9 Comments
User's avatar
nina's avatar

very insightful! thank you for sharing. feels like cleaning under a dirty carpet. we need more of this work.

Expand full comment
Nitish Chandan's avatar

Thanks for sharing this interesting approach to investigating infostealer data. Really insightful!

Expand full comment
Paul Caloca - EssentialRiskMgt's avatar

People forget we leave digital breadcrumbs wherever we go online. All it takes is a few tools and an inquisitive mind to put the pieces together.

Expand full comment
Mr. J. Citizen's avatar

Well done!

Expand full comment
Alon Gal's avatar

Very interesting, I am featuring it on Infostealers.com, thanks for sharing this important work!

Expand full comment
Arden's avatar

Thanks for sharing!

Expand full comment
Chaotic Good's avatar

This was oddly disturbing, yet satisfying. Thank you for the lesson, definitely informed some of my work.

Expand full comment
Voodoo Tomato 🍅's avatar

Can you tell me where you found the data on the stealer logs? I know it's on the dark web, but can you explain the process you use to search for stealer logs that would have the domains of these CSAM sites etc.? It is a great read you wrote up, but I cannot mirror this technique because I have no idea how to get the info from the stealer logs to search and analyze it.

Expand full comment
Voodoo Tomato 🍅's avatar

Is it legal to use a infostealer malware on a CSAM or any darkweb site? Not that I am defending them, I just don't want them to charge me with a crime even if they are.

Expand full comment