The underground cybercrime economy is evolving fast with millions of endpoint logs listed on underground markets. Logs are underground slang for username, passwords, and occasionally cookies extracted from a victim endpoint with stealer malware. Threat actors can purchase these logs on the underground and use them to access confidential accounts and data and even to deploy further attacks, such as ransomware. Contact us for a detailed analysis tailored to your company—covering endpoint logs, stolen credentials, and strategies to protect your extended attack surface. Below, explore endpoint log statistics from 2025-2026, updated monthly.
Endpoint log victims by country
In the past 12 months, India led all countries with 362053 endpoint logs, or 12.8% of the total. Below are the top endpoint log victims per country.
Top 10 countries
More signal, less noise. Latest cyber threat headlines from Bitsight Pulse.
-
2026-05-04 | Underground forum post offers access to a German company's networkA post on an underground forum is offering access to a German company's network, specifically mentioning Citrix domain user and A…
-
2026-05-03 | Database sale offer on underground forumA user is offering to sell access to 70 databases from various countries classified as Tier 1. The databases are hosted on a spec…
-
2026-05-02 | Access to UAE holding company's network for saleAn underground forum post is offering access to a holding company's network in the United Arab Emirates. The access includes VPN-…
-
2026-05-02 | Access to a manufacturing company's internal network in Thailand is being soldAn underground forum post is advertising access to a manufacturing company's internal network in Thailand. The access includes VP…
-
2026-05-01 | Sale of access to high-value developer servers in the software sectorAn underground forum post is advertising the sale of access to five high-value developer servers. These targets include a passwor…
Bitsight Pulse consolidates the latest cybersecurity news, ransomware events and data breaches from hundreds of deep web, dark web, social and OSINT sources. Using Bitsight AI, Bitsight Pulse filters and personalizes these news events to your interests.
Latest cyber threat blogs
Featured blog
AI integration security matters more than model security alone. Learn why the biggest AI risk comes from connected systems, stacked privileges, and workflow access.
Free threat assessment
Get up-to-date threat data for your organization
Attacks start long before the breach. Understand the signals attackers use—uncover ransomware activity, leaked credentials, and exposed vulnerabilities mapped to your organization using real threat intelligence from Bitsight.