Stealer logs, and their complex C2C market. Stealer logs, and their complex C2C market. Infostealers and the logs they generate are a hot commodity in the C2C market. Read More The CyberWire July 26, 2023 Infostealers and the logs they generate are a hot commodity in the C2C market. Read More The CyberWire About The Author Read moreBuilding cyber skills and roles from CyBOK foundations See author's posts Related Post navigation Previous: ChatGPT for Software Security: How it Assists Attackers & Security AnalystsNext: A malign AI tool: FraudGPT. Stealer logs in the C2C market. Conti and Akira collaboration? Drone strike on GRU offices? Related Stories Lumma Stealer Developers Doxxed in Underground Rival Cybercrime Campaign Security Aid October 21, 2025 Google Identifies Three New Russian Malware Families Created by COLDRIVER Hackers Security Aid October 21, 2025 Five New Exploited Bugs Land in CISA’s Catalog — Oracle and Microsoft Among Targets Security Aid October 20, 2025