The underground cybercrime economy is evolving fast—7.7 million endpoint logs were listed on underground markets in 2024, an increase from 6.8 million in 2023 SOTU. Logs are underground slang for username, passwords, and occasionally cookies extracted from a victim endpoint with stealer malware. Threat actors can purchase these logs on the underground and use them to access confidential accounts and data and even to deploy further attacks, such as ransomware. Contact us for a detailed analysis tailored to your company—covering endpoint logs, stolen credentials, and strategies to protect your extended attack surface. Below, explore endpoint log statistics from 2025 and beyond, updated monthly.
Endpoint log victims by country
In the past 12 months, India led all countries with 432102 endpoint logs, or 11.8% of the total. Below are the top endpoint log victims per country.
Top 10 countries
More signal, less noise. Latest cyber threat headlines from Bitsight Pulse.
-
2026-02-18 | Underground forum post offers access to UK network with Sophos VPN and Trend Micro AVA post on an underground forum is offering access to a network in the UK, which includes Sophos VPN and Trend Micro antivirus. Th…
-
2026-02-18 | Sale of access to a manufacturing company's network with Sophos VPNAn underground forum post is advertising the sale of access to a manufacturing company's network. The access includes a Sophos VP…
-
2026-02-18 | Domain Admin access for a Peruvian business service is up for auctionAn underground forum post advertises the sale of Domain Admin access to a business service in Peru, with a starting bid of $1250 …
-
2026-02-18 | Access to admin panel and database via SQL injection for saleThe post advertises access to an admin panel and database through SQL injection, offering admin rights and a file manager. The se…
-
2026-02-17 | Access to French retail network for saleAn underground forum post is advertising access to a domain user account within the retail sector in France, with a starting bid …
Bitsight Pulse consolidates the latest cybersecurity news, ransomware events and data breaches from hundreds of deep web, dark web, social and OSINT sources. Using Bitsight AI, Bitsight Pulse filters and personalizes these news events to your interests.
Latest cyber threat blogs
Featured blog
Valentine’s Day phishing attacks spike every February as threat actors exploit trust, urgency, and brand impersonation. Learn how seasonal scams increase risk.
Free threat assessment
Get up-to-date threat data for your organization
Attacks start long before the breach. Understand the signals attackers use—uncover ransomware activity, leaked credentials, and exposed vulnerabilities mapped to your organization using real threat intelligence from Bitsight.