{"id":4093,"date":"2025-12-11T00:32:20","date_gmt":"2025-12-11T00:32:20","guid":{"rendered":"https:\/\/phishia.fr\/?p=4093"},"modified":"2025-12-11T00:32:21","modified_gmt":"2025-12-11T00:32:21","slug":"ihr-passwort-ist-10-wert-die-unterirdische-sparsamkeit-von-stealer-logs","status":"publish","type":"post","link":"https:\/\/phishia.fr\/de\/blog\/uberwachung\/ihr-passwort-ist-10-wert-die-unterirdische-sparsamkeit-von-stealer-logs\/","title":{"rendered":"Ihr Passwort ist 10$ wert: Die Schattenwirtschaft der Stealer Logs"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"4093\" class=\"elementor elementor-4093\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3cd863f e-flex e-con-boxed e-con e-parent\" data-id=\"3cd863f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d57ce6b elementor-widget elementor-widget-text-editor\" data-id=\"d57ce6b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Vergessen Sie das Bild des Hackers im Kapuzenpullover, der die ganze Nacht hindurch neongr\u00fcne Codezeilen eintippt, um Ihre Server zu \u00abbruteforcen\u00bb. Im Jahr 2025 ist die Realit\u00e4t viel banaler - und be\u00e4ngstigend: <strong>Ihr Netzwerkzugang wurde vielleicht schon heute Morgen f\u00fcr den Preis eines BigMac-Men\u00fcs verkauft.<\/strong><\/p><p>Willkommen im Zeitalter der <strong>Stealer Logs<\/strong>, Die stille Bedrohung, die Ihre Passwortrichtlinien \u00fcberfl\u00fcssig macht.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8ad2b8c elementor-widget elementor-widget-heading\" data-id=\"8ad2b8c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Der Mechanismus: Wie Ihre digitale Identit\u00e4t \"gezippt\" wird\"<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-454a223 elementor-widget elementor-widget-text-editor\" data-id=\"454a223\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Die \u00abInfostealer\u00bb (wie <em>Lumma<\/em>, <em>RedLine<\/em> oder <em>Vidar<\/em>) sind unauff\u00e4llige Malware. Sie brauchen Ihre Systeme nicht zu knacken. Sie installieren sich oft \u00fcber gecrackte Software, die ein Angestellter im Homeoffice heruntergeladen hat, oder \u00fcber einen harmlosen Anhang in einer pers\u00f6nlichen E-Mail.<\/p><p>Sobald die Malware auf dem Rechner aktiv ist, stiehlt sie nicht nur Passw\u00f6rter. Sie saugt alles ab:<\/p><ul><li>Die <strong>Kennungen<\/strong> die im Browser gespeichert sind.<\/li><li>Die Informationen von <strong>Bankkarten<\/strong>.<\/li><li>Der Browserverlauf.<\/li><li>Und nicht zuletzt: <strong>Session-Cookies<\/strong>.<\/li><\/ul><p>Darin liegt die kritische Gefahr.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d047a83 elementor-widget elementor-widget-image\" data-id=\"d047a83\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"204\" src=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/12\/Sans-titre.png\" class=\"attachment-large size-large wp-image-4098\" alt=\"\" srcset=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/12\/Sans-titre.png 908w, https:\/\/phishia.fr\/wp-content\/uploads\/2025\/12\/Sans-titre-300x77.png 300w, https:\/\/phishia.fr\/wp-content\/uploads\/2025\/12\/Sans-titre-768x196.png 768w, https:\/\/phishia.fr\/wp-content\/uploads\/2025\/12\/Sans-titre-18x5.png 18w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Infektionszyklus eines Stealerlogs<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3ff7e1a elementor-widget elementor-widget-heading\" data-id=\"3ff7e1a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Warum die MFA Sie nicht immer retten wird<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d578a06 elementor-widget elementor-widget-text-editor\" data-id=\"d578a06\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Das ist eine kalte Dusche f\u00fcr viele CIOs. Oft wird angenommen, dass die Multi-Faktor-Authentifizierung (MFA) der ultimative Schutzwall ist.<\/p><p>Aber wenn ein Angreifer Ihren <strong>Session-Cookie<\/strong> der \u00fcber einen Stealer Log g\u00fcltig ist, braucht er weder Ihr Passwort noch Ihren SMS-Code. Er importiert dieses Cookie in seinen eigenen Browser und die Zielseite (Ihr CRM, Ihr Office 365-Zugang, Ihr VPN) denkt, dass es sich um Sie handelt. Er ist <em>bereits<\/em> verbunden.