PROBABLYPWNED
Threat IntelligenceApril 2, 20265 min read

Stolen Credentials Hit Dark Web Markets Within 48 Hours

New research maps the infostealer lifecycle from infection to dark web sale. Microsoft Entra ID appears in 79% of 2.05 million credential logs analyzed in 2026.

Alex Kowalski

From the moment an infostealer infects a device to when stolen corporate credentials appear for sale on dark web marketplaces, the window is 48 hours or less—and ransomware operators are buying.

That's the finding from Whiteintel's Intelligence Division, which published detailed mapping of the full infostealer lifecycle on March 24, 2026. The research analyzed 2.05 million infostealer logs from 2026 alone and found that Microsoft Entra ID credentials appeared in 79% of them.

The 48-Hour Pipeline

The research traces an exact sequence from initial malware infection to credential monetization:

Hour 0-4: Infostealer executes on victim device, harvesting browser credentials, session cookies, and authentication tokens. Modern stealers like those in the AuraStealer family target not just saved passwords but active sessions that bypass MFA.

Hour 4-12: Harvested data is packaged and transmitted to attacker infrastructure. Logs are sorted by value—corporate credentials command premium prices over personal accounts.

Hour 12-24: Initial access brokers parse logs and list high-value credentials on underground markets. Enterprise accounts with admin privileges or cloud access are flagged for immediate sale.

Hour 24-48: Buyers—often ransomware affiliates—purchase credentials and begin reconnaissance of target environments. CYFIRMA researchers tracking the infostealer-to-ransomware pipeline confirmed that ransomware execution commonly occurs within 48 hours of credentials appearing on markets.

Microsoft Entra ID: The Primary Target

The concentration around Microsoft Entra ID (formerly Azure AD) is stark. When 79% of credential logs include Entra ID tokens, it reflects how thoroughly organizations have consolidated authentication around Microsoft's identity platform.

This creates a single point of failure. One compromised employee laptop can yield tokens that provide access to email, SharePoint, Teams, and dozens of integrated SaaS applications—all from a single authentication session.

"Organizations that have consolidated authentication around centralized identity platforms" face amplified risk from infostealer infections, the research notes. Flare Research projects that one in five infections could expose enterprise credentials by Q3 2026.

Why Infostealers Beat Traditional Defenses

Traditional perimeter security focuses on keeping attackers out. Infostealers bypass this entirely by compromising the user's device—often through social engineering or malicious downloads—and harvesting credentials that grant legitimate access.

The credentials aren't bruteforced or guessed. They're stolen directly from browser password managers, session storage, and authentication caches. To identity systems, the subsequent logins look legitimate because they use valid credentials and often valid session tokens that bypass MFA entirely.

This is why the 48-hour window matters so much. Traditional security monitoring might flag unusual login patterns eventually, but by then the damage is done. Attackers use the initial access window to establish persistence, map the environment, and prepare for ransomware deployment or data exfiltration.

We've seen this pattern repeatedly in recent incidents. The EvilTokens campaign used similar techniques to bypass OAuth protections, while attackers targeting FortiClient EMS combined vulnerability exploitation with credential harvesting for lateral movement.

Active Infostealer Families in 2026

The research identifies several infostealer families dominating current campaigns:

  • Vidar: Distributed through fake CAPTCHA pages on compromised WordPress sites
  • RedLine: Despite infrastructure takedowns and arrests, variants continue circulating
  • Lumma Stealer: Active in campaigns targeting developers and IT staff
  • AMOS (Atomic macOS Stealer): Cross-platform threat increasingly targeting macOS systems

Microsoft warned in March 2026 that infostealer malware is "rapidly expanding beyond traditional Windows-focused campaigns" to target Mac devices—a shift that catches many organizations off-guard since macOS has historically received less security attention.

Detection and Response Recommendations

Given the 48-hour window, organizations need detection capabilities that operate in near-real-time:

  1. Monitor for impossible travel and unusual login patterns from corporate identities
  2. Alert on new device registrations to Entra ID, especially from unusual locations
  3. Implement session timeout policies that limit how long stolen tokens remain valid
  4. Use hardware security keys where possible to resist session hijacking
  5. Monitor dark web markets for credentials associated with your domain

The research also recommends treating infostealer infections as potential enterprise incidents even when they occur on personal devices. If an employee uses the same browser for work and personal activity, an infection targeting their personal accounts may have harvested corporate credentials as well.

Why This Matters

The 48-hour lifecycle challenges traditional incident response timelines. By the time a breach is detected through normal channels, stolen credentials may already be in use by secondary attackers.

This creates pressure for proactive monitoring—watching dark web markets and credential dump forums for corporate credentials before they're used in attacks. Several services now offer this capability, but it requires organizations to acknowledge that prevention alone is insufficient.

For security teams evaluating their threat intelligence capabilities, the infostealer-to-ransomware pipeline represents one of the most direct connections between endpoint compromise and enterprise-level incidents. Breaking that chain requires detecting infections within hours, not days.

The 2.05 million logs analyzed in this research represent confirmed compromises from early 2026 alone. Each log potentially contains the keys to an organization's entire cloud infrastructure. The 48-hour clock is already ticking.

Related Articles