Back to Intelligence Center
Operations Playbook

How to monitor stolen credentials on the dark web

A practical playbook: which sources to watch, how to scope your watchlist, how to triage matches, and how to run the workflow without drowning your team in noise.

WI

Whiteintel Team

May 22, 2026
11 min read

Monitoring stolen credentials on the dark web is not a single product feature. It's a workflow with five moving parts: define what you're watching, collect from the right sources, deduplicate aggressively, alert with context, and pivot fast when something fires. This guide walks each one.

01 · Why

Why monitoring matters in 2026

The median time from an infostealer running on an employee's laptop to that employee's saved credentials being listed on a marketplace is about 48 hours. The median time from listing to active exploitation is days, not weeks. That window is the entire reason this category exists.

Without a monitoring program, the only way you discover a stolen credential is the same way every other breach starts: an unexpected sign-in alert, an MFA push the user didn't initiate, or a help-desk ticket from someone wondering why their session was revoked. By then the attacker has been logged in for an unknown number of hours, with access to the same mailboxes, repos, and admin consoles your user has.

Done well, monitoring shrinks that window from "we found out from the breach disclosure" to "we revoked the password six hours after the malware ran". The next sections cover how to build that.

02 · Scope

What you're trying to catch

Three categories of stolen credentials, with very different operational urgency. Set expectations with your team that not all matches are equal.

P0 · Live

Infostealer logs

A real employee's machine got infected. Every saved browser credential, cookie, and session token is in the dump. These need same-day action.

P1 · Targeted

Marketplace listings

Aggregated stealer logs filtered by buyers searching for your domain. Listing means someone is actively shopping for access to your org.

P2 · Historical

Old breach compilations

Reused dumps from 2019-2024. Useful for password-hygiene programs and audit trails, not active defense. Bulk-handle, don't page on.

A common mistake is treating all three the same way. The P0 stuff deserves a SOC playbook. The P2 stuff belongs in a weekly digest that someone scans in five minutes. The volume of P2 hits dwarfs the others, and conflating them is the fastest way to train your team to mute the channel.

03 · Watchlist

Define your scope: what to actually watch

Before you wire up any tool, write down the assets you want monitored. This list is what every alert will be matched against, so put care into it.

Identifiers worth tracking

  • Primary corporate domain(s) — acme.com, and every TLD you actually use (acme.co.uk, acme.io, etc.). Each one is its own watchlist item.
  • Subdomains that act as login portals — sso.acme.com, vpn.acme.com, gitlab.acme.com. These appear as the saved-credential URL inside a stealer log.
  • Acquired or sister brands — domains your employees still log into but that don't share the acme.com extension. Easy to miss.
  • Executive personal emails — the CEO's personal Gmail is in scope if it's used for anything corporate-adjacent. Stealer logs don't respect HR boundaries.
  • Customer-facing services — if you run a SaaS product, your users' credentials are also "your" exposure. Match against your domain in the data_type=consumer logs.
  • Look-alike domains — acme-corp.com, acm3.com, secure-acme.com. Not "stolen credentials" strictly, but pre-emptively monitoring them catches phishing infrastructure before campaigns launch.

For mid-size orgs the list ends up being 5-15 entries. For enterprises with M&A history, easily 50+. Start broad, then prune what's noisy after two weeks of running.

04 · Sources

Pick your sources: where stolen credentials actually live

Five layers carry almost all of the live signal. Any monitoring program needs visibility into the first three at minimum.

Layer 01

Infostealer log dumps

Raw output from Redline, Lumma, StealC, Vidar, Atomic and a dozen others. The freshest signal you can get — and where most modern corporate compromise originates.

Layer 02

Search-by-domain marketplaces

Russian Market, 2easy, and a rotating cast of successors. Buyers can filter listings by employer domain, which is exactly what makes them dangerous to you.

Layer 03

Telegram drop channels

Free-sample channels and invite-only paid drops. Increasingly where operators publish first, often hours before marketplace listings.

Layer 04

Combolists

Curated email-and-password pairs assembled for credential stuffing. A combolist hit means someone is actively trying to log in as your users right now.

Layer 05

Hacker forums, paste sites, Discord

BreachForums (and its many successors), XSS, Exploit.in, Discord channels where threat actors discuss targets. Often the first signal that a breach is being prepared for sale.

Build vs buy

Building this collection internally is technically possible but operationally brutal. Marketplaces require buyer accounts, Telegram requires a network of personas to access invite-only drops, and stealer-log parsing is its own engineering problem. Most teams that try to DIY end up covering one or two layers and missing the rest. If the monitoring is core to your product or your investigation team's research output, building makes sense. If it's a defensive function, paying a vendor is the rational call.

05 · Workflow

Build the workflow: alert → triage → action

A monitoring program isn't the tool — it's the workflow on top of it. Three stages, each with a different time pressure and a different owner.

1

Alert

A match fires. The alert should carry the credential username, source (which marketplace / which stealer family), original harvest date, and a unique log ID. Send it to wherever your SOC actually works — Slack, Jira, Splunk, Sentinel — not a separate email inbox no one watches.

2

Triage

Pull the full record. What other credentials are in the same stealer log? Which applications was the user signed into? Which other employees were on the same device? This is where the platform's pivot surface (search by username, hash, IP, hostname) matters most.

3

Action

Reset the password. Invalidate every active session. Force re-MFA. Run an EDR sweep on the device. Open a ticket to coach the user on infostealer hygiene. The whole sequence should be under 30 minutes for a P0 hit.

