Fortinet black logo

User Guide

Stealer Infections

Stealer Infections

The Adversary Centric Intelligence > Stealer Infection page includes information about possible infected systems that are affiliated with your employees or end-users that are listed for sale on credential stealer darknet marketplaces. The compromised system information is organized into two tabs:

  1. Leaked - The Compromised Systems(Leaked) tab displays the stolen data that has been shared over Darknet forums, Telegram channels, Tor sites or any other medium where the threat actor operates. See Viewing leaked compromised systems.

  2. On Sale - The Compromised Systems(On Sale) tab displays the stolen data that is currently being offered for sale on various Darknet marketplaces. See Viewing on sale compromised systems.

On the Stealer Infection page, you can:

Stealer Infections

The Adversary Centric Intelligence > Stealer Infection page includes information about possible infected systems that are affiliated with your employees or end-users that are listed for sale on credential stealer darknet marketplaces. The compromised system information is organized into two tabs:

  1. Leaked - The Compromised Systems(Leaked) tab displays the stolen data that has been shared over Darknet forums, Telegram channels, Tor sites or any other medium where the threat actor operates. See Viewing leaked compromised systems.

  2. On Sale - The Compromised Systems(On Sale) tab displays the stolen data that is currently being offered for sale on various Darknet marketplaces. See Viewing on sale compromised systems.

On the Stealer Infection page, you can: