Endpoint Log Statistics
2025-2026

 

The underground cybercrime economy is evolving fast—7.7 million endpoint logs were listed on underground markets in 2024, an increase from 6.8 million in 2023 SOTU. Logs are underground slang for username, passwords, and occasionally cookies extracted from a victim endpoint with stealer malware. Threat actors can purchase these logs on the underground and use them to access confidential accounts and data and even to deploy further attacks, such as ransomware. Contact us for a detailed analysis tailored to your company—covering endpoint logs, stolen credentials, and strategies to protect your extended attack surface. Below, explore endpoint log statistics from 2025 and beyond, updated monthly.

Endpoint logs on underground markets 2025-2026

In Q1 2026, cybercrime activity related to endpoint logs continued to evolve, focusing on several critical aspects: the use of credential harvesting and stealer malware, advancements in incident investigations, challenges in detection, and the persistent human element in cyberattacks. Endpoint logs remained crucial for monitoring, detecting, and investigating cybercrime activities, offering valuable insights into the tactics and behaviors of threat actors. These logs provided direct evidence of interactions between attackers and victim systems, enabling more effective threat analysis and response strategies.

Endpoint log victims by country

In the past 12 months, India led all countries with 421069 endpoint logs, or 11.6% of the total. Below are the top endpoint log victims per country.

Top 10 countries

More signal, less noise. Latest cyber threat headlines from Bitsight Pulse.

  • 2026-03-25 | Access to internal network of a Venezuelan tourism company is being auctioned
    An underground forum post is auctioning access to a shell located in a domain-joined Windows machine within the active directory …
  • 2026-03-25 | Access to internal network of a Palestinian ISP/MSP for sale
    An underground forum post is advertising access to a shell located in a domain-joined Windows machine within the active directory…
  • 2026-03-24 | Underground forum post offers access to US e-commerce site admin panel
    A post on an underground forum is offering access to the admin panel of a US e-commerce site. The seller claims to have their own…
  • 2026-03-24 | Underground forum post offers access to US e-commerce site admin panel
    A post on an underground forum is offering access to the admin panel of a US e-commerce site. The seller claims to have their own…
  • 2026-03-24 | Access to Linux server with financial company files for sale
    The post offers access to a Linux server containing files with names of financial companies in America, possibly COBOL source fil…

Bitsight Pulse consolidates the latest cybersecurity news, ransomware events and data breaches from hundreds of deep web, dark web, social and OSINT sources. Using Bitsight AI, Bitsight Pulse filters and personalizes these news events to your interests.

Free threat assessment

Get up-to-date threat data for your organization

Attacks start long before the breach. Understand the signals attackers use—uncover ransomware activity, leaked credentials, and exposed vulnerabilities mapped to your organization using real threat intelligence from Bitsight.