Report – The Legal Cyberthreat Landscape

Ransomware attacks have increased by more than 100% across all industries from 2022 to 2023. The legal sector is especially at risk due to the sensitive nature of information that law firms hold.  Our research into how at-risk law firms are with two primary measures: Learn more about changes to legal risk over time and […]

Report – Stealer Logs & Corporate Access

Stealer Logs & Corporate Access

There’s been a surge of infostealer malware variants such as RedLine, Aurora, Raccoon, Vidar, and more, over the last few years. As described in the name, this type of malware steals information from the devices they infect. To better understand the threat of infostealer malware, we analyzed trends of 19.6 million stealer logs such as: […]

Report – The Typology of Illicit Telegram Channels

Threat actors always seek out new ways to carry out their cybercrimes more easily and cheaply. Previously, cybercriminals flocked to the dark and deep web, but, instant messaging platforms like Telegram are gaining traction. Illicit Telegram channels are a growing issue, as threat actors see them as more anonymous and secure areas for communication. Read […]

Report – Infected Devices and Healthcare in 2023

stealer malware flare

One of the greatest cybersecurity challenges in 2023 is infostealer malware (or “stealer malware”) and infected device markets. Malicious actors infect devices through stealer malware variants such as RedLine, Raccoon, Vidar, and more, then sell the data they extract. Infected device pricing varies based on multiple factors, and those containing protected health information (PHI) are […]

Report – Dissecting the Dark Web Stealer Malware Lifecycle with the MITRE ATT&CK Framework

The right side of the image has a drawn raccoon with a black and red mysterious background. On the right is a dark navy background. At the top is a red oval with the text "Report" and below is white text "Dissecting the Dark Web Stealer Malware Lifecycle with the MITRE ATT&CK Framework." Below that is white text "Learn More" with a red arrow pointing down.

Stealer malware is a type of Remote Access Trojan (RAT) that infects computers, then extracts sensitive information, which threat actors then sell. The final malicious actor in the stealer malware supply chain can take advantage of the stealer logs to facilitate account takeover attacks, financial fraud, and ransomware.  Learn more about the stealer malware lifecycle:

Report – Clear Insights from a Deep Analysis of Dark Web Leaked Credentials

dark web leaked credentials

The number of stolen credentials on the dark web continues to grow, nearing 10 billion unique username-password combinations (removing duplicates and combo lists). We analyzed the various trends of stolen credentials for sale from across eight industries. Findings from our investigation include: Dive into findings from analyzing 10 billion leaked credentials:

Report – The Stealer Malware Ecosystem: A Detailed Analysis of How Infected Devices Are Sold and Exploited on the Dark and Clear Web

research report stealer malware ecosystem

Infected devices (including botnets and stealer logs) pose a great threat for both personal and corporate devices. Cybercriminals can purchase infected devices on the Genesis and Russian Markets to pursue account takeovers, make fraudulent purchases, or gain access to bank accounts.  Botnets are computers that malware has infected to steal the information stored in web […]

Dark0de: 2021’s Darknet Market Leader

Dark0de: 2021’s Darknet Market Leader

Dark0de: 2021’s Darknet Market Leader On October 1st, 2021, White House Market, the biggest Darknet Market (DNM) at the time, announced its retirement from the darknet market scene on Dread. Since then, there has been some speculation as to which market will take the number one spot.  Let’s look at what the current darknet market […]