2025-10-31 –, Main Hall
Infostealers are quickly becoming one of the most common attack vectors leading to business compromise. In this talk, I investigate the real-world impact, deployment methods, and source code of infostealers. I also elaborate on what kind of data is actually collected by infostealers (far more than just credentials!), and how said data is distributed and used by criminals. The talk also features insights on Kiwi infostealer data, generated using exclusive access to one of the largest infostealer databases in the world.
A deep dive into how infostealers work, the wide range of data they steal, and how criminals use stolen data, featuring exclusive insights from one of the world’s largest infostealer databases, including unique data from New Zealand cases.
I'm Will, I'm 22 years old, and I'm a pentester based in Wellington. I run a project called restealer (restealer.com), which offers credentials from infostealer logs back to businesses.