Video – Dissecting the Dark Web Supply Chain

For as little as $10, unsophisticated threat actors can steal information that allows them to impersonate a victim’s browser fingerprint, gain access to hundreds of unique logins stored in the browser, and potentially bypass corporate 2FA Controls. Seems like a steal? 

With that level of access and quality data, the Infected Device Markets continue to grow on the dark web, clear web, and illicit Telegram channels. In this video, join Flare Director of Marketing, Eric Clay, and CTO, Mathieu Lavoie as they dissect the dark web supply chain. You should expect:

  • A detailed walkthrough of a complex and interconnected dark web supply chain ranging from MaaS vendors selling malware variants to Initial Access Brokers selling access to compromised environments
  • A deep dive into the specialized markets that sell infostealer malware including Russian Market, Genesis Market, as well as specific Telegram channels
  • Insights into how Stealer Malware is distributed, collected, and data is exfiltrated
  • Best practices to mitigate the risk of stealer malware to your organization & improve detection capabilities for listings that may contain logins unique to you
Share This Article

Eric Clay

Marketing Director

Eric Clay has a strong cybersecurity background and significant experience building marketing approaches for SaaS companies. Clay began their career at a B2B marketing agency as an outside consultant for inbound lead gen processes in the cybersecurity and SaaS space and later became CMO at two cybersecurity startups. As Flare’s Marketing Director, Clay works with our marketing team to set and improve marketing strategies and approaches.

Related Content