The underground cybercrime economy is evolving fast—7.7 million endpoint logs were listed on underground markets in 2024, an increase from 6.8 million in 2023 SOTU. Logs are underground slang for username, passwords, and occasionally cookies extracted from a victim endpoint with stealer malware. Threat actors can purchase these logs on the underground and use them to access confidential accounts and data and even to deploy further attacks, such as ransomware. Contact us for a detailed analysis tailored to your company—covering endpoint logs, stolen credentials, and strategies to protect your extended attack surface. Below, explore endpoint log statistics from 2025 and beyond, updated monthly.
Endpoint log victims by country
In the past 12 months, India led all countries with 373284 endpoint logs, or 12.7% of the total. Below are the top endpoint log victims per country.
Top 10 countries
More signal, less noise. Latest cyber threat headlines from Bitsight Pulse.
-
2026-04-14 | Sale of access to a US-based Windows server networkThe post advertises the sale of access to a network of 59 hosts, including 58 Windows servers, located in the USA. The network is…
-
2026-04-13 | Canada RDP access offered for sale on underground forumAn underground forum post is offering Remote Desktop Protocol (RDP) access in Canada for sale at a price of $45,000. The post men…
-
2026-04-13 | Canada RDP access offered for sale on underground forumAn underground forum post is offering Remote Desktop Protocol (RDP) access in Canada for sale at $45,000. The post mentions the u…
-
2026-04-13 | Domain admin access for sale in GermanyA post on an underground forum is offering domain admin access in Germany for sale at a price of $800. The post mentions the use …
-
2026-04-11 | Access to IT firm in Denmark and UK for saleAn individual is selling access to an IT company with operations in Denmark and registered in the UK. The access includes VNC Pro…
Bitsight Pulse consolidates the latest cybersecurity news, ransomware events and data breaches from hundreds of deep web, dark web, social and OSINT sources. Using Bitsight AI, Bitsight Pulse filters and personalizes these news events to your interests.
Latest cyber threat blogs
Featured blog
AI integration security matters more than model security alone. Learn why the biggest AI risk comes from connected systems, stacked privileges, and workflow access.
Free threat assessment
Get up-to-date threat data for your organization
Attacks start long before the breach. Understand the signals attackers use—uncover ransomware activity, leaked credentials, and exposed vulnerabilities mapped to your organization using real threat intelligence from Bitsight.