Stealer Infections
The Adversary Centric Intelligence > Stealer Infection page includes information about possible infected systems that are affiliated with your employees or end-users that are listed for sale on credential stealer darknet marketplaces. The compromised system information is organized into two tabs:
-
Leaked - The Compromised Systems(Leaked) tab displays the stolen data that has been shared over Darknet forums, Telegram channels, Tor sites or any other medium where the threat actor operates. See Viewing leaked compromised systems.
-
On Sale - The Compromised Systems(On Sale) tab displays the stolen data that is currently being offered for sale on various Darknet marketplaces. See Viewing on sale compromised systems.
On the Stealer Infection page, you can:
- Filter stealer infection information. See Filtering stealer infection information.
- Export market place data. See Exporting stealer infections data.