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9713daf elementor-widget elementor-widget-heading\" data-id=\"9713daf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Der Supermarkt des Verbrechens<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-75979e6 elementor-widget elementor-widget-text-editor\" data-id=\"75979e6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Diese gestohlenen Daten bleiben nicht auf dem Computer des Hackers. Sie werden massiv auf automatisierten Marktpl\u00e4tzen aggregiert (z. B. <em>Russian Market<\/em> oder private Telegram-Kan\u00e4le).<\/p><p>Das Gesch\u00e4ftsmodell ist industriell. Ein \u00abLog\u00bb (das vollst\u00e4ndige Dossier eines Opfers oder einer Computergruppe) wird in der Regel f\u00fcr rund <strong>10$<\/strong>. F\u00fcr diesen Preis erh\u00e4lt der K\u00e4ufer Zugang zu allen Konten : Netflix, Facebook, aber auch den VPN-Zugang seines Unternehmens.<\/p><p>So beginnen die meisten der heutigen Ransomware-Angriffe: mit einem einfachen Kauf bei 10$, der Wochen vor dem endg\u00fcltigen Angriff get\u00e4tigt wird.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-41d8df4 elementor-widget elementor-widget-image\" data-id=\"41d8df4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/phishia.fr\/wp-content\/uploads\/elementor\/thumbs\/Sans-titre-1-rfz2hy1a3v0oxinrrvl3aruqb3hrrhgz0h60y5ial6.png\" title=\"Ohne Titel\" alt=\"Ohne Titel\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Beispiel f\u00fcr Stealer-Logs<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-692e9a4 e-flex e-con-boxed e-con e-parent\" data-id=\"692e9a4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cc69250 elementor-widget elementor-widget-heading\" data-id=\"cc69250\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Mit der ITC die Kontrolle zur\u00fcckgewinnen<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-22fb991 e-flex e-con-boxed e-con e-parent\" data-id=\"22fb991\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e3702a1 elementor-widget elementor-widget-text-editor\" data-id=\"e3702a1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Digitale Hygiene ist unverzichtbar, aber sie beruht auf dem Menschen, der fehlbar ist. Sie k\u00f6nnen nicht verhindern, dass ein Mitarbeiter versehentlich Malware auf seinem privaten PC installiert, aber Sie k\u00f6nnen herausfinden, ob seine beruflichen Zugangsdaten durchgesickert sind.<\/p><p>Die <strong>Cyber Threat Intelligence (CTI)<\/strong> besteht nicht nur darin, sich Ihre internen Logs anzusehen, sondern auch die Au\u00dfenwelt zu \u00fcberwachen.<\/p><p>Bei <strong>Phishia<\/strong>, Wir scannen diese unterirdischen M\u00e4rkte kontinuierlich. Wir sind in der Lage zu erkennen, ob Logins, die zu Ihrer Domain @Ihr-unternehmen.com geh\u00f6ren, derzeit in Logs verkauft werden, selbst wenn die Infektion auf dem privaten Computer eines Mitarbeiters stattgefunden hat.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1193ab6 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"1193ab6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"\/\/surveillance\/cti\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Entdecken Sie das Phishia CTI-Angebot<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7692f56 e-flex e-con-boxed e-con e-parent\" data-id=\"7692f56\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c5496aa elementor-widget elementor-widget-heading\" data-id=\"c5496aa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Die Sofortma\u00dfnahme: Das CTI Flash Audit<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bb8a761 elementor-widget elementor-widget-text-editor\" data-id=\"bb8a761\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Bleiben Sie nicht im Zweifel. Wissen bedeutet, vorausschauend handeln zu k\u00f6nnen.<\/p><p>F\u00fcr die Einf\u00fchrung unseres CTI-Angebots bietet Ihnen Phishia einen pragmatischen Ansatz : <strong>Das CTI Flash-Angebot<\/strong>. Es handelt sich um ein \u00abOne-Shot\u00bb-Audit, um eine sofortige Bestandsaufnahme Ihrer Ausstellung zu machen.