take to protect their operations from the growing infostealer threat.

Bundling Personal Info

A malware variation known as a digital skimmer is often used in e-commerce applications to capture payment card data during checkout. By contrast, infostealers can capture all available browsing data related to a purchase.

This breadth of access makes infostealers a particularly pernicious threat, as they can collect far more data at a much wider scale.

“Let’s say that you have session history,” Goldberg said. “If you don’t go and clear out your browsing data—which I don’t think most of us do on a regular basis—these infostealers can steal your cookies. Some of them can even steal your autofill data. Once they get access to that browsing history, they compromise all kinds of accounts.”

“Stealing your digital wallet and credit card data is just scratching the surface, and some of these emerging infostealers even have the capability to capture screenshots,” she said. “Even if you were to go in and clear the browsing history at some point, once that infostealer has infiltrated you and captures screenshots—unless you go in and change passwords that were captured in that browsing data—they’ve got your information.”

Because of these capabilities, analysts estimate that infostealers have enabled the theft of billions of personal credentials. The data they collect is easily aggregated by bad actors and frequently auctioned on the dark web.

While individual data elements are sometimes sold piecemeal, a disturbing trend has emerged in which complete bundles of personal data are sold together.

“What makes infostealers so attractive to cybercriminals is that they can package data,” Goldberg said. “They could package your date of birth, your commonly used passwords, your username, as well as your credit card data and your Social Security number. All of that could be packaged and sold so that it’s easy to take over your identity or to use bits of your information to create a synthetic identity.”

Reducing Password Dependency

To defend their customers, financial institutions must take a multi-pronged attack. One of the most important ways to neutralize the threat from malware designed to steal credentials is to reduce the use of these credentials.

“We have to get away from usernames and passwords.” Goldberg said. “The less consumers are asked to do to authenticate themselves, the better off we’re going to be. The more back-end analytics that can be used to authenticate an individual or a device, the safer we’re going to be—because humans are always going to be the weakest link.”

The vulnerability of the end user is one of the reasons why phishing attacks have become so prevalent in recent years. Bad actors can now leverage sophisticated technologies to craft messages that appear to originate from legitimate sources. For example, many consumers recently received phony texts regarding unpaid tolls that purported to be from government agencies.

Criminals will couple these convincing communications with social engineering techniques, where they pressure the user to take urgent action. These tactics—phishing and social engineering techniques—are the foundation of many fraud attacks, and infostealers are no exception.

Because these attacks have become increasingly effective, it’s imperative to move away from the traditional username/password paradigm. However, the widespread reliance on login credentials makes this shift unlikely to happen in the near future.

“The big takeaway for banks and credit unions is that we have to start looking ahead to building a bridge that’s going to carry us from where we are today with usernames and passwords into the future where we don’t have usernames and passwords,” Goldberg said. “That’s going to mean multifactor authentication. It’s going to mean behavioral biometrics and analytics that are used to complement usernames and passwords.”

“Eventually, we get to the point where we can just get rid of usernames and passwords altogether,” she said. “Another gap-filling measure is to ensure that passwords are strong and that you’re requiring your customers and members to change passwords on a fairly regular basis—at least every 90 days.”

Dark Web Intelligence

In addition to shoring up authentication methods, financial institutions must take steps to uncover what data may have already been compromised. This requires leveraging dark web threat intelligence platforms, which constantly monitor the dark web for any information to an institution’s customers or members.

“Let’s say that they have Bank of America as a client,” Goldberg said. “The dark web threat intel provider then will go out and scour the dark web—or even the open web, social media posts and those types of things—to see if there’s any anything that’s linked to Bank of America.”

“Oftentimes, Bank of America as a client will also provide the dark web provider with any kind of data that might help them pick up on accounts that may have been compromised,” she said. “Then, the dark web threat intel providers try to prevent that data from being exposed in the first place.”

A proactive feature of many dark web threat intel platforms is the deployment of analysts who infiltrate the dark web while posing as cybercriminals. These analysts monitor threat actor communications to detect emerging threats or breaches.

In some cases, they can even repurchase stolen data on the dark web and return the compromised credentials or information to the client before further damage occurs.

Getting Off the Fence

As fraud losses and systems impacts worsen, more organizations have become aware of the damaging potential of malware. However, the added impacts of infostealers mean that financial institutions must implement strong defenses now.

“One of the big takeaways is that there are still some organizations out there that have been a bit on the fence about how relevant dark web threat intel is,” Goldberg said. “These infostealers aren’t new, they’ve been around for a while. But they continue to evolve, and we continue to see new and more powerful strains of them.”

“If you weren’t convinced before, you should be convinced now that dark web threat intel is critical, because it helps you get to a position of being more proactive and predictive with cybersecurity, versus being in this reactive mode once the fraud already takes place,” she said.

0
SHARES
0
VIEWS
Share on FacebookShare on TwitterShare on LinkedIn
Tags: CybercriminalsDark Webdark web threat intelligenceinfostealersPasswords

    Get the Latest News and Insights Delivered Daily

    Subscribe to the PaymentsJournal Newsletter for exclusive insight and data from Javelin Strategy & Research analysts and industry professionals.

    Must Reads

    What Is the "Dark Web" and Why Should Fraud Analysts Be Paying Attention?, Dark web bank account value

    To Track Down Stolen Data, Dark Web Threat Intelligence Is Key

    December 30, 2025
    tokenization

    The Trends That Will Modernize Payments Technology in 2026

    December 29, 2025
    instant payments

    Is UPI’s Rapid Growth Squeezing India’s Payments Market?

    December 23, 2025
    prepaid digital assets

    In a Pivotal Year for Prepaid Products, Digital Assets Emerge

    December 22, 2025
    agentic commerce

    Will Agentic Commerce Break Through Next Year?

    December 19, 2025
    visa mastercard settlement

    Why Walmart Is Taking the Lead Against the Visa and Mastercard Settlement

    December 18, 2025
    commercial banking onboarding

    The Biggest Bottleneck in Commercial Banking? Onboarding

    December 17, 2025
    Amazon, Visa, and the UK: Credit Card Retail Wars and My Rewards, Amazon Pay cash load

    Trouble at Home: A Second Flop in Credit Card Rewards

    December 16, 2025

    Linkedin-in X-twitter
    • Commercial
    • Credit
    • Debit
    • Digital Assets & Crypto
    • Digital Banking
    • Commercial
    • Credit
    • Debit
    • Digital Assets & Crypto
    • Digital Banking
    • Emerging Payments
    • Fraud & Security
    • Merchant
    • Prepaid
    • Emerging Payments
    • Fraud & Security
    • Merchant
    • Prepaid
    • About Us
    • Advertise With Us
    • Sign Up for Our Newsletter
    • About Us
    • Advertise With Us
    • Sign Up for Our Newsletter

    ©2024 PaymentsJournal.com |  Terms of Use | Privacy Policy

    • Commercial Payments
    • Credit
    • Debit
    • Digital Assets & Crypto
    • Emerging Payments
    • Fraud & Security
    • Merchant
    • Prepaid
    No Result
    View All Result