Stealer logs, and their complex C2C market. Stealer logs, and their complex C2C market. Infostealers and the logs they generate are a hot commodity in the C2C market. Read More The CyberWire July 26, 2023 1 minute read Infostealers and the logs they generate are a hot commodity in the C2C market. Read More The CyberWire About The Author Read moreBuilding cyber skills and roles from CyBOK foundations See author's posts Related Post navigation Previous: ChatGPT for Software Security: How it Assists Attackers & Security AnalystsNext: A malign AI tool: FraudGPT. Stealer logs in the C2C market. Conti and Akira collaboration? Drone strike on GRU offices? Related Stories QuickLens Chrome extension steals crypto, shows ClickFix attack Security Aid February 28, 2026 ClawJacked Flaw Lets Malicious Sites Hijack Local OpenClaw AI Agents via WebSocket Security Aid February 28, 2026 $4.8M in crypto stolen after Korean tax agency exposes wallet seed Security Aid February 28, 2026