- Status Closed
-
Assigned To
cbay - Private
Opened by niss - 24.06.2025
Last edited by cbay - 24.06.2025
FS#186 - Leaked Credentials belonging to customers leaked in [Stealer Logs]
Description:
I am doing research related to malware attacks and subsequent attacks on organizations. As far as you know, such attacks were committed against many large companies such as Uber, activision, rockstar, and others.
That might be helpful. Please check that as it can explain most of your questions
https://twitter.com/cglyer/status/1570965878480719873
https://medium.com/@group-ib/what-group-ib-found-about-the-uber-hack-c47cad571ea8
Recently there has been a surge in stolen logs for sale commonly known as Stealer Logs
Stealer logs are malware that is designed to seize login credentials, cookies and files from compromised systems. They work by silently working in the background and exfiltrating the data to an attacker's server.
Several variants of infostealer malware exist, but the primary groups we often encounter are Redline, Raccoon, Vidar, and LummaC2.
During my recent research of analyzing Stealer Logs from various sources, I identified that various credentials belonging to your organisation are leaked.
Intel Source:
IntelX and Telegram Monitoring
It's also important to note that in the event that some of the aforementioned passwords/credentials are no longer working, if the malware is still present on device, then all the accounts should still be considered compromised - My malware logs are not fully up to date and rely on threat intel sources making them available.
Impact
References:
https://flare.io/learn/resources/stealer-logs-and-corporate-access/
https://datadome.co/learning-center/what-is-otp-bot/
https://flare.io/learn/resources/blog/otp-bots/
- Implement mandatory credential rotation protocols.
- Thoroughly examine computing systems for any lingering malware presence.
- Institute Two-Factor Authentication (2FA) across all provided services without exception.
- Deploy a robust password management mechanism ensuring the encryption of stored passwords.
- Provide comprehensive guidance to users on refraining from engaging with unsolicited hyperlinks.
- Disseminate information discouraging the installation of unverified software.
- Foster awareness among users regarding the risks associated with accessing corporate services via non-corporate devices.
- Conduct routine validation exercises by cross-referencing compromised password datasets against the user database to preempt Account Takeover (ATO) incidents.
- Implement a DarkWeb Monitoring Service to capture any exposed logs/credentials/cookies etc.https://[[https://[[https://]]]]
Loading...
Available keyboard shortcuts
- Alt + ⇧ Shift + l Login Dialog / Logout
- Alt + ⇧ Shift + a Add new task
- Alt + ⇧ Shift + m My searches
- Alt + ⇧ Shift + t focus taskid search
Tasklist
- o open selected task
- j move cursor down
- k move cursor up
Task Details
- n Next task
- p Previous task
- Alt + ⇧ Shift + e ↵ Enter Edit this task
- Alt + ⇧ Shift + w watch task
- Alt + ⇧ Shift + y Close Task
Task Editing
- Alt + ⇧ Shift + s save task
[REDACTED]