The use of Info Stealer Malware is becoming increasingly prevalent in targeting enterprise organisations as threat actors find new techniques to bypass MFA. Info Stealer log data has been leveraged in a number of high profile attacks, globally and in Australia, leading to stricter data privacy legislation and substantial fines for companies operating in the critical infrastructure sector if customer data is exposed as a result of a cyber attack.
As we continue to navigate hybrid forms of work, it’s important to understand precisely how these threat actors work, whether your organisation could be at risk, and how to mitigate the threats of your infrastructure becoming compromised.
Join Peter Watson, Principal Sales Engineer at Recorded Future as he walks through the evolution of Info Stealer Malware , the infection chain, the data they exfiltrate, common variants, and how organisations can detect and defend against Info Stealer Malware in their environments.