Islamabad
Financial cyberthreats shifting toward credential theft and data reuse. According to Kaspersky Digital Footprint Intelligence (DFI), in 2025 over one million online banking accounts served by the world’s 100 largest banks fell victim to infostealers: credentials for these accounts were being freely shared on the dark web. The countries with the highest median number of compromised accounts per bank were India, Spain, and Brazil.
74% of payment cards that were compromised by infostealer malware, published on dark web resources and identified by Kaspersky DFI team in 2025, remained valid as of March 2026. This means that attackers could still use cards that had been stolen months or even years prior.
Attackers are moving away from traditional PC banking malware and increasingly relying on social engineering and dark web marketplaces, while mobile financial malware continues to grow.
In 2025, the decline in users affected by financial PC malware continued as users increasingly rely on mobile devices to manage their finances. Contrary to PC banking malware, mobile banker attacks grew by 1.5 times in 2025 compared to the previous year. Detailed information on current financial cyberthreat trends is available in Kaspersky’s new report.
Traditional financial phishing has not gone away. Pages that mimicked e-shops dominated the financial phishing landscape with 48.5% in 2025, up 10.3% from 2024, followed by banks with 26.1% in 2025, down by 16.5% from 2024 and payment systems with 25.5% share in 2025, up by 6.2% from 2024.
Attackers are adapting campaigns to regional digital habits. In the Middle East, financial phishing is overwhelmingly concentrated on e-commerce with 85.8%, indicating a heavy reliance on online retail lures, whereas in Africa bank-related phishing leads with 53.75% which may indicate that user account security there is still insufficient. Latin America shows a more balanced distribution but with a higher share of e-commerce and bank targeting, while APAC and Europe display a more even spread across all three categories, pointing to diversified attack strategies.
The distribution of detections of financial phishing pages by category
(banks/online stores/payment systems), globally and per region, 2025
Complementing traditional financial malware, infostealers played a significant role in enabling financial crime both on PCs and mobile devices by harvesting login credentials, cookies, bank card numbers, crypto wallet seed phrases, and autofill data from browsers and applications, which attackers then used for account takeovers or direct banking fraud. Kaspersky data pointed to a surge in infostealer detections which is up by 59% globally, 53% in Africa and 26% in the Middle East, on PCs from 2024 to 2025 fueling credential-based attacks.
“The dark web has become a central hub for financial cybercrime. Stolen credentials and bank cards that have been harvested by infostealers are aggregated, repackaged, and sold there, while phishing kits targeted at users of financial products are offered as ready-to-use services. This creates a self-sustaining ecosystem where data theft and fraud operations reinforce each other, making attacks scalable and easy to carry out by fraudsters with minimal experience. Breaking this cycle requires proactive threat intelligence on the part of organizations, and increased awareness and scrutiny from individual users,” comments Polina Tretyak, Kaspersky Digital Footprint Intelligence analyst.
Kaspersky recommends that individual users should not follow links from suspicious messages and double-check web pages before entering your credentials or banking card details. Use multifactor authentication where possible, create strong unique passwords and safely store them in a password manager.
To protect yourself from fake e-shops and phishing pages have a reliable security solution installed. For example, Kaspersky Premium protects users from fraudulent online stores and phishing websites through advanced detection technology that analyzes website characteristics and URLs to identify suspicious patterns.
Kaspersky recommends that businesses should assess the entire infrastructure, fix vulnerabilities, and consider external specialists for fresh perspectives that reveal concealed risks. Deploy integrated platforms to monitor and control all attack vectors with rapid detection and swift response across the organization. Solutions from the Kaspersky Next product line can help with this, as they provide real-time protection, threat visibility, investigation, and EDR/XDR capabilities scalable to organizations of any size and in any industry. Continuous monitoring of dark web resources using Kaspersky’s Digital Footprint Intelligence service will significantly improve the coverage of various sources of potential threats, and allows customers to track threat actor’s plans and trends in their activities.
Detailed information is available in the full report on Securelist.


