Hackers could break into your network the hard way…or just use infostealers to steal credentials and access tokens to log in.
Infostealers have gotten *pretty* popular (they were the #1 threat in our 2024 Cyber Threat Report!) In this episode of Tradecraft Tuesday, we’re looking at the lifecycle of infostealers and walking through their operational pipeline from marketplace to deployment.
You’ll get a close look at the web of infostealer variants out there and how they’ve evolved over time. We’ll also discuss recent events—like the source code leak of Banshee stealer and the law enforcement takedown of the Cracked and Nulled cybercrime marketplaces—and what that all means for infostealers in the future.