Skip to content
Weekly intelligence Jun 17 – Jun 23, 2019 10 min read

Infostealers Weekly Report: 2019-06-17 – 2019-06-23

InfoStealers Weekly Report – In this comprehensive report, we provide you with valuable insights into the most pressing threats facing organizations today. As cyberattacks continue to grow in…

#1 0 Compromised Machines
#2 0 Compromised Employees
#3 0 Compromised Users
#4 0 Compromised Androids
#5 0 Compromised Domains

Threat Geography

Where infections came from

Compromised machines distributed by country of infection — hover any region to inspect.

Top 25 of 126
Infections by country

Top 25 countries

  1. #1 Indonesia 3,370
  2. #2 Vietnam 1,844
  3. #3 India 791
  4. #4 Thailand 735
  5. #5 Philippines 594
  6. #6 Brazil 486
  7. #7 Germany 282
  8. #8 Malaysia 269
  9. #9 Italy 190
  10. #10 United Kingdom 163
  11. #11 Pakistan 95
  12. #12 South Korea 89
  13. #13 Canada 82
  14. #14 Algeria 76
  15. #15 Bangladesh 70
  16. #16 Japan 62
  17. #17 Australia 61
  18. #18 Mongolia 53
  19. #19 Egypt 52
  20. #20 Morocco 42
  21. #21 Nigeria 40
  22. #22 China 36
  23. #23 Hungary 34
  24. #24 Romania 33
  25. #25 Myanmar (Burma) 32

Top Compromised Domains

Where users had active sessions

Domains where infected users had active sessions and saved credentials at the time of infection.

Top 25
  1. #1 google.com 6,412 users
  2. #2 facebook.com 5,605 users
  3. #3 live.com 2,013 users
  4. #4 yahoo.com 1,337 users
  5. #5 twitter.com 1,234 users
  6. #6 1,123 users
  7. #7 instagram.com 937 users
  8. #8 roblox.com 843 users
  9. #9 garena.com 759 users
  10. #10 paypal.com 714 users
  11. #11 mega.nz 696 users
  12. #12 chrome://FirefoxAccounts 695 users
  13. #13 discordapp.com 642 users
  14. #14 com.facebook.katana 600 users
  15. #15 192.168.1.1 590 users
  16. #16 netflix.com 581 users
  17. #17 firefox.com 572 users
  18. #18 linkedin.com 558 users
  19. #19 apple.com 533 users
  20. #20 steampowered.com 524 users
  21. #21 dropbox.com 502 users
  22. #22 epicgames.com 472 users
  23. #23 amazon.com 449 users
  24. #24 steamcommunity.com 428 users
  25. #25 zing.vn 394 users

Top Compromised Corporate Domains

Employees caught in the logs

Domains where compromised users were employees, surfaced via business email and credentials.

Top 25
  1. #1 POP3://pop.gmail.com:995 41 employees
  2. #2 bni.co.id 30 employees
  3. #3 rediff.com 22 employees
  4. #4 tim.it 18 employees
  5. #5 isacombank.com.vn 18 employees
  6. #6 icicibank.com 14 employees
  7. #7 POP3://[email protected]:0 11 employees
  8. #8 POP3://[email protected]:0 11 employees
  9. #9 secureserver.net 10 employees
  10. #10 zing.vn 9 employees
  11. #11 POP3://mail.boraintl.com:0 9 employees
  12. #12 SMTP://mail.boraintl.com:587 9 employees
  13. #13 f1-logix.com 9 employees
  14. #14 digimail.in 8 employees
  15. #15 onlinesbi.com 8 employees
  16. #16 gdt.gov.vn 8 employees
  17. #17 telkom.co.id 8 employees
  18. #18 ftp://hoanh.biz/ 8 employees
  19. #19 apple.com 7 employees
  20. #20 7 employees
  21. #21 1govuc.gov.my 7 employees
  22. #22 POP3://outlook.office365.com:995 7 employees
  23. #23 pec.it 7 employees
  24. #24 padmatirtagroup.com 7 employees
  25. #25 SMTP://mail.padmatirtagroup.com:587 7 employees

Fortune 500 Exposure

Top S&P companies hit this week

Top S&P companies with compromised employees and customers detected this week.

Compromised employees

  1. #1 apple.com 7 employees
  2. #2 cognizant.com 3 employees
  3. #3 microsoft.com 1 employees
  4. #4 starwoodhotels.com 1 employees
  5. #5 metlife.com 1 employees

Compromised users

  1. #1 google.com 6,412 users
  2. #2 facebook.com 5,604 users
  3. #3 paypal.com 714 users
  4. #4 netflix.com 581 users
  5. #5 apple.com 533 users
  6. #6 amazon.com 449 users
  7. #7 ebay.com 134 users
  8. #8 oracle.com 55 users
  9. #9 microsoft.com 25 users
  10. #10 nike.com 21 users
  11. #11 hp.com 19 users
  12. #12 americanexpress.com 17 users
  13. #13 ibm.com 17 users
  14. #14 westernunion.com 17 users
  15. #15 ups.com 15 users
  16. #16 cisco.com 12 users
  17. #17 walmart.com 10 users
  18. #18 salesforce.com 8 users
  19. #19 intel.com 8 users
  20. #20 capitalone.com 7 users

Targeted Application Keywords

What attackers grep for

The most common application keywords seen across credential logs — auth, sso, vpn, and more.

Top 25
  1. #1 auth 4,635hits
  2. #2 sso 3,529hits
  3. #3 imap 693hits
  4. #4 webmail 496hits
  5. #5 ftp 258hits
  6. #6 adfs 214hits
  7. #7 github 203hits
  8. #8 cpanel 166hits
  9. #9 owa 165hits
  10. #10 oracle 110hits
  11. #11 sap 99hits
  12. #12 st 74hits
  13. #13 zendesk 68hits
  14. #14 vpn 55hits
  15. #15 kaspersky 53hits
  16. #16 sts 43hits
  17. #17 extranet 38hits
  18. #18 ping 32hits
  19. #19 salesforce 26hits
  20. #20 zoom 24hits
  21. #21 jira 22hits
  22. #22 bitbucket 17hits
  23. #23 roundcube 16hits
  24. #24 gitlab 16hits
  25. #25 dana-na 13hits

Cavalier · Continuous monitoring

Get this depth of insight on your own organization.

Cavalier turns this same intelligence into a continuous real-time feed of compromised employees, customers and third-party vendors for your business.

More reports

Previous weekly briefings

View archive →
Free Tools Check your exposure