Video – Dissecting the Dark Web Supply Chain

February 14, 2023

For as little as $10, unsophisticated threat actors can steal information that allows them to impersonate a victim’s browser fingerprint, gain access to hundreds of unique logins stored in the browser, and potentially bypass corporate 2FA Controls. Seems like a steal? 

With that level of access and quality data, the Infected Device Markets continue to grow on the dark web, clear web, and illicit Telegram channels. In this video, join Flare Director of Marketing, Eric Clay, and CTO, Mathieu Lavoie as they dissect the dark web supply chain. You should expect:

  • A detailed walkthrough of a complex and interconnected dark web supply chain ranging from MaaS vendors selling malware variants to Initial Access Brokers selling access to compromised environments
  • A deep dive into the specialized markets that sell infostealer malware including Russian Market, Genesis Market, as well as specific Telegram channels
  • Insights into how Stealer Malware is distributed, collected, and data is exfiltrated
  • Best practices to mitigate the risk of stealer malware to your organization & improve detection capabilities for listings that may contain logins unique to you
Share article

Related Content

View All
From Patch to Exploit: Flare’s Intelligence on Cybercrime After January 2026 Patch Tuesday
12.02.2026

From Patch to Exploit: Flare’s Intelligence on Cybercrime After January 2026 Patch Tuesday

Celebrity Impersonation Scams: Social Engineering Targeting Canadians
11.02.2026

Celebrity Impersonation Scams: Social Engineering Targeting Canadians

09.02.2026

Old-School IRC, New Victims: Inside the Newly Discovered SSHStalker Linux Botnet