{"id":4093,"date":"2025-12-11T00:32:20","date_gmt":"2025-12-11T00:32:20","guid":{"rendered":"https:\/\/phishia.fr\/?p=4093"},"modified":"2025-12-11T00:32:21","modified_gmt":"2025-12-11T00:32:21","slug":"your-password-is-worth-10-the-underground-economy-of-stealer-logs","status":"publish","type":"post","link":"https:\/\/phishia.fr\/en\/blog\/monitoring\/your-password-is-worth-10-the-underground-economy-of-stealer-logs\/","title":{"rendered":"Your password is 10$: The underground economy of Stealer Logs"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"4093\" class=\"elementor elementor-4093\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3cd863f e-flex e-con-boxed e-con e-parent\" data-id=\"3cd863f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d57ce6b elementor-widget elementor-widget-text-editor\" data-id=\"d57ce6b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Forget the image of the hoodie-wearing hacker typing neon-green lines of code all night long to \u00abbrute-forcing\u00bb your servers. In 2025, the reality is much more mundane, and frightening: <strong>your network access may already have been sold this morning, for the price of a BigMac menu.<\/strong><\/p><p>Welcome to the age of <strong>Stealer Logs<\/strong>, the silent threat that renders your password policies obsolete.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8ad2b8c elementor-widget elementor-widget-heading\" data-id=\"8ad2b8c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The mechanism: How your digital identity is \"zipped\"<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-454a223 elementor-widget elementor-widget-text-editor\" data-id=\"454a223\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Infostealers\u00ab (as in <em>Lumma<\/em>, <em>RedLine<\/em> or <em>Vidar<\/em>) are discreet malware. They don't need to break into your systems. They are often installed via cracked software downloaded by a telecommuting employee, or a harmless attachment on a personal e-mail.<\/p><p>Once active on the machine, the malware doesn't just steal passwords. It steals everything:<\/p><ul><li>Visit <strong>identifiers<\/strong> saved in the browser.<\/li><li>Information from <strong>credit cards<\/strong>.<\/li><li>Browsing history.<\/li><li>And above all: <strong>Session Cookies<\/strong>.<\/li><\/ul><p>Therein lies the critical danger.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d047a83 elementor-widget elementor-widget-image\" data-id=\"d047a83\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"204\" src=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/12\/Sans-titre.png\" class=\"attachment-large size-large wp-image-4098\" alt=\"\" srcset=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/12\/Sans-titre.png 908w, https:\/\/phishia.fr\/wp-content\/uploads\/2025\/12\/Sans-titre-300x77.png 300w, https:\/\/phishia.fr\/wp-content\/uploads\/2025\/12\/Sans-titre-768x196.png 768w, https:\/\/phishia.fr\/wp-content\/uploads\/2025\/12\/Sans-titre-18x5.png 18w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Stealer log infection cycle<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3ff7e1a elementor-widget elementor-widget-heading\" data-id=\"3ff7e1a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Why the MFA won't always save you<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d578a06 elementor-widget elementor-widget-text-editor\" data-id=\"d578a06\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>It's a cold shower for many CIOs. We often think that Multi-Factor Authentication (MFA) is the ultimate rampart.<\/p><p>But if an attacker steals your <strong>Session cookie<\/strong> valid via a Stealer Log, it doesn't need your password or SMS code. It imports this cookie into its own browser, and the target site (your CRM, your Office 365 access, your VPN) thinks it's you. It is <em>already<\/em> connected.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9713daf elementor-widget elementor-widget-heading\" data-id=\"9713daf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The crime supermarket<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-75979e6 elementor-widget elementor-widget-text-editor\" data-id=\"75979e6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>This stolen data does not remain on the hacker's computer. They are massively aggregated on automated marketplaces (such as <em>Russian Market<\/em> or private Telegram channels).<\/p><p>The business model is industrial. A \u00abLog\u00bb (the complete file of a victim or a group of computers) generally sells for around <strong>10$<\/strong>. For this price, the buyer gets access to all accounts : Netflix, Facebook, as well as VPN access for their company.<\/p><p>This is how the majority of today's Ransomware attacks begin: with a simple purchase from 10$ weeks before the final attack.