It is not enough to steal a username and a password for a long time: the modern "infostealers" have turned the removal of credentials into a much more complete identity mining. Specops researchers analyzed tens of thousands of leaked spins - over 90,000 - that added hundreds of millions of records and found that data sets circulating in crime markets contain from credentials to browser cookies, navigation histories and local system files. The result is an amazing ability to associate technical data with real people and their organizations.
When a stolen credential stops being just a password and becomes a personal identifier The risk is multiplying. Spins often include reused names in various services, Windows user names, file routes saved in personal profiles and active sessions captured in browsers. With these cross-signs, an attacker can move from an isolated credential to identifying the person behind it, its employer and even its possible role within the company. This convergence erases the separation between the personal and the professional that many security models still assume.

The data analyzed by Spocops show that both labour services and social platforms often appear in stolen data repositories. LinkedIn, for example, was notable in the studied sets, offering the attackers a direct way to find real names, posts and organizational affiliations. From there, exploitation becomes easier: highly targeted phishing campaigns, social engineering attacks and prioritizing targets that, when there is a reuse of passwords, can result in deeper access to corporate environments.
In addition, personal platforms - from social networks to video services - often provide images, connections and context tracks that help validate identities and chain accounts. In other cases, the spins contain information from sensitive services, including government domains or tax portals, and even cookies or access to adult sites; such information can be used to extort or coerce, especially if it is related to the professional life of the victim.
No need to be confused: knowing technology does not guarantee immunity. In the committed data repositories, technical and security domains appear, which shows that even users with cybersecurity knowledge can be exposed. What usually makes the difference is not the lack of training, but repeated large-scale habits: installing programs from unreliable sources, reusing passwords between personal and corporate accounts, and relying on automatic storage of credentials in browsers for convenience.
The infostealers take advantage of these shortcuts. The browsers store credentials and means of payment that, once exfiltered, provide immediate access to high-value information. This advantage makes a single infection a valuable asset that can be monetized through initial access brokers and reused in multiple campaigns for weeks or months.
Trend statistics make it clear: attacks using stolen credentials remain a central part of the intrusion landscape. Verizon's annual report on data violations documents that committed credentials are involved in a very relevant proportion of gaps; this study and other industry analyses show why mitigating risk cannot be limited to timely control.
In the face of this challenge, the defensive strategy must consider that some data have already been exposed when the incident is detected. Pure prevention is less effective if it is not accompanied by measures to reduce the operational life of such data. This is where actions such as detecting and blocking passwords already listed in filtered lists, imposing policies that favour long sentences against hard to remember but short passwords, and applying multifactor authentication, make the difference.
Continuous verification of credentials and prohibition of reusing compromised passwords are especially effective because they attack the main route of conversion of a circle into real commitment: reuse. If a password that appeared in a personal loop cannot be used to access corporate resources, its operational value for the attacker falls dramatically.
These ideas are in line with international recommendations and standards. NIST, for example, advises in its guides to avoid traditional practices of ineffective complexity and suggests mechanisms to prevent the use of previously committed credentials ( NIST SP 800-63B). Public tools like Have I Been Pwned they are a useful resource for awareness and response.
If we look for references on how these malware operate and what information they capture, security company analyses help to understand techniques and vectors: technical articles and reports from research laboratories such as ESET explain how infostealers extract credentials and session data from browsers and local applications ( ESET - WeLiveSecurity), while sectoral reports such as Verizon provide context on the prevalence of credentials-focused attacks ( Verizon DBIR).
At the practical level, organizations can adopt mechanisms that turn password policy into an active containment measure: scanning user directories against large exposed credentials databases, blocking the reuse of passwords even if they meet complexity criteria, and automating rotation or blocking when exposure signs appear. In other words, move from point controls - check the password when creating it or changing it - to continuous controls that minimize the operating window.
The responsibility lies not only with companies. Private users can also reduce their attack surface with simple habits: use reliable password administrators, activate multifactor authentication whenever possible and avoid installing software from unverified origins. These practices protect both the personal and the professional, because today the line between the two is diffuse.

For those who manage Active Directory and seek a concrete defense against the reuse and impact of spins, there are commercial solutions that implement continuous scans and real-time committed credentials lists. Among them, Speups offers policies that block already exposed passwords and prevent their reuse in corporate environments, thus complementing measures such as MFA and security training ( Speeches Password Policy).
The landscape of threats continues to evolve: infostealers have moved from tools of surface theft to exploitable identity factories. Understanding how these data are generated, sold and reused is the first step in stopping them. Apply continuous controls on credentials, reduce dependence on automatic browser storage and promote basic digital hygiene habits are measures that, together, reduce both the probability of infection and the operating window when something is filtered.
In short, it is not just about protecting passwords, but about breaking the nexus that turns a stolen credential into a direct path to people and organizations. Such a break-up requires technical policies, continuous processes and shared responsibility between users and companies.
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...

The dark matter of identity is changing the rules of corporate security
The Identity Gap: Snapshot 2026 report published by Orchid Security puts numbers to a dangerous trend: the "dark matter" of identity - accounts and credentials that are neither ...