Stealer logs, and their complex C2C market. Stealer logs, and their complex C2C market. Infostealers and the logs they generate are a hot commodity in the C2C market. Read More The CyberWire July 26, 2023 Infostealers and the logs they generate are a hot commodity in the C2C market. Read More The CyberWire About The Author Read moreBuilding cyber skills and roles from CyBOK foundations See author's posts Related Post navigation Previous: ChatGPT for Software Security: How it Assists Attackers & Security AnalystsNext: A malign AI tool: FraudGPT. Stealer logs in the C2C market. Conti and Akira collaboration? Drone strike on GRU offices? Related Stories China-Linked PlugX and Bookworm Malware Attacks Target Asian Telecom and ASEAN Networks Security Aid September 27, 2025 UN seeks to build consensus on ‘safe, secure and trustworthy’ AI Security Aid September 26, 2025 Researchers Expose SVG and PureRAT Phishing Threats Targeting Ukraine and Vietnam Security Aid September 26, 2025