Skip to content

Secure IT

Stay Secure. Stay Informed.

Primary Menu
  • Home
  • Sources
    • Krebs On Security
    • Security Week
    • The Hacker News
    • Schneier On Security
  • Home
  • The Hacker News
  • From Infection to Access: A 24-Hour Timeline of a Modern Stealer Campaign
  • The Hacker News

From Infection to Access: A 24-Hour Timeline of a Modern Stealer Campaign

[email protected] The Hacker News Published: May 28, 2025 | Updated: May 28, 2025 3 min read
0 views

May 28, 2025The Hacker NewsIdentity Theft / Enterprise Security

Stealer malware no longer just steals passwords. In 2025, it steals live sessions—and attackers are moving faster and more efficiently than ever.

While many associate account takeovers with personal services, the real threat is unfolding in the enterprise. Flare’s latest research, The Account and Session Takeover Economy, analyzed over 20 million stealer logs and tracked attacker activity across Telegram channels and dark web marketplaces. The findings expose how cybercriminals weaponize infected employee endpoints to hijack enterprise sessions—often in less than 24 hours.

Here’s the real timeline of a modern session hijacking attack.

Infection and Data Theft in Under an Hour

Once a victim runs a malicious payload—typically disguised as cracked software, fake updates, or phishing attachments—commodity stealers like Redline (44% of logs), Raccoon (25%), and LummaC2 (18%) take over.

These malware kits:

  • Extract browser cookies, saved credentials, session tokens, and crypto wallets
  • Automatically exfiltrate data to Telegram bots or command-and-control servers within minutes
  • Feed over 16 million logs into just 10 Telegram channels alone, sorted by session type, location, and app

Session Tokens: The New Currency

Within hours, cybercriminals sift through stolen data, focusing on high-value session tokens:

  • 44% of logs contain Microsoft session data
  • 20% include Google sessions
  • Over 5% expose tokens from AWS, Azure, or GCP cloud services

Using Telegram bot commands, attackers filter logs by geography, application, and privilege level. Marketplace listings include browser fingerprint data and ready-made login scripts that bypass MFA.

Pricing for stolen sessions varies widely, with consumer accounts typically selling for $5 to $20, while enterprise-level AWS or Microsoft sessions can fetch $1,200 or more.

Full Account Access Within Hours

Once session tokens are purchased, attackers import them into anti-detect browsers, gaining seamless access to business-critical platforms without triggering MFA or login alerts.

This isn’t about personal accounts being misused. It’s about attackers infiltrating corporate environments, where they quickly:

  • Access business email like Microsoft 365 or Gmail
  • Enter internal tools such as Slack, Confluence, or admin dashboards
  • Exfiltrate sensitive data from cloud platforms
  • Deploy ransomware or move laterally across systems

Flare analyzed a single stealer log that included live, ready-to-use access to Gmail, Slack, Microsoft 365, Dropbox, AWS, and PayPal—all tied to a single infected machine. In the wrong hands, this level of session access can escalate into a serious breach within hours.

Why This Matters: The Scale of the Threat

This is no outlier. It is a massive, industrialized underground market enabling ransomware gangs, fraudsters, and espionage groups:

  • Millions of valid sessions are stolen and sold weekly
  • Tokens remain active for days, allowing persistent access
  • Session hijacking bypasses MFA, leaving many organizations blind to breaches

These attacks don’t result from breaches at Microsoft, Google, AWS, or other service providers. Instead, they stem from individual users getting infected by stealer malware, which silently exfiltrates their credentials and live session tokens. Attackers then exploit this user-level access to impersonate employees, steal data, and escalate privileges.

According to Verizon’s 2025 DBIR, 88% of breaches involved stolen credentials, highlighting just how central identity-based attacks have become.

If you’re only watching for stolen passwords or failed login attempts, you’re missing the biggest attack vector.

How to Defend Your Organization

Session tokens are as critical as passwords and require a new defense mindset:

  • Revoke all active sessions immediately after endpoint compromise; password resets alone don’t stop attackers
  • Monitor network traffic for Telegram domains, a key exfiltration channel
  • Use browser fingerprinting and anomaly detection to flag suspicious session use from unknown devices or locations

Adapting defenses to this new reality is essential for stopping fast-moving threat actors.

Dive Deeper with Flare

Our full report covers:

  • The most common malware families used in attacks
  • Detailed token pricing by access type
  • Screenshots of Telegram bots and marketplace listings
  • Actionable recommendations for detection and response

Explore our extensive dataset yourself by starting a free trial. Search millions of stealer logs, identify exposed sessions, and get ahead of attackers.

Read the full report | Start your free trial

Note: This article is expertly written and contributed by Eric Clay, who has experience in governance, risk and compliance, security data analysis, and security research. He currently serves as the CMO at Flare, a Threat Exposure Management SaaS solution.

Found this article interesting? This article is a contributed piece from one of our valued partners. Follow us on Twitter  and LinkedIn to read more exclusive content we post.

About The Author

[email protected] The Hacker News

See author's posts

Original post here

What do you feel about this?

  • The Hacker News

Post navigation

Previous: Mimo Hackers Exploit CVE-2025-32432 in Craft CMS to Deploy Cryptominer and Proxyware
Next: New PumaBot Botnet Targets Linux IoT Devices to Steal SSH Credentials and Mine Crypto

Author's Other Posts

India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse whatsapp-sim.jpg

India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse

December 2, 2025 0 0
Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera korean.jpg

Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera

December 2, 2025 0 1
GlassWorm Returns with 24 Malicious Extensions Impersonating Popular Developer Tools hacked.jpg

GlassWorm Returns with 24 Malicious Extensions Impersonating Popular Developer Tools

December 2, 2025 0 0
Malicious npm Package Uses Hidden Prompt and Script to Evade AI Security Tools npm-mal.jpg

Malicious npm Package Uses Hidden Prompt and Script to Evade AI Security Tools

December 2, 2025 0 1

Related Stories

whatsapp-sim.jpg
  • The Hacker News

India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse

[email protected] The Hacker News December 2, 2025 0 0
korean.jpg
  • The Hacker News

Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera

[email protected] The Hacker News December 2, 2025 0 1
hacked.jpg
  • The Hacker News

GlassWorm Returns with 24 Malicious Extensions Impersonating Popular Developer Tools

[email protected] The Hacker News December 2, 2025 0 0
npm-mal.jpg
  • The Hacker News

Malicious npm Package Uses Hidden Prompt and Script to Evade AI Security Tools

[email protected] The Hacker News December 2, 2025 0 1
iran-hacking.jpg
  • The Hacker News

Iran-Linked Hackers Hits Israeli Sectors with New MuddyViper Backdoor in Targeted Attacks

[email protected] The Hacker News December 2, 2025 0 0
SecAlerts.jpg
  • The Hacker News

SecAlerts Cuts Through the Noise with a Smarter, Faster Way to Track Vulnerabilities

[email protected] The Hacker News December 2, 2025 0 0

Trending Now

Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill 1

Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill

December 6, 2025 0 0
SMS Phishers Pivot to Points, Taxes, Fake Retailers SMS Phishers Pivot to Points, Taxes, Fake Retailers 2

SMS Phishers Pivot to Points, Taxes, Fake Retailers

December 4, 2025 0 0
India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse whatsapp-sim.jpg 3

India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse

December 2, 2025 0 0
Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera korean.jpg 4

Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera

December 2, 2025 0 1

Connect with Us

Social menu is not set. You need to create menu and assign it to Social Menu on Menu Settings.

Trending News

Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill 1
  • Uncategorized

Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill

December 6, 2025 0 0
SMS Phishers Pivot to Points, Taxes, Fake Retailers SMS Phishers Pivot to Points, Taxes, Fake Retailers 2
  • Uncategorized

SMS Phishers Pivot to Points, Taxes, Fake Retailers

December 4, 2025 0 0
India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse whatsapp-sim.jpg 3
  • The Hacker News

India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse

December 2, 2025 0 0
Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera korean.jpg 4
  • The Hacker News

Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera

December 2, 2025 0 1
GlassWorm Returns with 24 Malicious Extensions Impersonating Popular Developer Tools hacked.jpg 5
  • The Hacker News

GlassWorm Returns with 24 Malicious Extensions Impersonating Popular Developer Tools

December 2, 2025 0 0
Malicious npm Package Uses Hidden Prompt and Script to Evade AI Security Tools npm-mal.jpg 6
  • The Hacker News

Malicious npm Package Uses Hidden Prompt and Script to Evade AI Security Tools

December 2, 2025 0 1
Iran-Linked Hackers Hits Israeli Sectors with New MuddyViper Backdoor in Targeted Attacks iran-hacking.jpg 7
  • The Hacker News

Iran-Linked Hackers Hits Israeli Sectors with New MuddyViper Backdoor in Targeted Attacks

December 2, 2025 0 0

You may have missed

Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill
  • Uncategorized

Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill

Sean December 6, 2025 0 0
SMS Phishers Pivot to Points, Taxes, Fake Retailers
  • Uncategorized

SMS Phishers Pivot to Points, Taxes, Fake Retailers

Sean December 4, 2025 0 0
whatsapp-sim.jpg
  • The Hacker News

India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse

[email protected] The Hacker News December 2, 2025 0 0
korean.jpg
  • The Hacker News

Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera

[email protected] The Hacker News December 2, 2025 0 1
Copyright © 2026 All rights reserved. | MoreNews by AF themes.