WhiteIntel dashboard showing live infostealer and credential leak activity
WhiteIntel dashboard: 24h and 30d credential ingest, infected systems, ransomware victims, and live dark-web chatter — the operational pulse for a monitoring program.
06 · Investigation

Triaging a single match

Every alert is the start of an investigation. The questions you want answered, in order:

  1. Is this a real user? Match the username against your IdP. Active employee, former employee, contractor, or never on your roster?
  2. Is the credential still valid? Some stealer logs are months old. Force a password reset and see if it actually changes anything.
  3. What else was stolen from the same device? A stealer log is rarely about one credential. The same dump contains every saved password from that browser session — typically 20-200 entries. Pivot to find them all.
  4. Which apps were affected? Look for high-value ones — admin consoles, code repos, cloud providers, email. Those drive the response priority.
  5. What's the device's history? Has this hostname or IP appeared in earlier stealer logs? Is the user a repeat victim? Are other employees on the same network?

Answering all five takes a search interface that pivots across multiple dimensions at once — by domain, by username, by device hostname, by IP, by malware family. Without that, every alert becomes a separate investigation with no shared context.

WhiteIntel global search pivoting across multiple identifier types
Global Search: pivot a single match across email, domain, IP, computer name, and APK package — every exposure linked to one infection in one query.
07 · Common pitfalls

Mistakes to avoid

Treating every match as an incident

Old breach hits will outnumber live infostealer hits by 50 to 1. If you ticket all of them at the same priority, your team will tune out by week three. Separate streams, separate playbooks.

Watching only your primary domain

Stealer logs index by every URL the user saved a credential against. If your employees log into ad accounts, partner portals, SaaS tools, or acquired-brand domains, those need to be on the watchlist too.

Resetting the password and calling it done

A stealer log usually also contains the user's browser session cookies, which bypass password resets entirely. Invalidate every active session for that user. Reissue MFA factors. Sweep the device with EDR.

Reading "match count" as the success metric

More matches isn't better — it usually means duplicates are slipping through. The metrics that matter are time-to-detection (hours), time-to-response (minutes), and the ratio of P0 to P2 alerts.

Skipping the lookalike layer

A monitoring program that doesn't track newly registered look-alike domains is missing the upstream side of the same threat. The phishing site that drops the stealer is often live for days before the first infection — visible if you're watching for it.

08 · Our Approach

How WhiteIntel handles this

Honest disclosure, this is our blog. WhiteIntel runs continuous collection across all five layers — infostealer logs, marketplaces, Telegram, combolists, and forums — plus look-alike domain registrations. Every match is enriched with the source, harvest timestamp, malware family, and the full set of accounts compromised from the same device.

Time-to-first-alert is same day. Webhooks, SIEM, Jira, and Slack integrations are included rather than gated as an enterprise tier. Pricing is published publicly and starts at $200/month. You can run a monitoring scan on your domain in under five minutes from signup, no sales call required.

For deeper reads: our buyer's guide to dark web monitoring covers vendor evaluation criteria, the 48-hour infostealer kill chain walks the timing problem, and building a credential monitoring program covers the internal-ops side.

09 · FAQ

Frequently asked questions

Can I monitor stolen credentials on the dark web myself without a vendor?

Technically yes, practically difficult. You'd need to operate buyer accounts on marketplaces like Russian Market, maintain Telegram personas to access invite-only drop channels, build stealer-log parsers for each malware family (Redline, Lumma, StealC have different folder structures), and deduplicate against historical compilations. Most teams that try end up covering one or two layers and missing the rest. Building makes sense if dark-web research is core to your product; buying makes sense if monitoring is a defensive function.

How quickly should stolen credentials be detected after they're harvested?

For infostealer logs, the target is under 48 hours from harvest to alert. The median time between credentials being stolen from an endpoint and being listed on a marketplace is around 48 hours, and active exploitation typically begins within days. Detection beyond two weeks is forensic, not preventive.

What should I do when a credential leak alert fires?

Reset the password, invalidate every active session (cookies and OAuth tokens, not just the password), reissue MFA factors, and run an EDR sweep on the affected device since stealer logs usually mean an active malware infection. Modern stealer logs include session tokens that bypass password changes, so a password reset alone is not enough.

Is dark web monitoring legal?

Yes. Consuming open intelligence — listings, paste sites, public Telegram channels, marketplace pages — is legal in most jurisdictions. The legal grey areas come from actively engaging with operators (purchasing data, infiltrating private spaces), which is why most enterprise monitoring services work through carefully separated collection layers.

What's the difference between dark web monitoring and historical breach lookup?

Historical breach lookup matches your users against a database of leaked credentials from past breaches (LinkedIn 2021, Adobe 2013, etc.). Dark web monitoring continuously ingests fresh stealer logs, marketplace listings, and Telegram drops in near real-time. The first is useful for password-hygiene audits; the second is what actually prevents account takeover.

What sources should a credential monitoring program cover?

Five layers carry almost all live signal: (1) infostealer log dumps from Redline, Lumma, StealC and other malware families; (2) search-by-domain marketplaces like Russian Market and 2easy; (3) Telegram drop channels (free samples and paid invite-only); (4) combolists used for credential stuffing; and (5) hacker forums, paste sites, and Discord servers. A program missing any one of these is missing a class of compromise.

Try it on your domain

See what's exposed in under five minutes

Add your domain. Get alerts on credentials sitting on marketplaces, in stealer logs, and on Telegram. No sales call, no demo gating.

Read next