The Rising Threat of Infostealer Malware

In this webinar, we discuss Flare’s report – Criminal Hijacking: Profiling Threat Actors and Criminals Using Infostealer Logs, diving into the infostealer ecosystem where threat actors infect both end users and other threat actors to reveal insights directly related into the operations and directives of these attacks, including:

  • A malware campaign concerning “BLTools”, a checker used exclusively by criminals
  • Using infostealer logs to profile a threat actor’s key tactics, techniques, and procedures (TTPs) – Information acquired by stealer logs and the variety of use cases employed by threat actors
  • The complexity of the ecosystem in place to support criminal activity
Partager cet article

Rubriques connexes