Skip to the content.

This page is a sub page of the case file for case DIVD-2025-00018 - Victim Notification Operation Endgame, which contains the general information about this case.

Operation Endgame 2.0 stealer logs, 62M accounts

Operation Endgame 2.0 marks new takedowns and new information obtained by the organizations behind this operation.

Part of the information obtained by law enforcement is information from stealer logs. Log files that contain account credentials obtained from devices by specialised infomation stealer malware (infostelaers). These stealers logs contain a username, a (obfuscated) password, the url the password relates to as well as a date (and sometime time) the credentials where stolen.

DIVD is performing victim notification on this dataset, in line with our stolen credentials policy.

What does this mean?

If you, or your users are in the stealer logs it means two things:

What is DIVD doing with the data?

As per the stolen credentials policy we have compiled a two lists of apex domains one with the apex domains of the usernames and one with the apex domains of the services the credentials belong two. So if e.g. the stealer log says that somebody@gmail.com is user password hj*******H5 to access facebook.com, gmail.com would be on the email_apex list and facebook.com will be on the url_apexes list.

We will provide certs, csirts and security teams with the records for those domains they can prove falls under their jursidiction. Please review the apex lists for you domains. Beware the certain lists are long then excel can handle.

My domains are on the list, what should I do?

More questions?

The main case file contains a Frequently Asked Questions (FAQ) section. If that does not answer your questions, please reply to the email you received or email us at DIVD-2025-00018@csirt.divd.nl.

For more information, see the main case file.