The underground cybercrime economy is evolving fast—7.7 million endpoint logs were listed on underground markets in 2024, an increase from 6.8 million in 2023 SOTU. Logs are underground slang for username, passwords, and occasionally cookies extracted from a victim endpoint with stealer malware. Threat actors can purchase these logs on the underground and use them to access confidential accounts and data and even to deploy further attacks, such as ransomware. Contact us for a detailed analysis tailored to your company—covering endpoint logs, stolen credentials, and strategies to protect your extended attack surface. Below, explore endpoint log statistics from 2025 and beyond, updated monthly.
Endpoint log victims by country
In the past 12 months, India led all countries with 421069 endpoint logs, or 11.6% of the total. Below are the top endpoint log victims per country.
Top 10 countries
More signal, less noise. Latest cyber threat headlines from Bitsight Pulse.
-
2026-03-04 | FTP server access for an Italian company is being soldAn underground forum post is offering FTP server access to an Italian company in the architecture, engineering, and design, as we…
-
2026-03-03 | Access to a large number of shops in the US offeredThe post offers access to a large number of shops in the United States and seeks partners for collaboration. The communication is…
-
2026-03-04 | Offering unique logs for checking requestsThe post offers to check requests using unique logs, which can include various formats such as cookies, URLs, and email passwords…
-
2026-03-03 | Auction of bruted access credentials for various protocolsAn underground forum post is auctioning a mix of bruted access credentials for RDP, PPTP, SSH, and VNC. The accesses are availabl…
-
2026-03-02 | Sale of 450k USA banking leads on underground forumA post on an underground forum is advertising the sale of 450,000 USA banking leads. The data includes personal information such …
Bitsight Pulse consolidates the latest cybersecurity news, ransomware events and data breaches from hundreds of deep web, dark web, social and OSINT sources. Using Bitsight AI, Bitsight Pulse filters and personalizes these news events to your interests.
Latest cyber threat blogs
Featured blog
Threat actors are targeting vendors with infostealer malware to harvest credentials and scale supply chain attacks. See the top strains and what TPRM leaders should know.
Free threat assessment
Get up-to-date threat data for your organization
Attacks start long before the breach. Understand the signals attackers use—uncover ransomware activity, leaked credentials, and exposed vulnerabilities mapped to your organization using real threat intelligence from Bitsight.