“What used to take about 1500 hours to complete can now be done in 1 week. Flare allows me to empower junior analysts to do dark web investigations that were previously impossible, hence liberating bandwidth.“
Senior Security Specialist at a MSSP
Flare has built the world’s most comprehensive dataset of stealer log data. Infostealer malware infects hosts and steals credentials saved in the browser, session cookies, and in many cases even takes a screenshot of the victim’s computer. This data is then packaged into a single file exfiltrated to the threat actors Command & Control (C2) infrastructure and typically distributed on public and private Telegram channels.
Aside from stolen credentials, session cookies and screenshots, basic information about the infected device are also available. They often include the infection date, stealer family that infected the device, geolocation of the computer, operating system, username and anti-virus. By analyzing this data, this blog provides insights on the scope and impact of the infostealer malware landscape.
The data and visualizations presented on this webpage are based on information collected up until August 2024. These graphs are static and do not reflect real-time updates or recent developments. Any trends, insights, or conclusions should be interpreted with this timeframe in mind.


The timeline of stealer malware infections offers a great look into the evolution of the threat. Analyzing millions of stealer logs, we gain insights into how these stealers have proliferated over time. By examining infection dates from Flare’s stealer logs, we can trace the trajectory of various malware families over the last 5 years.
The dominance of Redline in our stealer logs is striking, accounting for nearly half (47.13%) of all infections. This widespread presence underscores Redline’s popularity among cybercriminals.
The geolocation of infected devices provides an interesting perspective on the global impact of infostealer malwares. Using the geographical data of infected devices, we can identify the regions where each device was located.
A bubble map, which provides a representation of how infections are spread across the globe, is available below. The size of the bubbles is proportional to the number of infected devices. Top 10 countries per percentage of population infected are in black.
The absolute number of infections reveals that countries with larger populations, such as Brazil, India, and the USA, show the highest absolute numbers of infections. This aligns with the expectation that larger populations provide a greater pool of potential targets. However, the top ten list of countries by number of infected devices also includes some surprising entries.
Finally, anti-virus software found on infected devices shows a clear dominance of Windows Defender. On the left are the top 15 Antiviruses found in our stealer logs by percentage of infected devices in our logs. These top 15 represent broader categories, with each category aggregating all related antivirus products (e.g., all McAfee products are grouped under ‘McAfee’).
