Skip to content

Compromised Computers

ShadowMap identifies corporate machines that appear in stealer log data, indicating active or recent malware infections on your network. This view presents the same stealer log intelligence as Compromised Users, but aggregated by machine rather than by user -- helping you identify infected endpoints and scope the remediation effort.

Overview

Compromised Computers

Understanding the Data

Each entry represents a unique machine identified in stealer logs. The data comes from info-stealer malware (Redline, Raccoon, Vidar, Lumma, etc.) that fingerprints the infected device alongside the stolen credentials.

FieldDescription
Computer NameMachine hostname or hardware fingerprint extracted from the stealer log
SubdomainThe corporate subdomain associated with the stolen credentials
Credential CountNumber of credentials harvested from this machine -- higher counts indicate the user had saved passwords for many services
Stealer FamilyThe malware variant that infected the machine (e.g., Redline, Raccoon, Vidar, Lumma)
IP AddressThe machine's IP address at the time of infection
ExecutivesWhether the compromised user is flagged as an executive
First/Last SeenWhen the stealer log data was first and most recently observed in dark web sources

Filters

  • Search -- Filter by computer name or subdomain
  • Date range -- Filter by when the stealer log was seen
  • Executives -- Show only machines used by executives
  • IP -- Filter by specific IP addresses
  • Stealer Family -- Filter by malware variant

Actions

  • Workflow status -- Mark findings as Action Taken, False Positive, or revert to Needs Action
  • Bulk actions -- Select multiple machines and change status in batch
  • Share via Integration -- Push to your ticketing system, SIEM, or messaging platform
  • Export -- Download filtered results as CSV

Incident Response Playbook

Phase 1: Immediate Containment

  1. Isolate the affected machine from the network immediately. Do not simply disconnect -- use your EDR or MDM to enforce network quarantine so the device cannot communicate laterally or with C2 servers.
  2. Revoke all sessions for every user who logged into this machine. Info-stealers capture session cookies that bypass MFA.
  3. Reset all credentials that were used on the machine. The stealer log captures every saved password in every browser -- check the corresponding Compromised Users entries for the full list.

Phase 2: Investigation

  1. Identify the infection vector -- Check email logs, download history, and EDR alerts around the first-seen date. Common vectors: phishing emails with malicious attachments, drive-by downloads, cracked software.
  2. Scope the blast radius -- Were any shared credentials (admin accounts, service accounts) used on this machine? Check if other machines in the same network segment show similar indicators.
  3. Review access logs -- Search your SIEM for the machine's hostname and IP to identify any lateral movement or data exfiltration.

Phase 3: Remediation

  1. Re-image the device -- Stealer malware often includes persistence mechanisms. Do not attempt to clean -- re-image from a known-good baseline.
  2. Audit connected services -- For each URL in the stealer log, verify whether unauthorized access occurred.
  3. Reset API keys and tokens -- Any secrets accessible from the compromised device should be rotated.

Phase 4: Prevention

  1. Deploy EDR with behavioral detection for info-stealer malware families
  2. Enforce password manager usage -- Discourage saving passwords in browsers
  3. Monitor for recurrence -- Configure SLA Policies for immediate escalation on new compromised computer findings

Relationship to Compromised Users

ViewGrouped ByBest For
Compromised UsersEmail/usernameIdentifying which people are affected and resetting their credentials
Compromised ComputersMachine identifierIdentifying which devices need to be isolated and re-imaged

Both views draw from the same underlying stealer log data. Use Compromised Users for credential response and Compromised Computers for endpoint response.

ShadowMap by Security Brigade