Skip to content

Compromised Users (Stealer Logs)

ShadowMap monitors stealer log repositories for credentials harvested from your employees' infected machines by info-stealer malware. This is one of the highest-urgency finding types — stealer logs contain active, recently-used credentials that attackers can use immediately.

Overview

Compromised Users

How Stealer Logs Work

Info-stealer malware (Redline, Raccoon, Vidar, Lumma, etc.) infects a user's device — often through phishing emails, malicious downloads, or compromised software. Once installed, the malware:

  1. Extracts saved passwords from all browsers (Chrome, Firefox, Edge)
  2. Steals session cookies — these can bypass MFA entirely
  3. Captures autofill data — credit cards, addresses, personal info
  4. Fingerprints the machine — hostname, OS, hardware ID, IP address
  5. Packages and uploads everything to a command-and-control server

The stolen data is then sold or shared on dark web marketplaces, Telegram channels, and criminal forums. ShadowMap monitors these sources and alerts you when credentials matching your organization's domains appear.

Why This Is More Dangerous Than Data Breaches

FactorTraditional Data BreachStealer Log
Password freshnessOften months/years oldDays to weeks old — likely still valid
Session cookiesNot includedIncluded — can bypass MFA
ScopeOne breached serviceEvery service the user accessed
Machine accessNo device infoFull machine fingerprint — device is actively compromised
Password typeOften hashedPlaintext — no cracking needed

A stealer log from a single employee can expose credentials to your VPN, email, cloud services, internal tools, and every SaaS application they use — all in plaintext.

Understanding the Data

ColumnDescription
Email/UsernameThe compromised credential's login identity
URLThe service the credential was saved for (e.g., vpn.yourcompany.com, mail.google.com)
Stealer FamilyThe malware that harvested the data (Redline, Raccoon, Vidar, Lumma, etc.)
Log DateWhen the stealer log was generated — more recent = higher urgency
MachineIdentifier of the infected machine (hostname, hardware fingerprint)
StatusOnline (active finding) or actioned

Incident Response Playbook

When ShadowMap detects stealer log findings for your organization, follow this response workflow:

Phase 1: Immediate Containment (First 4 Hours)

  1. Revoke all active sessions for the affected user across all services

    • SSO provider (Okta, Azure AD, Google Workspace) — revoke all sessions
    • VPN — disconnect and block the user's VPN access
    • Email — revoke OAuth tokens and active sessions
  2. Force password reset on all services the user accesses

    • Prioritize: VPN, email, SSO, cloud admin consoles, financial systems
    • The stealer log URL list shows which services have saved credentials
  3. Invalidate session cookies — password reset alone is not enough

    • Attackers with stolen cookies can bypass MFA
    • Regenerate session tokens at the identity provider level
  4. Lock the compromised device

    • Use MDM (if managed) to remotely lock or wipe
    • If unmanaged (personal device), notify the user immediately

Phase 2: Investigation (24–72 Hours)

  1. Review access logs for the affected user

    • Check for logins from unusual IPs or geolocations
    • Look for activity during off-hours
    • Check for data access patterns that differ from normal behavior
    • Focus on the period between the stealer log date and now
  2. Check for lateral movement

    • Did the compromised credentials provide access to shared resources?
    • Were any admin consoles accessed?
    • Check Compromised Computers for the machine showing up in other contexts
  3. Identify the infection vector

    • When was the malware installed? (The log date gives an approximate timeline)
    • What was the malware family? (Redline vs Raccoon have different distribution methods)
    • Was it a phishing email, malicious download, or supply chain compromise?

Phase 3: Remediation (1–2 Weeks)

  1. Re-image the device

    • Stealer malware often includes persistence mechanisms
    • Do not trust cleaning — re-image from a known-good baseline
    • If it's a personal device, advise the user to factory reset
  2. Audit all services in the stealer log

    • For each URL in the log, verify: was unauthorized access made?
    • Check if any data was exfiltrated from those services
    • Reset API keys, tokens, and secrets that were accessible from the device
  3. Enable MFA where missing

    • While stolen cookies can bypass MFA, it still raises the bar significantly
    • Enforce phishing-resistant MFA (FIDO2/WebAuthn) where possible

Phase 4: Prevention (Ongoing)

  1. Deploy endpoint protection that detects info-stealers

    • EDR solutions with behavioral detection (not just signature-based)
    • Browser credential storage alternatives (use a password manager instead)
  2. Monitor for recurrence

    • Set up an SLA Policy for stealer log findings with immediate escalation
    • Re-infection is common if the root cause (phishing, malicious downloads) isn't addressed
  3. User awareness

    • Brief the affected user on how the infection occurred
    • Update security awareness training to cover info-stealer threats

Connecting Stealer Logs to Other ShadowMap Features

FeatureConnection
Compromised ComputersSame stealer log data, aggregated by machine instead of user — helps identify which devices are infected
Leaked CredentialsTraditional breach data — older, often hashed passwords. Stealer logs are more urgent.
Data BreachesThird-party breaches that may include your users' credentials
AlertsStealer log findings can trigger SLA violations and escalation workflows
SLA PoliciesSet up automatic notifications for new stealer log detections
Security RatingStealer log findings affect your Dark Web & Threat Intelligence category score

Common Questions

Q: How quickly should we respond to a stealer log finding?

Treat stealer logs as a critical incident. The credentials are plaintext and recently used — assume they are being or will be used by attackers. Session revocation and password resets should happen within hours, not days.

Q: If the stealer log is 3 months old, is it still a risk?

Yes. Unless the user has changed their passwords since the log date AND session cookies have expired, the credentials may still be valid. Always verify and reset regardless of age.

Q: We use MFA — are we safe?

Partially. MFA protects against password-only attacks, but stealer logs include session cookies that bypass MFA entirely. The attacker imports the stolen cookie into their browser and has an authenticated session without needing to pass MFA. This is why session revocation is critical.

Q: How is this different from a data breach?

Data breaches expose credentials from a breached third-party service (one service, often old, often hashed). Stealer logs expose credentials from the user's actual browser — every service they've ever saved a password for, in plaintext, with recent timestamps.

Q: Can we prevent stealer logs from appearing?

You can't prevent the dark web from having your data, but you can reduce exposure:

  • Discourage saving passwords in browsers (use a password manager instead)
  • Deploy EDR with info-stealer detection
  • Enforce short session timeouts
  • Use phishing-resistant MFA (FIDO2 keys)

ShadowMap by Security Brigade