Report – The Stealer Malware Ecosystem: A Detailed Analysis of How Infected Devices Are Sold and Exploited on the Dark and Clear Web

June 22, 2022

Infected devices (including botnets and stealer logs) pose a great threat for both personal and corporate devices. Cybercriminals can purchase infected devices on the Genesis and Russian Markets to pursue account takeovers, make fraudulent purchases, or gain access to bank accounts. 

Botnets are computers that malware has infected to steal the information stored in web browsers and the browser’s fingerprint. Malicious actors can essentially impersonate their victim, which makes it difficult to identify fraudulent logins. Stealer logs are the product of infostealer malware stealing information from a victim’s browser. They do not provide as much information as botnets but are still very dangerous.

Though the markets specialize in selling different products, their intentions are similar with botnets on Genesis Market and stealer logs on Russian Market. 

We became curious about the global scale of the infected device industry and researched these questions:

  • Are some countries more targeted than others? 
  • What influences the price of a botnet on the global market? 
  • What kind of malware is used to collect victim’s info? 
  • Do attack patterns vary among distributors?

Learn more about the stealer malware ecosystem:

Share article

Related Content

View All
03.12.2025

British Racing Team Goes 0 to 100 with Flare’s Easy-to-Use Threat Exposure Management Solution

25.11.2025

How Gamers Became Cybercrime’s Favorite Target: Analysis of 50,000 Infostealer Infections

19.11.2025

20x Increase in Number of Guesses Required to Crack Passwords from 2007-2025: What Does that Mean for Password Strength?