Video – Dissecting the Dark Web Supply Chain

For as little as $10, unsophisticated threat actors can steal information that allows them to impersonate a victim’s browser fingerprint, gain access to hundreds of unique logins stored in the browser, and potentially bypass corporate 2FA Controls. Seems like a steal? 

With that level of access and quality data, the Infected Device Markets continue to grow on the dark web, clear web, and illicit Telegram channels. In this video, join Flare Director of Marketing, Eric Clay, and CTO, Mathieu Lavoie as they dissect the dark web supply chain. You should expect:

  • A detailed walkthrough of a complex and interconnected dark web supply chain ranging from MaaS vendors selling malware variants to Initial Access Brokers selling access to compromised environments
  • A deep dive into the specialized markets that sell infostealer malware including Russian Market, Genesis Market, as well as specific Telegram channels
  • Insights into how Stealer Malware is distributed, collected, and data is exfiltrated
  • Best practices to mitigate the risk of stealer malware to your organization & improve detection capabilities for listings that may contain logins unique to you
Share This Article

Eric Clay

Related Content