Over 400,000 corporate credentials stolen by info-stealing malware

Share:

The analysis of nearly 20 million information-stealing malware logs sold on the dark web and Telegram channels revealed that they had achieved significant infiltration into business environments.

Information stealers are malware that steals data stored in applications such as web browsers, email clients, instant messengers, cryptocurrency wallets, FTP clients, and gaming services. The stolen information is packaged into archives called ‘logs,’ which are then uploaded back to the threat actor for use in attacks or sold on cybercrime marketplaces.

The most prominent information-stealing families are Redline, Raccoon, Titan, Aurora, and Vidar, offered to cyber criminals on a subscription-based model, allowing them to conduct malware campaigns that steal data from infected devices.

While information stealers primarily target careless internet users who download software, such as cracks, warez, game cheats, and fake software from dubious sources, it has also been found to have a massive impact on corporate environments.

This is because employees use personal devices for work or access personal stuff from work computers, resulting in many info-stealer infections stealing business credentials and authentication cookies.

More specifically, as cybersecurity firm Flare explains in a new report shared with BleepingComputer, there are approximately 375,000 logs containing access to business applications such as Salesforce, Hubspot, Quickbooks, AWS, GCP, Okta, and DocuSign.

More specifically, Flare found the following in the examined stealer logs:

  • 179,000 AWS Console credentials
  • 2,300 Google Cloud credentials
  • 64,500 DocuSign credentials
  • 15,500 QuickBooks credentials
  • 23,000 Salesforce credentials
  • 66,000 CRM credentials

In addition to the above, there are about 48,000 logs that include access to “okta.com,” an enterprise-grade identity management service used by organizations for cloud and on-premise user authentication.

Most of these logs (74%) were posted on Telegram channels, while 25% were seen on Russian-speaking marketplaces, like the ‘Russian Market.’

“Logs containing corporate access were over-represented on Russian Market and VIP Telegram channels, indicating that the methods attackers use to harvest logs may incidentally or intentionally have more corporate targeting,” describes the Flare report.

“Additionally, public Telegram channels may deliberately post lower value logs, saving high-value logs for paying customers.”

Source of logs containing business account info
Source of logs containing business account info (Flare)

Flare also found more than 200,000 stealer logs containing OpenAI credentials, which is double the amount that Group-IB reported recently and constitutes a risk for leaking proprietary information, internal business strategies, source code, and more.

Corporate credentials are considered “tier-1” logs, making them particularly high-valued in the cybercrime underground, where they are sold on private Telegram channels or forums like Exploit and XSS.

That value is derived from the potential profit cybercriminals can make by leveraging compromised credentials to access CRMs, RDP, VPNs, and SaaS applications and then using that access to deploy stealthy backdoors, ransomware, and other payloads.

“Based on evidence from the dark web forum Exploit in, we rate it as highly likely that initial access brokers are using stealer logs as a principal source to gain an initial foothold to corporate environments that can then be auctioned off on top-tier dark web forums,” explains Flare researcher Eric Clay.

It is recommended that businesses minimize the risk of info-stealer malware infections by imposing the use of password managers, enforcing multi-factor authentication, and setting strict controls on personal device use.

Furthermore, employees should be trained to identify and avoid common infection channels such as malicious Google Ads, YouTube videos, and Facebook posts.

 

(c) Sergiu Gatlan

Leave a Comment

Your email address will not be published. Required fields are marked *

loader-image
London, GB
10:39 am, May 18, 2025
weather icon 12°C
L: 11° | H: 14°
scattered clouds
Humidity: 68 %
Pressure: 1021 mb
Wind: 4 mph N
Wind Gust: 8 mph
UV Index: 0
Precipitation: 0 mm
Clouds: 26%
Rain Chance: 0%
Visibility: 10 km
Sunrise: 5:04 am
Sunset: 8:49 pm
DailyHourly
Daily ForecastHourly Forecast
Today 10:00 pm
weather icon
11° | 14°°C 0 mm 0% 8 mph 64 % 1020 mb 0 mm/h
Tomorrow 10:00 pm
weather icon
9° | 19°°C 0.2 mm 20% 12 mph 80 % 1022 mb 0 mm/h
Tue May 20 10:00 pm
weather icon
9° | 21°°C 0 mm 0% 8 mph 71 % 1023 mb 0 mm/h
Wed May 21 10:00 pm
weather icon
12° | 18°°C 1 mm 100% 7 mph 89 % 1020 mb 0 mm/h
Thu May 22 10:00 pm
weather icon
9° | 19°°C 0 mm 0% 8 mph 59 % 1022 mb 0 mm/h
Today 1:00 pm
weather icon
13° | 15°°C 0 mm 0% 8 mph 62 % 1020 mb 0 mm/h
Today 4:00 pm
weather icon
16° | 18°°C 0 mm 0% 8 mph 49 % 1019 mb 0 mm/h
Today 7:00 pm
weather icon
16° | 16°°C 0 mm 0% 7 mph 47 % 1019 mb 0 mm/h
Today 10:00 pm
weather icon
13° | 13°°C 0 mm 0% 7 mph 64 % 1020 mb 0 mm/h
Tomorrow 1:00 am
weather icon
12° | 12°°C 0 mm 0% 7 mph 71 % 1020 mb 0 mm/h
Tomorrow 4:00 am
weather icon
9° | 9°°C 0 mm 0% 6 mph 80 % 1021 mb 0 mm/h
Tomorrow 7:00 am
weather icon
10° | 10°°C 0 mm 0% 6 mph 74 % 1021 mb 0 mm/h
Tomorrow 10:00 am
weather icon
16° | 16°°C 0 mm 0% 8 mph 55 % 1021 mb 0 mm/h
Name Price24H (%)
Bitcoin(BTC)
€93,162.81
0.90%
Ethereum(ETH)
€2,257.10
1.66%
Tether(USDT)
€0.90
0.00%
XRP(XRP)
€2.15
1.28%
Solana(SOL)
€153.46
1.98%
USDC(USDC)
€0.90
0.00%
Dogecoin(DOGE)
€0.200747
4.01%
Shiba Inu(SHIB)
€0.000013
4.62%
Pepe(PEPE)
€0.000012
7.37%
Peanut the Squirrel(PNUT)
€0.321460
25.80%
Scroll to Top