Chasing A Ghost: A PXA Stealer Story (Webinar Replay)

Attackers are evolving – but so are defenders.

In this Black Hat sponsored webinar replay, Beazley Security experts Francisco Donoso and Bobby Venal take you behind the scenes of a real-world infostealer campaign that was designed to evade even the sharpest eyes.

This wasn’t just any infostealer, this was an innovative threat actor’s attack campaign wrapped in layered deception, misdirection, and obfuscation. After the threat actor behind PXA stealer attacked one of our clients, the Beazley Security Labs team was hot on the trail. One operational slipup exposed their infrastructure, tactics, and tooling. During this session Fran and Bobby will tell all, including late breaking insights and share what the attacker saw when developing and testing their malware.

What you’ll learn:

  • The multi-stage code-loading and deception tactics used to deliver the original payload
  • How detection gaps were exploited (and how we worked with our partners to close them)
  • The key mistake the attacker made and how it enabled our team to get deeper insights into the operation
  • Real-world analysis of threat tradecraft and the infostealer ecosystem

In this Black Hat sponsored webinar replay, Beazley Security experts Francisco Donoso and Bobby Venal take you behind the scenes of a real-world infostealer campaign that was designed to evade even the sharpest eyes.

This wasn’t just any infostealer, this was an innovative threat actor’s attack campaign wrapped in layered deception, misdirection, and obfuscation. After the threat actor behind PXA stealer attacked one of our clients, the Beazley Security Labs team was hot on the trail. One operational slipup exposed their infrastructure, tactics, and tooling. During this session Fran and Bobby will tell all, including late breaking insights and share what the attacker saw when developing and testing their malware.

What you’ll learn:

  • The multi-stage code-loading and deception tactics used to deliver the original payload
  • How detection gaps were exploited (and how we worked with our partners to close them)
  • The key mistake the attacker made and how it enabled our team to get deeper insights into the operation
  • Real-world analysis of threat tradecraft and the infostealer ecosystem

No items found.

Learn more

For more on the critical cybersecurity controls you should be using and how they can protect your organization, replay the webinar on demand at:

Top Threats for 2025 (Webinar Replay)

watch webinar

Beazley Security can help protect you

We offer services and solutions to help you prepare and stay resilient in the changing threat landscape. Prepare to learn more about how we can help you

Visit Solutions