November 2025 Infostealer Trend Report

November 2025 Infostealer Trend Report

This report provides statistics, trends, and case information on Infostealer malware collected and analyzed during the month of November 2025, including distribution volume, distribution channels, and disguising techniques. The following is a summary of the report.   1) Data Source and Collection Method   The AhnLab SEcurity intelligence Center (ASEC)

September 2025 Infostealer Trend Report

September 2025 Infostealer Trend Report

This report provides statistics, trends, and case information on Infostealer, including distribution volume, distribution methods, and disguises based on the data collected and analyzed in August 2025. The following is a summary of the original report.   1) Data Source and Collection Methods   AhnLab SEcurity intelligence Center (ASEC) operates

June 2025 Infostealer Trend Report

June 2025 Infostealer Trend Report

This report provides statistics, trends, and case information on Infostealer malware including the distribution volume, distribution methods, and disguises based on the data collected and analyzed in June 2025. The following is a summary of the report.   1) Data Sources and Collection Methods   AhnLab SEcurity intelligence Center (ASEC)

May 2025 Infostealer Trend Report

May 2025 Infostealer Trend Report

This report provides statistics, trends, and case information on the distribution of Infostealer malware, including the distribution volume, methods, and disguises, based on the data collected and analyzed in May 2025. The following is a summary of the report.   1) Data Source and Collection Method   AhnLab SEcurity intelligence

April 2025 Infostealer Trend Report

April 2025 Infostealer Trend Report

This report provides statistics, trends, and case information on the distribution of Infostealer malware, including the distribution volume, methods, and disguises, based on the data collected and analyzed in April 2025. The following is a summary of the report.   1) Data Source and Collection Method   The AhnLab SEcurity

January 2025 Infostealer Trend Report

January 2025 Infostealer Trend Report

This report provides statistics, trends, and case information on the distribution quantity, distribution methods, and disguise techniques of Infostealer collected and analyzed during January 2025. Below is a summary of the report’s content.   1. Data Sources and Collection Methods   To proactively respond to Infostealer, AhnLab Security Emergency response

Tracking and Responding to AgentTesla Using EDR

Tracking and Responding to AgentTesla Using EDR

AhnLab Security Emergency response Center (ASEC) has been uploading a summary of weekly malware statistics every week. https://asec.ahnlab.com/en/53647/ This post will cover how EDR is used to detect, track, and respond to AgentTesla, an Infostealer continuously being distributed among the malware mentioned in the post above. AgentTesla is an Infostealer

Types of Recent .NET Packers and Their Distribution Trends in Korea

Types of Recent .NET Packers and Their Distribution Trends in Korea

    0. Overview This post is a summary of the TI report, ‘Report on the Trends and Types of Recent .NET Packers.’ Please refer to the report in the hyperlink for more details on the topic. Recently, packers made with .NET are being found in various places both in

AgentTesla Being Distributed via VBS

AgentTesla Being Distributed via VBS

The ASEC analysis team has recently identified that AgentTesla is being distributed through malicious VBS. The script file has multiple codes that have been obfuscated multiple times. AgentTesla has been found to be distributed last May through a Windows Help file (*.chm), and it seems that its distribution method is

Malware Being Distributed by Disguising Itself as Icon of V3 Lite

Malware Being Distributed by Disguising Itself as Icon of V3 Lite

The ASEC analysis team has discovered the distribution of malware disguised as a V3 Lite icon and packed with the .NET packer. The attacker likely created an icon that is almost identical to that of V3 Lite to trick the user, and AveMaria RAT and AgentTesla were discovered during the