Infostealers are an increasingly popular tool for collecting personal data and gaining unauthorized access. These logs are then tested by Initial Access Brokers (IABs) and the best access is sold on the dark web as entry points into an organization’s network, often for less than $10. This access can be used by other criminals to launch attacks such as ransomware against the organization.
Watch to witness this criminal supply chain in action, where we’ll show you a real-world example of where an Initial Access Broker was selling access to a government agency and a major enterprise company. Gain valuable insights into infostealers like Rhadamanthys, and receive guidance on identifying and safeguarding against criminals attempting to sell access into your organization’s critical infrastructure on the dark web.
- How the dark web is used by cybercriminals to sell access
- Examples where enterprises and government agencies have been targets of IABs
- Defensive strategies, like monitoring dark web traffic, forums, and marketplaces
- How you can track infostealers and identify breached credentials on the dark web
Senior Threat Intelligence Engineer at Searchlight Cyber
General Manager, US at Searchlight Cyber
Head of Product Marketing at Searchlight Cyber