Click Here

138. Almost every cyber attack begins with a key ingredient: an Infostealer

15 snips
Jun 11, 2024
Alleged co-founder of the Meduza infostealer reveals how these stealthy malware sneak into computers, steal logins and passwords, and vanish without a trace. The podcast also explores cybercrime supply chains, info-stealer families like Redline and Medusa, and the emergence of info-stealers targeting valuable data like cryptocurrency wallets.
Ask episode
AI Snips
Chapters
Transcript
Episode notes
INSIGHT

Infostealers Start Cyber Attacks

  • Infostealer malware is the covert start to nearly every cyberattack by stealing credentials silently.
  • It deletes itself after stealing, leaving victims unaware of the breach.
ANECDOTE

Airbus Breach Via Turkish Airlines

  • A Turkish Airlines employee unwittingly downloaded Redline infostealer malware.
  • This breach allowed hackers to access Airbus data using stolen credentials.
INSIGHT

Cybercrime Supply Chain Role

  • Infostealers enable a cybercrime supply chain by providing stolen network access.
  • Different criminals specialize in steps like initial access, scanning, and ransomware deployment.
Get the Snipd Podcast app to discover more snips from this episode
Get the app