Summary

  • Stealer logs contain sensitive data such as credentials, cookies and other personally identifiable information, which are generated by malware specifically designed to steal this type of data.
  • In this article we define the concepts of stealer logs, how the malware infections the users and the different types of information that can be stolen by the stealer.
  • We also detail the challenges and how to use this type of data to identify Indicators of Compromise (IoC).
  • Finally, we provide a case study where it is shown how the tester can use the stealer logs to uncover vulnerabilities. Gremlin Reliability Engineering, “Subtweeting Our Own Post about Stepper and Chaos Engineering,” 11 July 2023. Online]. [https://www.gremlin.com/blog/subtweeting-our-own-post-about-stepper-and-chaos-engineering/.

By YoKo Kho

Original Article