"Dissecting the Dark Web Supply Chain: Stealer Logs in Context"

Stealer logs are one of the main threat vectors for today's companies, but many security teams continue to focus on leaked credentials and are unaware of the significant threat posed by devices infected with infostealer malware. There are numerous variants of infostealer malware, but Redline, Raccoon, Vidar, and Titan are the most commonly encountered groups. This malware infects computers and exports passwords stored in the browser, as well as host data such as operating system version, IP address, clipboard data, browser history, saved credit cards, and cryptocurrency wallet data. The malware then sends this information back to the threat actor's command-and-control (C2) infrastructure. It is then distributed through specialized cybercrime Telegram channels or sold as individual listings on dark web marketplaces. This article continues to discuss stealer logs.

Bleeping Computer reports "Dissecting the Dark Web Supply Chain: Stealer Logs in Context"

Submitted by Anonymous on