
Click Here 138. Almost every cyber attack begins with a key ingredient: an Infostealer
15 snips
Jun 11, 2024 Alleged co-founder of the Meduza infostealer reveals how these stealthy malware sneak into computers, steal logins and passwords, and vanish without a trace. The podcast also explores cybercrime supply chains, info-stealer families like Redline and Medusa, and the emergence of info-stealers targeting valuable data like cryptocurrency wallets.
AI Snips
Chapters
Transcript
Episode notes
Infostealers Start Cyber Attacks
- Infostealer malware is the covert start to nearly every cyberattack by stealing credentials silently.
- It deletes itself after stealing, leaving victims unaware of the breach.
Airbus Breach Via Turkish Airlines
- A Turkish Airlines employee unwittingly downloaded Redline infostealer malware.
- This breach allowed hackers to access Airbus data using stolen credentials.
Cybercrime Supply Chain Role
- Infostealers enable a cybercrime supply chain by providing stolen network access.
- Different criminals specialize in steps like initial access, scanning, and ransomware deployment.

