Surge in infostealer malware in recent months has allowed threat actors to gain access to victim machines. It has become very common for threat actors to spend time in the target environment, harvest confidential information, gain better understanding about the victim's environment and tailor the attack to impose maximum damage, move laterally and escalate privileges to maintain persistence and maximize their revenue.
While Infostealer's primary goal is to harvest confidential information, they also provide remote access capacity allowing users to download and execute additional malware. Usually offered malware-as-a-service (MaaS), Infostealer actors operate a business model in which they offer their malware for a fee allowing anyone to deploy an infostealer.
In this webinar, we are going to focus on Zscaler's detection and protection capabilities against infostealers' data exfiltration. We will also break into their Tactics, Techniques and Procedures (TTP) to understand how the recent surge in infostealer has developed in a never-ending fight.