A new analysis by Comparitech has detailed the lifecycle of stolen passwords, revealing how they are accessed, traded, and aggregated on the dark web. Researchers examined over 447,000 credential leaks from four cybercriminal forums, identifying a five-stage supply chain from initial compromise to end-use in attacks. The report highlights stages like 'wholesale' brokering of access, 'trade' across forums, and 'aggregation' into valuable combolists for credential-stuffing campaigns. AI
Summary written by gemini-2.5-flash-lite from 1 source. How we write summaries →
RANK_REASON Analysis of cybercriminal forums detailing the lifecycle of stolen passwords. [lever_c_demoted from research: ic=1 ai=0.1]