fraud

Raccoon Infostealer: The Malware Behind Large-Scale Identity Theft Campaigns

May 5, 2026 4 min read
Raccoon Infostealer: The Malware Behind Large-Scale Identity Theft Campaigns

Many cyber incidents do not begin with a visible breach. In many cases, the first compromise happens months earlier when attackers quietly steal credentials from infected devices.

One of the tools frequently used for this purpose is Raccoon Infostealer, a malware designed to extract sensitive data such as passwords, session cookies and financial information.

Understanding how this malware operates helps explain why identity compromise and account takeover continue to grow globally.

What is Raccoon Infostealer

Raccoon Infostealer is a credential-stealing malware first identified in 2019. It quickly became popular in cybercriminal communities due to its low cost and ease of use.

The malware is distributed through a Malware-as-a-Service (MaaS) model, allowing attackers to rent the tool and launch data-theft campaigns without developing their own malware.

Subscriptions have historically cost around:

  • $75 per week
  • $200 per month

This model significantly lowers the barrier to entry for cybercriminal activity.

What Data It Steals

Once installed on a device, the malware scans the system for stored information across browsers and applications.

Commonly stolen data includes:

  • browser-stored credentials
  • session cookies and authentication tokens
  • autofill information
  • credit card data
  • email credentials
  • cryptocurrency wallets
  • device and system information

Raccoon can extract information from more than 60 applications, giving attackers access to multiple digital accounts.

How the Attack Works

The attack chain behind Raccoon is relatively simple but effective.

1. Infection

Victims typically become infected through:

  • phishing emails
  • fake software installers
  • pirated software downloads
  • malvertising campaigns
  • compromised websites

2. Data Collection

Once executed, the malware searches for stored credentials, browser databases and system information.

3. Data Exfiltration

The collected information is sent to a command-and-control server, where attackers can review and download stolen credentials from an administrative dashboard.

Why Infostealers Are So Dangerous

Infostealers operate silently, often without generating noticeable symptoms on the infected device.

Instead of disrupting the system like ransomware, their goal is to collect credentials quietly and continuously.

Stolen credentials are often:

  • sold in underground marketplaces
  • used for account takeover
  • leveraged in later attacks such as corporate breaches or ransomware campaigns.

Many large-scale security incidents start with credentials stolen by infostealers months before the attack becomes visible.

Global Impact

Raccoon Infostealer has had a significant impact since its appearance.

Investigations linked the malware to tens of millions of stolen credentials and infections across hundreds of thousands of systems worldwide.

Its affordability and MaaS model made it one of the most widely distributed credential-stealing tools in cybercrime forums.

Evolution of the Malware

Although development briefly stopped in 2022, the malware quickly returned with Raccoon Stealer 2.0, introducing updated code and improved data-exfiltration capabilities.

Subsequent updates have added new modules and evasion techniques, demonstrating the ongoing evolution of the malware ecosystem.

Impact in Latin America

Infostealer campaigns also affect Latin America, particularly due to:

  • widespread use of pirated software
  • localized phishing campaigns
  • rapid growth of fintech and digital services.

Credentials stolen from users in the region are often sold in global underground marketplaces and later used in fraud operations worldwide.

Why It Matters

The rise of infostealer malware highlights an important shift in digital fraud.

When attackers can reuse stolen credentials or session tokens, traditional authentication mechanisms may not be enough to detect compromised identities.

Organizations increasingly need to evaluate device context, session behavior and interaction patterns to identify risks that appear legitimate at first glance.

Stay Ahead of Fraud

Book a 30-minute meeting with a specialist

Stay ahead of fraud trends Get insights on digital identity and fraud prevention delivered to your inbox

Back to articles