Back to Intelligence Center
Supply Chain Security

Third-Party App Risks in the Age of Infostealer Malware

As organizations rely more on third-party apps for efficiency and scalability, they also open doors to new cyber risks--especially from infostealer malware.

WI

Whiteintel Team

Intelligence Division

Nov 19, 2024
3 min read
Supply Chain Risk Hero

In this article, we discuss possible causes for breaches and how to take measures against them. As organizations rely more on third-party apps for efficiency and scalability, they also open doors to new cyber risks--especially from infostealer malware.


Name of the Game: Infostealer Malware

Infostealers are a type of malware designed to capture sensitive information from infected systems, such as login credentials, payment data, and other authentication details. These threats operate quietly, often evading detection while collecting valuable data.

Infostealers typically enter systems through phishing emails, compromised websites, or malicious downloads. Unlike ransomware, which demands payment, infostealers aim to gather data that attackers can use or sell, making them particularly dangerous to organizations that rely on third-party platforms with broad permissions.

Supply Chain Attack Vector Diagram
Figure 1: How infostealers bridge the gap to third-party infrastructure

Notable Cases of Third Party Applications and Supply Chain Compromise


Airbus

The RedLine infostealer malware compromised a Turkish airline employee's system, resulting in the exposure of sensitive data from 3,200 suppliers. This breach highlights the risks of weak endpoint security within the supply chain, where adversaries target vulnerable systems to exfiltrate valuable organizational data.


Uber

Raccoon stealer malware bypassed Uber's two-factor authentication (2FA) by leveraging session hijacking techniques and escalating privileges to gain access to internal systems. This incident illustrates the vulnerabilities of 2FA when adversaries exploit underlying session management flaws and unauthorized privilege escalation to circumvent multi-factor protections.


AT&T and Ticketmaster (Snowflake Incident)

Third-party platforms like Snowflake are crucial for modern businesses, offering tools for data storage, analysis, collaboration, and cloud accessibility. These platforms help companies focus on core operations by streamlining processes and enabling seamless data sharing. However, their popularity makes them attractive targets for cyber criminals.

Snowflake Incident Visualization
Figure 2: The impact of infostealers on cloud data platforms

In 2024, AT&T experienced a breach involving infostealer malware deployed by hacker group UNC5537, which stole customer credentials and led to unauthorized access to sensitive data on a third-party cloud platform, likely Snowflake. This attack, part of a larger campaign that also targeted organizations like Ticketmaster, highlights the significant risks posed by third-party applications and supply chain compromises.

Whiteintel Data Insight

Whiteintel has detected 6K+ unique Snowflake accounts that were compromised by infostealer malware in 2024.


Enter Whiteintel.io : A Powerful Tool for Actionable Infostealer Malware Intelligence

Whiteintel.io provides tailored solutions to help organizations combat the unique risks posed by infostealer malware and third-party app vulnerabilities. Here's how we can help:


  • Advanced Threat Detection and Monitoring Our cutting-edge threat detection systems are trained to recognize and intercept infostealer malware activity. Whiteintel.io's monitoring solutions actively track anomalies in third-party app access, catching early signs of compromise before further damage occurs.
  • Proactive Threat Intelligence Infostealers are constantly evolving, and our threat intelligence team stays on top of the latest developments, ensuring that our clients' defenses are up to date. Whiteintel.io provides actionable intelligence to preemptively address new tactics, keeping your organization one step ahead.
  • Incident Response and Remediation Support In the event of a breach, Whiteintel.io's incident response team is ready to help. We guide organizations through containment, eradication, and recovery, minimizing downtime and mitigating further damage.
Whiteintel Dashboard Monitoring
Figure 3: Monitoring third-party exposure via Whiteintel

Visit now to see your exposure: https://whiteintel.io

Read Next

Bug Bounty & Research

Discover New Bug Bounty Angles with Leaked Data

How security researchers can leverage dark web intelligence to find critical vulnerabilities.

Ready to Protect Your Digital Assets?

Start monitoring your organization's exposure to credential leaks and dark web threats today.