Utiliser les fichiers cleptogiciels pour produire du renseignement avancé sur les cybermenaces

11 février 2025

More than 1 million users are infected every week from infostealer malware, leading to account takeovers through stolen credentials and session cookies. Over 80 million stealer logs have been circulated in various dark web forums, chats, and marketplaces, enabling attackers to log directly into corporate and customer accounts through bypassing 2FA and other security controls – potentially exposing organizations to major security breaches.

In this session, we’ll reveal threat actor TTPs, the complexity of the cybercrime ecosystem, what information a stealer log captures, and how you can use that to your advantage in your threat intelligence reporting and threat mitigation processes to strengthen your security posture.

Threat Intelligence and Flare

La fusée Gestion de l'exposition aux menaces (TEM) solution empowers organizations to proactively detect, prioritize, and mitigate the types of exposures commonly exploited by threat actors. Our platform automatically scans the clear & dark web and prominent threat actor communities 24/7 to discover unknown events, prioritize risks, and deliver actionable intelligence you can use instantly to improve security.

Flare s'intègre à votre programme de sécurité en 30 minutes et remplace souvent plusieurs outils SaaS et open source. Apprenez-en davantage en vous inscrivant à notre essai gratuit.

Partager l'article

Publications connexes

Tout voir
How Gamers Became Cybercrime's Favorite Target: Analysis of 50,000 Infostealer Infections
25.11.2025

La façon dont les « gamers » sont devenus la cible favorite des cybercriminels: une analyse de 50,000 infections par cleptogiciel

state of the dark web 2025 Flare
25.11.2025

Panel: l'état du Web clandestin en 2025

04.03.2025

Partie 2: la montée des usurpations de sessions en 2025 et la prévention pour sécuriser les comptes clients