LLM Identifies Info Stealer Vector & Extracts IoCs
Olivier Bilodeau, Estelle Ruellan
DEF CON 33 · Day 1 · Main Stage
Information stealers are among the most damaging commodity malware families in circulation today. They silently harvest credentials, cryptocurrency wallets, and any other extractable data from infecte
AI review
Clever inversion of infostealer telemetry — using victims' own infection screenshots as threat intel at scale via LLM — but the technical depth is in the pipeline engineering, not in novel security primitives.