Stealer logs: A growing cybersecurity threat

Cybercrime has taken a dangerous new turn with the rise of stealer logs – hidden data packages created by malware that silently collect sensitive information from infected devices. Once installed, this “infostealer” software can scoop up browser passwords, banking details, cryptocurrency wallets, social media logins and even authentication tokens, often without the user ever realising. The stolen data is neatly organised into logs and sold on underground markets, giving criminals quick access to valuable accounts.
According to the Namibia Cyber Security Incident Response Team (NAM-CSIRT), housed by the Communications Regulatory Authority of Namibia (CRAN), the scale of the problem is alarming. Security experts report that infections linked to stealer malware have surged by more than 6 000% since 2018. In 2024 alone, 4.3 million devices were compromised, leading to around 330 million stolen credentials. The threat doesn’t stop at individuals – corporate networks are also at risk when employees’ devices are infected, as stolen work logins frequently appear in these logs.
Research shows a growing link between stealer logs and ransomware. Many ransomware groups now buy stolen credentials instead of relying solely on phishing or exploiting software flaws. A stark example came in 2025 when the HellCat group used compromised employee accounts to breach the Spanish telecoms firm Telefónica, stealing sensitive documents before unleashing ransomware.
Protecting against stealer logs requires vigilance at every level. Experts recommend buying software only from trusted sources, using strong authentication methods such as multi-factor login, and keeping systems patched and up to date.
Separating personal and business accounts, monitoring the dark web for leaked credentials, and training users to spot suspicious ads or fake CAPTCHAs are also key steps. Companies are increasingly turning to advanced endpoint detection tools that can block credential theft in real time.
As cybercriminals refine their tactics, the lesson is clear: securing personal devices is no longer just an individual responsibility – it is critical to protecting entire organisations from large-scale attacks.