🕳️ Vulnerabilities & CVEs

Storm Infostealer: Hackers Now Decrypt Your Passwords on Their Servers

Your next browser login could hand hackers remote control—without them ever cracking it on your PC. Storm infostealer just upped the ante on credential theft.

Storm infostealer control panel displaying stolen browser credentials and crypto wallet data

⚡ Key Takeaways

  • Storm decrypts stolen credentials server-side, dodging endpoint security.
  • Automates session hijacking with tokens and geo-matched proxies.
  • Targets browsers, crypto, messaging—1,715+ logs from global victims.

🧠 What's your take on this?

Cast your vote and see what Threat Digest readers think

Priya Sundaram
Written by

Priya Sundaram

Hardware and infrastructure reporter. Tracks GPU wars, chip design, and the compute economy.

Worth sharing?

Get the best Cybersecurity stories of the week in your inbox — no noise, no spam.

Originally reported by InfoSecurity Magazine

Stay in the loop

The week's most important stories from Threat Digest, delivered once a week.