Stolen credentials aren’t just sold on the dark web. They’re priced, packaged, and traded with the same market dynamics as any other commodity.
Walk into any underground marketplace and you’ll find something disorienting: professional commerce. Product categories are neatly organized, customer reviews help buyers assess quality, and pricing reflects supply and demand with the same precision you’d find on any legitimate e-commerce platform. The only difference is the inventory, which consists of your employees’ passwords, your customers’ identities, and the keys to your network. This isn’t the shadowy underworld that popular imagination conjures; it’s retail, operating at scale.
Understanding this economy matters because the infrastructure that prices and distributes stolen data also reveals where interventions can be most effective.
The pricing is remarkably transparent. A Social Security number sells for as little as $1. Online banking logins with verified balances fetch $200 to over $1,000. A complete identity package with enough documentation to open accounts and assume someone’s financial life runs about $1,000. These aren’t estimates from years past; they’re current market rates tracked by researchers monitoring underground marketplaces in 2025.
The scale matches the precision. According to recent analysis, approximately 15 billion stolen credentials currently circulate on the dark web, and organizations whose credentials appear in these markets are 2.5 times more likely to suffer a breach. As SpyCloud’s 2025 research observed, credential exposure has become “the most reliable predictor of future account compromise,” with the window between exposure and exploitation continuing to shrink. The connection between marketplace presence and breach risk isn’t theoretical. It’s statistical.
How credentials move from breach to marketplace
The journey from initial theft to final sale follows a predictable supply chain, with each stage adding value along the way.
Credential harvesting happens through multiple channels. Phishing campaigns remain the most common vector, but infostealers deployed through malicious downloads now capture credentials directly from browsers, password managers, and session cookies. A single successful infostealer deployment can yield hundreds of saved passwords from one victim’s machine, which explains why these tools have become so attractive to criminal operators.
The stolen data first appears in “logs,” raw dumps of harvested credentials sold in bulk on marketplaces for $10 to $50 per log. Buyers at this stage are often aggregators who sort, validate, and repackage the data for resale. Credentials get tested against common services to confirm they still work, and working logins command significantly higher prices; verified banking access with confirmed balances can sell for 10 to 20 times the cost of unverified data.
The final stage involves specialized resale through access brokers who focus on high-value targets: corporate email accounts, cloud administration consoles, and VPN credentials that provide network entry. These sales often happen in closed forums or invite-only Telegram channels, with prices ranging from hundreds to tens of thousands of dollars depending on the target’s perceived value. A domain admin credential for a mid-sized company might fetch $5,000 to $50,000.
How AI changed the economics
The integration of AI into credential theft operations has shifted the economics in ways that matter for defenders, primarily by combining scale with personalization in ways that weren’t previously possible.
Large language models now generate phishing emails that match the tone and style of legitimate communications, then tailor them using scraped data from LinkedIn profiles and public sources. The same technology populates phishing site templates with brand-accurate copy, FAQs, and even support chat interfaces. A novice operator can spin up thousands of convincing clones with minimal technical skill, capabilities that previously required sophisticated criminal infrastructure to develop and maintain.
Phishing kits have become turnkey services that extend well beyond raw credential data. Underground marketplaces now sell complete phishing infrastructure: site builders, hosting services, redirect tools, and admin panels for managing harvested credentials. These kits often include cloaking mechanisms that show benign content to automated scanners while serving malicious pages to human visitors, which extends campaign lifespan considerably before detection.
The feedback loops are getting tighter as well. Attackers use campaign telemetry to identify which lures generate clicks and which convert to credential capture, and AI models iterate on messaging based on this data, optimizing phishing content with each campaign cycle. The result is industrialized, highly targeted operations that convert far better than traditional spray-and-pray approaches ever did.
Where the attacks surface
Credentials harvested through these operations fuel several downstream attack patterns that security teams encounter daily.
Account takeover remains the most direct application, with attackers using stolen credentials for credential stuffing attacks against banking, e-commerce, and corporate applications. Because people reuse passwords across services, a credential stolen from a breached retailer can unlock a victim’s banking portal, a pattern that drives the growing ATO epidemic costing businesses billions annually.
Business email compromise depends heavily on credential access as well. Once attackers control an executive’s email account, they can monitor communications, identify pending transactions, and insert fraudulent payment instructions at exactly the right moment. The FBI’s Internet Crime Complaint Center consistently ranks BEC among the highest-loss categories of cybercrime, with executive impersonation serving as a key enabler of these schemes.
Initial access brokerage connects credential theft to ransomware operations in ways that have transformed the threat landscape. Attackers who compromise corporate networks often sell that access rather than exploiting it themselves, and ransomware operators purchase these verified entry points to reduce their own operational risk while maintaining attack volume.
What defenders can prioritize
The credential economy’s visibility cuts both ways, because the same infrastructure that enables efficient criminal trade also creates monitoring opportunities for defenders who know where to look.
Treat credential exposure as an alerting signal, not just an audit finding. When dark web monitoring identifies your organization’s credentials in marketplace listings, that’s an indicator that someone is actively trying to monetize access to your systems. The appropriate response is immediate password resets and heightened authentication monitoring, not a note for the quarterly security review.
Monitor the channels where your brand gets impersonated. Phishing campaigns increasingly use branded search ads and social media ads as entry points, routing victims to cloaked credential harvesting pages. These ad-based attacks exploit users’ habit of searching for services rather than typing URLs directly, and watching sponsored results for your brand can surface active campaigns before they fully scale.
Assume the credentials are already out there. With 15 billion credentials circulating and breach data constantly refreshing, the question isn’t whether your employees’ passwords have been exposed. It’s whether you’ll detect the resulting access attempts before they succeed. Strong authentication controls, behavioral monitoring, and rapid response capabilities matter more than hoping to prevent all exposure in the first place.
The Bottom Line
The credential economy isn’t a shadowy abstraction that exists somewhere beyond organizational concern. It’s a functioning marketplace with published prices, quality tiers, and supply chain dynamics that mirror legitimate commerce in uncomfortable ways.
Understanding those dynamics helps defenders anticipate how stolen data will be used and where interventions can disrupt the chain. The organizations getting ahead of this problem treat credential exposure as operational intelligence rather than compliance data, recognizing that when monitoring identifies exposed credentials, that’s not a report for next month’s security review. It’s an active indicator that someone may already be testing access to your systems.
Key Takeaways
Current market rates show SSNs selling for $1-$6, online banking logins for $200-$1,000+, and complete identity packages for around $1,000. Pricing reflects data freshness, verification status, and target value.
Approximately 15 billion stolen credentials circulate in underground markets. Organizations whose credentials appear in these markets are 2.5 times more likely to suffer a breach, according to 2025 research.
Stolen data flows through a supply chain: initial harvest via phishing or infostealers, bulk sale as raw “logs,” validation and sorting by aggregators, then specialized resale by access brokers who focus on high-value targets.
AI enables personalized phishing at scale, automates phishing site creation, and creates feedback loops where campaign telemetry improves future attacks. The barrier to entry has dropped significantly.
Treat credential exposure as an active threat indicator requiring immediate response. Monitor branded search and social ads for phishing campaigns. Assume credentials are already compromised and focus on detecting unauthorized access attempts.



