CyberHappenings logo

Track cybersecurity events as they unfold. Sourced timelines. Filter, sort, and browse. Fast, privacy‑respecting. No invasive ads, no tracking.

Infostealers Exploit Stolen Credentials to Construct Real Identities

First reported
Last updated
1 unique sources, 1 articles

Summary

Hide ▲

Infostealers are increasingly targeting both personal and corporate users, harvesting credentials, session data, and user activity. Researchers analyzed 90,000 leaked infostealer dumps containing over 800 million rows of data, revealing how attackers associate technical data with real users, organizations, and behavioral patterns. This convergence collapses the boundary between personal and professional identities, escalating enterprise-level risks. The datasets included credentials, browser cookies, browsing history, and system-level files, enabling attackers to identify individuals, their employers, and roles within organizations. This data is used for targeted phishing, social engineering, and extortion, with significant implications for both personal and corporate security.

Timeline

  1. 19.02.2026 17:05 1 articles · 7h ago

    Infostealer Dumps Reveal Extensive Identity Data Theft

    Researchers analyzed 90,000 leaked infostealer dumps comprising over 800 million rows of data. The datasets included credentials, browser cookies, browsing history, and system-level files, enabling attackers to identify individuals, their employers, and roles within organizations. This data is used for targeted phishing, social engineering, and extortion, with significant implications for both personal and corporate security.

    Show sources

Information Snippets