LLM Identifies Info Stealer Vector & Extracts IoCs

Olivier Bilodeau, Estelle Ruellan

DEF CON 33 · Day 1 · Main Stage

Information stealers are among the most damaging commodity malware families in circulation today. They silently harvest credentials, cryptocurrency wallets, and any other extractable data from infecte

AI review

Clever inversion of infostealer telemetry — using victims' own infection screenshots as threat intel at scale via LLM — but the technical depth is in the pipeline engineering, not in novel security primitives.

Watch on YouTube