Featured image for The Stealer Log Ecosystem: Processing Millions of Credentials a Day

Featured

Tuesday, October 21, 2025

The Stealer Log Ecosystem: Processing Millions of Credentials a Day

In early November of last year Synthient would take on a research project to map out the cybercrime ecosystem. In that effort we would go on to ingest several billion credentials from combolists, stealer logs and database dumps.

RSS Feed

GhostSocks: From Initial Access to Residential Proxy

This blog post explores the Malware as a Service (MAAS) ecosystem and its adoption of GhostSocks the proxy based malware.

Announcing the Synthient IP Risk Database

Residential proxies pose numerous challenges to online platforms. Static indicators fall short, with residential proxy providers using sketchy mobile SDKs or free VPN apps to build large pools of IP addresses. Attackers can use these IP addresses to conceal their attacks making it appear as if each request is coming from a legitimate device. This latest release of Synthient V3 aims to improve the identification of leased IP addresses and the detection of active proxies...

What is Synthient?

Synthient was founded over a year ago out of a necessity to build better cybersecurity products. Learn what the values are and how that has shaped the company. Everything from our work to the products we build is built from these ideas.