A threat actor has allegedly posted an advertisement on a dark web forum claiming to possess approximately 10GB of stolen login credentials. According to the post, the individual is purportedly selling these “stealer logs” for $100.
The alleged data cache is claimed to contain plain text URLs, usernames, and passwords from various sectors, including what the seller describes as government, defense, military, corporate, and cryptocurrency accounts.
The threat actor reportedly offers potential buyers a “free trial” through a Telegram bot and claims to support escrow payments for transactions. The alleged seller has also shared contact information via Telegram.
Credential stealing malware, often referred to as “stealers,” has become increasingly prevalent in cybercriminal markets. These malicious tools typically harvest saved passwords and authentication tokens from victims’ browsers and applications.