This page is fully or partially automatically translated.

Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.

action image header it logic
IT Security Talks Stream I

Underground economy and malware as a service. Dangers from stealer malware

We take a look at the underground economy, stealer malware as a potential product and ways to protect yourself.

calendar_today Wed, 12.06.2024, 13:15 - 13:45

event_available Digital

Action Video


Action description





Awareness / Phishing / Fraud Data protection / GDPR Identity and access management


This action is part of the event IT Security Talks

Action Video

grafischer Background

This video is available to the it-sa 365 community. 
Please register or log in with your login data.

Action description

Cybercrime is now based on a tightly organised underground economy. The players operating here are often organisations that are in no way inferior to legal companies in terms of their structure and also have well-structured product ranges. The products on offer include phishing as a service, ransomware as a service and log-in data in a subscription model. One particularly interesting type of ransomware is so-called stealerware, which criminals can use to obtain access data very easily. A particularly large collection of stealerware was the so-called NAZ.API. 

In this presentation, we will shed some light on the structures of the underground economy, explain how credentials are obtained and spread, and look specifically at the structure of stealer logs. Finally, we will discuss how private individuals, companies and platforms can protect themselves against the misuse of stolen access data. 
... read more

Language: German

Questions and Answers: No


This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.