Infostealers Exploit Stolen Credentials to Construct Real Identities
Summary
Hide ▲
Show ▼
Infostealers are increasingly targeting both personal and corporate users, harvesting credentials, session data, and user activity. Researchers analyzed 90,000 leaked infostealer dumps containing over 800 million rows of data, revealing how attackers associate technical data with real users, organizations, and behavioral patterns. This convergence collapses the boundary between personal and professional identities, escalating enterprise-level risks. The datasets included credentials, browser cookies, browsing history, and system-level files, enabling attackers to identify individuals, their employers, and roles within organizations. This data is used for targeted phishing, social engineering, and extortion, with significant implications for both personal and corporate security.
Timeline
-
19.02.2026 17:05 1 articles · 7h ago
Infostealer Dumps Reveal Extensive Identity Data Theft
Researchers analyzed 90,000 leaked infostealer dumps comprising over 800 million rows of data. The datasets included credentials, browser cookies, browsing history, and system-level files, enabling attackers to identify individuals, their employers, and roles within organizations. This data is used for targeted phishing, social engineering, and extortion, with significant implications for both personal and corporate security.
Show sources
- How infostealers turn stolen credentials into real identities — www.bleepingcomputer.com — 19.02.2026 17:05
Information Snippets
-
Infostealers harvest credentials alongside broader session data and user activity.
First reported: 19.02.2026 17:051 source, 1 articleShow sources
- How infostealers turn stolen credentials into real identities — www.bleepingcomputer.com — 19.02.2026 17:05
-
Researchers analyzed 90,000 leaked infostealer dumps comprising over 800 million rows of data.
First reported: 19.02.2026 17:051 source, 1 articleShow sources
- How infostealers turn stolen credentials into real identities — www.bleepingcomputer.com — 19.02.2026 17:05
-
Datasets included credentials, browser cookies, browsing history, and system-level files.
First reported: 19.02.2026 17:051 source, 1 articleShow sources
- How infostealers turn stolen credentials into real identities — www.bleepingcomputer.com — 19.02.2026 17:05
-
Infostealer data ties multiple accounts and behaviors back to a real person.
First reported: 19.02.2026 17:051 source, 1 articleShow sources
- How infostealers turn stolen credentials into real identities — www.bleepingcomputer.com — 19.02.2026 17:05
-
LinkedIn alone accounted for nearly 900,000 records in the dataset.
First reported: 19.02.2026 17:051 source, 1 articleShow sources
- How infostealers turn stolen credentials into real identities — www.bleepingcomputer.com — 19.02.2026 17:05
-
Credentials and cookies associated with sensitive services like IRS and Canada Revenue Agency were found.
First reported: 19.02.2026 17:051 source, 1 articleShow sources
- How infostealers turn stolen credentials into real identities — www.bleepingcomputer.com — 19.02.2026 17:05
-
Password reuse remains one of the most reliable ways attackers operationalize infostealer data.
First reported: 19.02.2026 17:051 source, 1 articleShow sources
- How infostealers turn stolen credentials into real identities — www.bleepingcomputer.com — 19.02.2026 17:05