A View Into A Hacker’s Windows
operated by a Nigerian cybercriminal. Through forensic analysis and intelligence collected from an infected system, we gain rare visibility into how threat actors actually work — from the vantage point of their own desktop.
The presentation walks through the full lifecycle of the attack: starting with reconnaissance and target profiling, followed by the setup of the attack infrastructure, the deployment of infostealers, and finally the monetization of stolen data. Attendees will be introduced to the actual tools, scripts, and platforms used by the attacker, including stealer malware, and Telegram channels.
Real screenshots, logs, and behavioral data will illustrate how the attacker tests malware, automates credential theft, and orchestrates scams across different regions. We will also examine the reuse of infrastructure, operational mistakes, and indicators of compromise (IOCs) that can support detection.
This talk is designed to bridge the gap between technical analysis and adversarial mindset. By understanding how threat actors plan, execute, and profit from attacks, defenders can enhance their ability to detect threats early, anticipate adversarial moves, and build more resilient cybersecurity strategies. The session is especially valuable for threat intelligence teams, SOC analysts, incident responders, and fraud investigators.