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-41d8df4 elementor-widget elementor-widget-image\" data-id=\"41d8df4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/phishia.fr\/wp-content\/uploads\/elementor\/thumbs\/Sans-titre-1-rfz2hy1a3v0oxinrrvl3aruqb3hrrhgz0h60y5ial6.png\" title=\"Untitled\" alt=\"Untitled\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Example of Stealer logs<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-692e9a4 e-flex e-con-boxed e-con e-parent\" data-id=\"692e9a4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cc69250 elementor-widget elementor-widget-heading\" data-id=\"cc69250\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Regain control with CTI<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-22fb991 e-flex e-con-boxed e-con e-parent\" data-id=\"22fb991\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e3702a1 elementor-widget elementor-widget-text-editor\" data-id=\"e3702a1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Digital hygiene is essential, but it relies on human beings, who are fallible. You can't prevent an employee from mistakenly installing malware on his or her personal PC, but you can find out if his or her professional credentials have been leaked.<\/p><p>Visit <strong>Cyber Threat Intelligence (CTI)<\/strong> is not just about looking at your internal logs, but also at the outside world.<\/p><p>At <strong>Phishia<\/strong>, We continuously scan these underground markets. We're able to spot whether identifiers belonging to your @your-company.com domain are currently for sale in logs, even if the infection took place on an employee's personal computer.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1193ab6 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"1193ab6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"\/\/surveillance\/cti\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Discover Phishia CTI<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7692f56 e-flex e-con-boxed e-con e-parent\" data-id=\"7692f56\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c5496aa elementor-widget elementor-widget-heading\" data-id=\"c5496aa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Immediate action: the CTI Flash audit<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bb8a761 elementor-widget elementor-widget-text-editor\" data-id=\"bb8a761\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Don't remain in doubt. To know is to be able to anticipate.<\/p><p>For the launch of our CTI offer, Phishia proposes a pragmatic approach: <strong>CTI Flash offer<\/strong>. This is a \u00abone-shot\u00bb audit to take immediate stock of your exposure.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ade99da elementor-widget elementor-widget-image\" data-id=\"ade99da\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"310\" src=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/11\/TEMPLATE-Presentation-de-nos-services-1024x397.png\" class=\"attachment-large size-large wp-image-3989\" alt=\"\" srcset=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/11\/TEMPLATE-Presentation-de-nos-services-1024x397.png 1024w, https:\/\/phishia.fr\/wp-content\/uploads\/2025\/11\/TEMPLATE-Presentation-de-nos-services-300x116.png 300w, https:\/\/phishia.fr\/wp-content\/uploads\/2025\/11\/TEMPLATE-Presentation-de-nos-services-768x298.png 768w, https:\/\/phishia.fr\/wp-content\/uploads\/2025\/11\/TEMPLATE-Presentation-de-nos-services-1536x596.png 1536w, https:\/\/phishia.fr\/wp-content\/uploads\/2025\/11\/TEMPLATE-Presentation-de-nos-services-18x7.png 18w, https:\/\/phishia.fr\/wp-content\/uploads\/2025\/11\/TEMPLATE-Presentation-de-nos-services.png 1916w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Forget the image of the hoodie-wearing hacker typing neon-green lines of code all night long to \u00abbrute-forcing\u00bb your servers. In 2025, the reality is much more mundane, and frightening: your network access may already have been sold this morning, for the price of a BigMac menu. Welcome to the age of the Stealer [...].<\/p>","protected":false},"author":5,"featured_media":4103,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[24],"tags":[31],"class_list":["post-4093","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-surveillance","tag-darkweb"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Votre mot de passe vaut 10$ : L&#039;\u00e9conomie souterraine des Stealer Logs - Phishia<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/phishia.fr\/en\/blog\/monitoring\/your-password-is-worth-10-the-underground-economy-of-stealer-logs\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Votre mot de passe vaut 10$ : L&#039;\u00e9conomie souterraine des Stealer Logs - Phishia\" \/>\n<meta property=\"og:description\" content=\"Oubliez l&rsquo;image du hacker en sweat \u00e0 capuche qui tape des lignes de code vert fluo toute la nuit pour \u00ab\u00a0brute-forcer\u00a0\u00bb vos serveurs. En 2025, la r\u00e9alit\u00e9 est beaucoup plus banale, et effrayante : votre acc\u00e8s r\u00e9seau a peut-\u00eatre d\u00e9j\u00e0 \u00e9t\u00e9 vendu ce matin, pour le prix d&rsquo;un menu BigMac. Bienvenue dans l&rsquo;\u00e8re des Stealer [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/phishia.fr\/en\/blog\/monitoring\/your-password-is-worth-10-the-underground-economy-of-stealer-logs\/\" \/>\n<meta property=\"og:site_name\" content=\"Phishia\" \/>\n<meta property=\"article:published_time\" content=\"2025-12-11T00:32:20+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-11T00:32:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/12\/images.