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ade99da elementor-widget elementor-widget-image\" data-id=\"ade99da\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"310\" src=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/11\/TEMPLATE-Presentation-de-nos-services-1024x397.png\" class=\"attachment-large size-large wp-image-3989\" alt=\"\" srcset=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/11\/TEMPLATE-Presentation-de-nos-services-1024x397.png 1024w, https:\/\/phishia.fr\/wp-content\/uploads\/2025\/11\/TEMPLATE-Presentation-de-nos-services-300x116.png 300w, https:\/\/phishia.fr\/wp-content\/uploads\/2025\/11\/TEMPLATE-Presentation-de-nos-services-768x298.png 768w, https:\/\/phishia.fr\/wp-content\/uploads\/2025\/11\/TEMPLATE-Presentation-de-nos-services-1536x596.png 1536w, https:\/\/phishia.fr\/wp-content\/uploads\/2025\/11\/TEMPLATE-Presentation-de-nos-services-18x7.png 18w, https:\/\/phishia.fr\/wp-content\/uploads\/2025\/11\/TEMPLATE-Presentation-de-nos-services.png 1916w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Vergessen Sie das Bild des Hackers im Kapuzenpullover, der die ganze Nacht hindurch neongr\u00fcne Codezeilen eintippt, um Ihre Server zu \u00abbruteforcen\u00bb. Im Jahr 2025 ist die Realit\u00e4t viel banaler - und erschreckender: Ihr Netzwerkzugang wurde vielleicht schon heute Morgen zum Preis eines BigMac-Men\u00fcs verkauft. Willkommen in der \u00c4ra der Stealer [...].<\/p>","protected":false},"author":5,"featured_media":4103,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[24],"tags":[31],"class_list":["post-4093","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-surveillance","tag-darkweb"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Votre mot de passe vaut 10$ : L&#039;\u00e9conomie souterraine des Stealer Logs - Phishia<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/phishia.fr\/de\/blog\/uberwachung\/ihr-passwort-ist-10-wert-die-unterirdische-sparsamkeit-von-stealer-logs\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Votre mot de passe vaut 10$ : L&#039;\u00e9conomie souterraine des Stealer Logs - Phishia\" \/>\n<meta property=\"og:description\" content=\"Oubliez l&rsquo;image du hacker en sweat \u00e0 capuche qui tape des lignes de code vert fluo toute la nuit pour \u00ab\u00a0brute-forcer\u00a0\u00bb vos serveurs. En 2025, la r\u00e9alit\u00e9 est beaucoup plus banale, et effrayante : votre acc\u00e8s r\u00e9seau a peut-\u00eatre d\u00e9j\u00e0 \u00e9t\u00e9 vendu ce matin, pour le prix d&rsquo;un menu BigMac. Bienvenue dans l&rsquo;\u00e8re des Stealer [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/phishia.fr\/de\/blog\/uberwachung\/ihr-passwort-ist-10-wert-die-unterirdische-sparsamkeit-von-stealer-logs\/\" \/>\n<meta property=\"og:site_name\" content=\"Phishia\" \/>\n<meta property=\"article:published_time\" content=\"2025-12-11T00:32:20+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-11T00:32:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/12\/images.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"283\" \/>\n\t<meta property=\"og:image:height\" content=\"178\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Erwann Barre\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"Erwann Barre\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"1\u00a0Minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/phishia.fr\/blog\/surveillance\/votre-mot-de-passe-vaut-10-leconomie-souterraine-des-stealer-logs\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/phishia.fr\/blog\/surveillance\/votre-mot-de-passe-vaut-10-leconomie-souterraine-des-stealer-logs\/\"},\"author\":{\"name\":\"Erwann Barre\",\"@id\":\"https:\/\/phishia.fr\/#\/schema\/person\/f2ed7a4647e03c3f636ce8145f3d1e5d\"},\"headline\":\"Votre mot de passe vaut 10$ : L&rsquo;\u00e9conomie souterraine des Stealer Logs\",\"datePublished\":\"2025-12-11T00:32:20+00:00\",\"dateModified\":\"2025-12-11T00:32:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/phishia.fr\/blog\/surveillance\/votre-mot-de-passe-vaut-10-leconomie-souterraine-des-stealer-logs\/\"},\"wordCount\":585,\"publisher\":{\"@id\":\"https:\/\/phishia.fr\/#organization\"},\"image\":{\"@id\":\"https:\/\/phishia.fr\/blog\/surveillance\/votre-mot-de-passe-vaut-10-leconomie-souterraine-des-stealer-logs\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/12\/images.jpeg\",\"keywords\":[\"Darkweb\"],\"articleSection\":[\"Surveillance\"],\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/phishia.fr\/blog\/surveillance\/votre-mot-de-passe-vaut-10-leconomie-souterraine-des-stealer-logs\/\",\"url\":\"https:\/\/phishia.fr\/blog\/surveillance\/votre-mot-de-passe-vaut-10-leconomie-souterraine-des-stealer-logs\/\",\"name\":\"Votre mot de passe vaut 10$ : L'\u00e9conomie souterraine des Stealer Logs - Phishia\",\"isPartOf\":{\"@id\":\"https:\/\/phishia.fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/phishia.fr\/blog\/surveillance\/votre-mot-de-passe-vaut-10-leconomie-souterraine-des-stealer-logs\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/phishia.fr\/blog\/surveillance\/votre-mot-de-passe-vaut-10-leconomie-souterraine-des-stealer-logs\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/12\/images.jpeg\",\"datePublished\":\"2025-12-11T00:32:20+00:00\",\"dateModified\":\"2025-12-11T00:32:21+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/phishia.fr\/blog\/surveillance\/votre-mot-de-passe-vaut-10-leconomie-souterraine-des-stealer-logs\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/phishia.fr\/blog\/surveillance\/votre-mot-de-passe-vaut-10-leconomie-souterraine-des-stealer-logs\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/phishia.fr\/blog\/surveillance\/votre-mot-de-passe-vaut-10-leconomie-souterraine-des-stealer-logs\/#primaryimage\",\"url\":\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/12\/images.jpeg\",\"contentUrl\":\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/12\/images.jpeg\",\"width\":283,\"height\":178},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/phishia.fr\/blog\/surveillance\/votre-mot-de-passe-vaut-10-leconomie-souterraine-des-stealer-logs\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/phishia.fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Surveillance\",\"item\":\"https:\/\/phishia.fr\/blog\/category\/surveillance\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Votre mot de passe vaut 10$ : L&rsquo;\u00e9conomie souterraine des Stealer Logs\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/phishia.fr\/#website\",\"url\":\"https:\/\/phishia.fr\/\",\"name\":\"Phishia\",\"description\":\"Cabinet de Conseil IT, Cybers\u00e9curit\u00e9, Durabilit\u00e9\",\"publisher\":{\"@id\":\"https:\/\/phishia.fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/phishia.fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/phishia.fr\/#organization\",\"name\":\"Phishia\",\"url\":\"https:\/\/phishia.fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/phishia.fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/Logotype.png\",\"contentUrl\":\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/Logotype.png\",\"width\":512,\"height\":128,\"caption\":\"Phishia\"},\"image\":{\"@id\":\"https:\/\/phishia.fr\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/phishia\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/phishia.fr\/#\/schema\/person\/f2ed7a4647e03c3f636ce8145f3d1e5d\",\"name\":\"Erwann Barre\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ihr Passwort ist 10$ wert: Die Schattenwirtschaft der Stealer Logs - Phishia","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/phishia.fr\/de\/blog\/uberwachung\/ihr-passwort-ist-10-wert-die-unterirdische-sparsamkeit-von-stealer-logs\/","og_locale":"de_DE","og_type":"article","og_title":"Votre mot de passe vaut 10$ : L'\u00e9conomie souterraine des Stealer Logs - Phishia","og_description":"Oubliez l&rsquo;image du hacker en sweat \u00e0 capuche qui tape des lignes de code vert fluo toute la nuit pour \u00ab\u00a0brute-forcer\u00a0\u00bb vos serveurs. En 2025, la r\u00e9alit\u00e9 est beaucoup plus banale, et effrayante : votre acc\u00e8s r\u00e9seau a peut-\u00eatre d\u00e9j\u00e0 \u00e9t\u00e9 vendu ce matin, pour le prix d&rsquo;un menu BigMac. Bienvenue dans l&rsquo;\u00e8re des Stealer [&hellip;]","og_url":"https:\/\/phishia.fr\/de\/blog\/uberwachung\/ihr-passwort-ist-10-wert-die-unterirdische-sparsamkeit-von-stealer-logs\/","og_site_name":"Phishia","article_published_time":"2025-12-11T00:32:20+00:00","article_modified_time":"2025-12-11T00:32:21+00:00","og_image":[{"width":283,"height":178,"url":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/12\/images.jpeg","type":"image\/jpeg"}],"author":"Erwann Barre","twitter_card":"summary_large_image","twitter_misc":{"Verfasst von":"Erwann Barre","Gesch\u00e4tzte Lesezeit":"1\u00a0Minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/phishia.fr\/blog\/surveillance\/votre-mot-de-passe-vaut-10-leconomie-souterraine-des-stealer-logs\/#article","isPartOf":{"@id":"https:\/\/phishia.fr\/blog\/surveillance\/votre-mot-de-passe-vaut-10-leconomie-souterraine-des-stealer-logs\/"},"author":{"name":"Erwann Barre","@id":"https:\/\/phishia.fr\/#\/schema\/person\/f2ed7a4647e03c3f636ce8145f3d1e5d"},"headline":"Votre mot de passe vaut 10$ : L&rsquo;\u00e9conomie souterraine des Stealer