Using Infostealer Logs for Advanced Threat Intelligence Work

More than 1 million users are infected every week from infostealer malware, leading to account takeovers through stolen credentials and session cookies. Over 80 million stealer logs have been circulated in various dark web forums, chats, and marketplaces, enabling attackers to log directly into corporate and customer accounts through bypassing 2FA and other security controls – potentially exposing organizations to major security breaches.

In this session, we’ll reveal threat actor TTPs, the complexity of the cybercrime ecosystem, what information a stealer log captures, and how you can use that to your advantage in your threat intelligence reporting and threat mitigation processes to strengthen your security posture.

Threat Intelligence and Flare

The Flare Threat Exposure Management (TEM) solution empowers organizations to proactively detect, prioritize, and mitigate the types of exposures commonly exploited by threat actors. Our platform automatically scans the clear & dark web and prominent threat actor communities 24/7 to discover unknown events, prioritize risks, and deliver actionable intelligence you can use instantly to improve security.

Flare integrates into your security program in 30 minutes and often replaces several SaaS and open source tools. Learn more by signing up for our free trial.

Share This Article

Related Content