The Rising Threat of Infostealer Malware

In this webinar, we discuss Flare’s report – Criminal Hijacking: Profiling Threat Actors and Criminals Using Infostealer Logs, diving into the infostealer ecosystem where threat actors infect both end users and other threat actors to reveal insights directly related into the operations and directives of these attacks, including:

  • A malware campaign concerning “BLTools”, a checker used exclusively by criminals
  • Using infostealer logs to profile a threat actor’s key tactics, techniques, and procedures (TTPs) – Information acquired by stealer logs and the variety of use cases employed by threat actors
  • The complexity of the ecosystem in place to support criminal activity

Stay Up to Date with Infostealer Malware with Flare Academy

Flare Academy can elevate your cybersecurity career. Our (free!) training series are led by experts that cover critical topics such as threat intelligence, operational security, and advanced investigation techniques. You can also earn CPE credits toward your cybersecurity certifications. 

At any point in your career, Flare Academy will enhance your skills and keep you at the forefront of the rapidly evolving cybersecurity landscape. Sign up for the next training here.

Share This Article

Related Content