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"283\" \/>\n\t<meta property=\"og:image:height\" content=\"178\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Erwann Barre\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Erwann Barre\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/votre-mot-de-passe-vaut-10-leconomie-souterraine-des-stealer-logs\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/votre-mot-de-passe-vaut-10-leconomie-souterraine-des-stealer-logs\\\/\"},\"author\":{\"name\":\"Erwann Barre\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#\\\/schema\\\/person\\\/f2ed7a4647e03c3f636ce8145f3d1e5d\"},\"headline\":\"Votre mot de passe vaut 10$ : L&rsquo;\u00e9conomie souterraine des Stealer Logs\",\"datePublished\":\"2025-12-11T00:32:20+00:00\",\"dateModified\":\"2025-12-11T00:32:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/votre-mot-de-passe-vaut-10-leconomie-souterraine-des-stealer-logs\\\/\"},\"wordCount\":585,\"publisher\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/votre-mot-de-passe-vaut-10-leconomie-souterraine-des-stealer-logs\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/images.jpeg\",\"keywords\":[\"Darkweb\"],\"articleSection\":[\"Surveillance\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/votre-mot-de-passe-vaut-10-leconomie-souterraine-des-stealer-logs\\\/\",\"url\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/votre-mot-de-passe-vaut-10-leconomie-souterraine-des-stealer-logs\\\/\",\"name\":\"Votre mot de passe vaut 10$ : L'\u00e9conomie souterraine des Stealer Logs - Phishia\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/votre-mot-de-passe-vaut-10-leconomie-souterraine-des-stealer-logs\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/votre-mot-de-passe-vaut-10-leconomie-souterraine-des-stealer-logs\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/images.jpeg\",\"datePublished\":\"2025-12-11T00:32:20+00:00\",\"dateModified\":\"2025-12-11T00:32:21+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/votre-mot-de-passe-vaut-10-leconomie-souterraine-des-stealer-logs\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/votre-mot-de-passe-vaut-10-leconomie-souterraine-des-stealer-logs\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/votre-mot-de-passe-vaut-10-leconomie-souterraine-des-stealer-logs\\\/#primaryimage\",\"url\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/images.jpeg\",\"contentUrl\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/images.jpeg\",\"width\":283,\"height\":178},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/votre-mot-de-passe-vaut-10-leconomie-souterraine-des-stealer-logs\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/phishia.fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Surveillance\",\"item\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/category\\\/surveillance\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Votre mot de passe vaut 10$ : L&rsquo;\u00e9conomie souterraine des Stealer Logs\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#website\",\"url\":\"https:\\\/\\\/phishia.fr\\\/\",\"name\":\"Phishia\",\"description\":\"Cabinet de Conseil IT, Cybers\u00e9curit\u00e9, Durabilit\u00e9\",\"publisher\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/phishia.fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#organization\",\"name\":\"Phishia\",\"url\":\"https:\\\/\\\/phishia.fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/Logotype.png\",\"contentUrl\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/Logotype.png\",\"width\":512,\"height\":128,\"caption\":\"Phishia\"},\"image\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/phishia\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#\\\/schema\\\/person\\\/f2ed7a4647e03c3f636ce8145f3d1e5d\",\"name\":\"Erwann Barre\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Your password is 10$: The underground economy of Stealer Logs - Phishia","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/phishia.fr\/en\/blog\/monitoring\/your-password-is-worth-10-the-underground-economy-of-stealer-logs\/","og_locale":"en_US","og_type":"article","og_title":"Votre mot de passe vaut 10$ : L'\u00e9conomie souterraine des Stealer Logs - Phishia","og_description":"Oubliez l&rsquo;image du hacker en sweat \u00e0 capuche qui tape des lignes de code vert fluo toute la nuit pour \u00ab\u00a0brute-forcer\u00a0\u00bb vos serveurs. En 2025, la r\u00e9alit\u00e9 est beaucoup plus banale, et effrayante : votre acc\u00e8s r\u00e9seau a peut-\u00eatre d\u00e9j\u00e0 \u00e9t\u00e9 vendu ce matin, pour le prix d&rsquo;un menu BigMac. Bienvenue dans l&rsquo;\u00e8re des Stealer [&hellip;]","og_url":"https:\/\/phishia.fr\/en\/blog\/monitoring\/your-password-is-worth-10-the-underground-economy-of-stealer-logs\/","og_site_name":"Phishia","article_published_time":"2025-12-11T00:32:20+00:00","article_modified_time":"2025-12-11T00:32:21+00:00","og_image":[{"width":283,"height":178,"url":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/12\/images.jpeg","type":"image\/jpeg"}],"author":"Erwann Barre","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Erwann Barre","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/phishia.fr\/blog\/surveillance\/votre-mot-de-passe-vaut-10-leconomie-souterraine-des-stealer-logs\/#article","isPartOf":{"@id":"https:\/\/phishia.fr\/blog\/surveillance\/votre-mot-de-passe-vaut-10-leconomie-souterraine-des-stealer-logs\/"},"author":{"name":"Erwann Barre","@id":"https:\/\/phishia.fr\/#\/schema\/person\/f2ed7a4647e03c3f636ce8145f3d1e5d"},"headline":"Votre mot de passe vaut 10$ : L&rsquo;\u00e9conomie souterraine des Stealer Logs","datePublished":"2025-12-11T00:32:20+00:00","dateModified":"2025-12-11T00:32:21+00:00","mainEntityOfPage":{"@id":"https:\/\/phishia.fr\/blog\/surveillance\/votre-mot-de-passe-vaut-10-leconomie-souterraine-des-stealer-logs\/"},"wordCount":585,"publisher":{"@id":"https:\/\/phishia.fr\/#organization"},"image":{"@id":"https:\/\/phishia.fr\/blog\/surveillance\/votre-mot-de-passe-vaut-10-leconomie-souterraine-des-stealer-logs\/#primaryimage"},"thumbnailUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/12\/images.jpeg","keywords":["Darkweb"],"articleSection":["Surveillance"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/phishia.fr\/blog\/surveillance\/votre-mot-de-passe-vaut-10-leconomie-souterraine-des-stealer-logs\/","url":"https:\/\/phishia.fr\/blog\/surveillance\/votre-mot-de-passe-vaut-10-leconomie-souterraine-des-stealer-logs\/","name":"Your password is 10$: The underground economy of Stealer Logs - Phishia","isPartOf":{"@id":"https:\/\/phishia.fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/phishia.fr\/blog\/surveillance\/votre-mot-de-passe-vaut-10-leconomie-souterraine-des-stealer-logs\/#primaryimage"},"image":{"@id":"https:\/\/phishia.fr\/blog\/surveillance\/votre-mot-de-passe-vaut-10-leconomie-souterraine-des-stealer-logs\/#primaryimage"},"thumbnailUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/12\/images.jpeg","datePublished":"2025-12-11T00:32:20+00:00","dateModified":"2025-12-11T00:32:21+00:00","breadcrumb":{"@id":"https:\/\/phishia.fr\/blog\/surveillance\/votre-mot-de-passe-vaut-10-leconomie-souterraine-des-stealer-logs\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/phishia.fr\/blog\/surveillance\/votre-mot-de-passe-vaut-10-leconomie-souterraine-des-stealer-logs\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/phishia.fr\/blog\/surveillance\/votre-mot-de-passe-vaut-10-leconomie-souterraine-des-stealer-logs\/#primaryimage","url":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/12\/images.jpeg","contentUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/12\/images.jpeg","width":283,"height":178},{"@type":"BreadcrumbList","@id":"https:\/\/phishia.fr\/blog\/surveillance\/votre-mot-de-passe-vaut-10-leconomie-souterraine-des-stealer-logs\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/phishia.fr\/"},{"@type":"ListItem","position":2,"name":"Surveillance","item":"https:\/\/phishia.fr\/blog\/category\/surveillance\/"},{"@type":"ListItem","position":3,"name":"Votre mot de passe vaut 10$ : L&rsquo;\u00e9conomie souterraine des Stealer Logs"}]},{"@type":"WebSite","@id":"https:\/\/phishia.fr\/#website","url":"https:\/\/phishia.fr\/","name":"Phishia","description":"IT Consulting, Cybersecurity, Sustainability","publisher":{"@id":"https:\/\/phishia.fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/phishia.fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/phishia.fr\/#organization","name":"Phishia","url":"https:\/\/phishia.fr\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/phishia.fr\/#\/schema\/logo\/image\/","url":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/Logotype.png","contentUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/Logotype.png","width":512,"height":128,"caption":"Phishia"},"image":{"@id":"https:\/\/phishia.fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/phishia\/"]},{"@type":"Person","@id":"https:\/\/phishia.fr\/#\/schema\/person\/f2ed7a4647e03c3f636ce8145f3d1e5d","name":"Erwann Barre"}]}},"_links":{"self":[{"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/posts\/4093","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/comments?post=4093"}],"version-history":[{"count":13,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/posts\/4093\/revisions"}],"predecessor-version":[{"id":4116,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/posts\/4093\/revisions\/4116"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/media\/4103"}],"wp:attachment":[{"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/media?parent=4093"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/categories?post=4093"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/tags?post=4093"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}