Stealer logs, and their complex C2C market. Stealer logs, and their complex C2C market. Infostealers and the logs they generate are a hot commodity in the C2C market. Read More The CyberWire July 26, 2023 1 minute read Infostealers and the logs they generate are a hot commodity in the C2C market. Read More The CyberWire About The Author Read moreBuilding cyber skills and roles from CyBOK foundations See author's posts Related Post navigation Previous: ChatGPT for Software Security: How it Assists Attackers & Security AnalystsNext: A malign AI tool: FraudGPT. Stealer logs in the C2C market. Conti and Akira collaboration? Drone strike on GRU offices? Related Stories Iran-Linked Hackers Breach FBI Director’s Personal Email, Hit Stryker With Wiper Attack Security Aid March 28, 2026 New Infinity Stealer malware grabs macOS data via ClickFix lures Security Aid March 28, 2026 Cloudflare-Themed ClickFix Attack Drops Infiniti Stealer on Macs Security Aid March 28, 2026