Skip to main content

Hersteller-News

An Introduction to Stealer Logs

11 September 2024

What Is a Stealer Log?

A stealer log is a series of data files generated and compiled by malicious software known as “infostealers.” The log contains personal and sensitive information that has been collated from infected endpoints before being extracted to a command server controlled by a cyber threat actor, where it can be further exploited. Organizations face a significant threat from infostealers and stealer logs. This is primarily due to stealer logs abundance in DDW marketplaces and forums, their constant adaptation, and the innate appeal of stolen data to a broad variety of threat actors.

Data-Stealing techniques

Infostealers leverage numerous data-stealing techniques depending on the malware strain deployed. Form grabbing, keylogging, credential dumping, and screen scraping are all commonly-observed in such attacks. These attacks usually seek to uncover and extract information from elements of the targeted endpoint device.