Logs","datePublished":"2025-12-11T00:32:20+00:00","dateModified":"2025-12-11T00:32:21+00:00","mainEntityOfPage":{"@id":"https:\/\/phishia.fr\/blog\/surveillance\/votre-mot-de-passe-vaut-10-leconomie-souterraine-des-stealer-logs\/"},"wordCount":585,"publisher":{"@id":"https:\/\/phishia.fr\/#organization"},"image":{"@id":"https:\/\/phishia.fr\/blog\/surveillance\/votre-mot-de-passe-vaut-10-leconomie-souterraine-des-stealer-logs\/#primaryimage"},"thumbnailUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/12\/images.jpeg","keywords":["Darkweb"],"articleSection":["Surveillance"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/phishia.fr\/blog\/surveillance\/votre-mot-de-passe-vaut-10-leconomie-souterraine-des-stealer-logs\/","url":"https:\/\/phishia.fr\/blog\/surveillance\/votre-mot-de-passe-vaut-10-leconomie-souterraine-des-stealer-logs\/","name":"Ihr Passwort ist 10$ wert: Die Schattenwirtschaft der Stealer Logs - Phishia","isPartOf":{"@id":"https:\/\/phishia.fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/phishia.fr\/blog\/surveillance\/votre-mot-de-passe-vaut-10-leconomie-souterraine-des-stealer-logs\/#primaryimage"},"image":{"@id":"https:\/\/phishia.fr\/blog\/surveillance\/votre-mot-de-passe-vaut-10-leconomie-souterraine-des-stealer-logs\/#primaryimage"},"thumbnailUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/12\/images.jpeg","datePublished":"2025-12-11T00:32:20+00:00","dateModified":"2025-12-11T00:32:21+00:00","breadcrumb":{"@id":"https:\/\/phishia.fr\/blog\/surveillance\/votre-mot-de-passe-vaut-10-leconomie-souterraine-des-stealer-logs\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/phishia.fr\/blog\/surveillance\/votre-mot-de-passe-vaut-10-leconomie-souterraine-des-stealer-logs\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/phishia.fr\/blog\/surveillance\/votre-mot-de-passe-vaut-10-leconomie-souterraine-des-stealer-logs\/#primaryimage","url":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/12\/images.jpeg","contentUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/12\/images.jpeg","width":283,"height":178},{"@type":"BreadcrumbList","@id":"https:\/\/phishia.fr\/blog\/surveillance\/votre-mot-de-passe-vaut-10-leconomie-souterraine-des-stealer-logs\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/phishia.fr\/"},{"@type":"ListItem","position":2,"name":"Surveillance","item":"https:\/\/phishia.fr\/blog\/category\/surveillance\/"},{"@type":"ListItem","position":3,"name":"Votre mot de passe vaut 10$ : L&rsquo;\u00e9conomie souterraine des Stealer Logs"}]},{"@type":"WebSite","@id":"https:\/\/phishia.fr\/#website","url":"https:\/\/phishia.fr\/","name":"Phishia","description":"IT-Beratung, Cybersicherheit, Nachhaltigkeit","publisher":{"@id":"https:\/\/phishia.fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/phishia.fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/phishia.fr\/#organization","name":"Phishia","url":"https:\/\/phishia.fr\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/phishia.fr\/#\/schema\/logo\/image\/","url":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/Logotype.png","contentUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/Logotype.png","width":512,"height":128,"caption":"Phishia"},"image":{"@id":"https:\/\/phishia.fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/phishia\/"]},{"@type":"Person","@id":"https:\/\/phishia.fr\/#\/schema\/person\/f2ed7a4647e03c3f636ce8145f3d1e5d","name":"Erwann Barre"}]}},"_links":{"self":[{"href":"https:\/\/phishia.fr\/de\/wp-json\/wp\/v2\/posts\/4093","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/phishia.fr\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/phishia.fr\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/phishia.fr\/de\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/phishia.fr\/de\/wp-json\/wp\/v2\/comments?post=4093"}],"version-history":[{"count":13,"href":"https:\/\/phishia.fr\/de\/wp-json\/wp\/v2\/posts\/4093\/revisions"}],"predecessor-version":[{"id":4116,"href":"https:\/\/phishia.fr\/de\/wp-json\/wp\/v2\/posts\/4093\/revisions\/4116"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/phishia.fr\/de\/wp-json\/wp\/v2\/media\/4103"}],"wp:attachment":[{"href":"https:\/\/phishia.fr\/de\/wp-json\/wp\/v2\/media?parent=4093"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/phishia.fr\/de\/wp-json\/wp\/v2\/categories?post=4093"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/phishia.fr\/de\/wp-json\/wp\/v2\/tags?post=4093"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}