Free webinar
April 4, 4PM CET

Stealer Logs for Investigations:

A New Era in OSINT

Sonya Oronova
Product Manager,
Social Links
Lindsay Whyte
Regional Director, 

Constella Intelligence
Dan Mathews
Global Head of Sales Engineering,
Constella Intelligence

Join leading OSINT vendor, Social Links, and expert provider of stealer logs and leaked data, Constella Intelligence, on April 4, 4PM CET for the free webinar Stealer Logs for Investigations: A New Era in OSINT. Learn how stealer logs and data breaches can be used to make breakthroughs in cases where traditional methods fail.

For the first time ever, we’ll be showing how the worlds of OSINT and stealer logs can be combined in a single investigative space. We’ll be sharing a unique algorithm that uses data from both open sources and infostealers, allowing investigators to find the crucial leads they need.

What You Will Explore

How can browser history and device-stored passwords be extracted using an email?
How can a phone number be linked to an email, name, and physical address?
How can the owner of a cryptocurrency wallet be deanonymized?
How can data from infected devices be applied, as illustrated through case studies?

AGENDA

Infostealers and Data Breaches:
Key Investigative Uses

Application of breached identity data in various investigations, from person-of-interest cases to organization exposure checks.

Stealer Logs: A Deep Dive

  • Extracting stealer log data: device serial numbers, browser history, emails, and passwords.
  • How one infected device can affect a whole family.
  • How crucial financial and crypto information ends up in stealer logs.
  • Organization departments that are most critical to monitor for exposure.
Sometimes, a leak from a small food delivery service provides the link you need to resolve your case

Combining Stealer Logs 

and Data Leaks with OSINT

Utilizing leaks from the Dark Web to enhance regular Surface Web investigations—even when the subject isn’t a darknet user.
Sometimes, a leak from a small food delivery service provides the link you need to resolve your case.

Case Studies: 

From Theory to Practice

A look at real-world examples and investigative steps, showing how the combination of open data and stealer logs can transform any type of investigation.
The combined expertise of Social Links and Constella Intelligence have gone into the preparation of these cases studies.

Q&A SESSION

Your chance to ask our specialists any questions you have about investigation processes.

Register for free

Thank you for request!
¡Uy! Algo salió mal al enviar el formulario.

speakers

Sonya Oronova
Product Manager,
Social Links
Lindsay Whyte
Regional Director, 

Constella Intelligence
Dan Mathews
Global Head of Sales Engineering,
Constella Intelligence