Report – The Stealer Malware Ecosystem: A Detailed Analysis of How Infected Devices Are Sold and Exploited on the Dark and Clear Web

June 22, 2022

Infected devices (including botnets and stealer logs) pose a great threat for both personal and corporate devices. Cybercriminals can purchase infected devices on the Genesis and Russian Markets to pursue account takeovers, make fraudulent purchases, or gain access to bank accounts. 

Botnets are computers that malware has infected to steal the information stored in web browsers and the browser’s fingerprint. Malicious actors can essentially impersonate their victim, which makes it difficult to identify fraudulent logins. Stealer logs are the product of infostealer malware stealing information from a victim’s browser. They do not provide as much information as botnets but are still very dangerous.

Though the markets specialize in selling different products, their intentions are similar with botnets on Genesis Market and stealer logs on Russian Market. 

We became curious about the global scale of the infected device industry and researched these questions:

  • Are some countries more targeted than others? 
  • What influences the price of a botnet on the global market? 
  • What kind of malware is used to collect victim’s info? 
  • Do attack patterns vary among distributors?

Learn more about the stealer malware ecosystem:

Share article

Related Content

View All
18.03.2026

Inside the North Korean Infiltrator Threat

From Patch to Exploit: Flare’s Intelligence on Cybercrime After January 2026 Patch Tuesday
12.02.2026

From Patch to Exploit: Flare’s Intelligence on Cybercrime After January 2026 Patch Tuesday

Celebrity Impersonation Scams: Social Engineering Targeting Canadians
11.02.2026

Celebrity Impersonation Scams: Social Engineering Targeting Canadians