Criminal Infrastructure
What Is a Combo List?
A combo list is a compilation of stolen usernames, email addresses, and passwords aggregated from multiple sources into structured text files, typically in "EMAIL:PASSWORD" format.
A combo list is a compilation of stolen usernames, email addresses, and passwords aggregated from multiple sources into structured text files, typically in "EMAIL:PASSWORD" format. These lists are created by aggregating previously leaked credentials from various data breaches, infostealer logs, and other sources into massive credential collections used for automated attack campaigns.
Combo lists enable credential stuffing attacks—automated processes that rapidly test stolen credentials against target services to identify valid logins. When attackers obtain a combo list containing millions of credential pairs, specialized tools cycle through the credentials attempting login across banking sites, e-commerce platforms, corporate VPN portals, and other authentication systems. Successful logins, called "hits," are immediately exploited for fraud, data theft, or lateral movement.
The scale is staggering. According to DeepStrike's "Compromised Credential Statistics 2025: Costs, Trends, Defenses" report (2025), more than 2 billion credentials now circulate from combined stealer malware and historical breaches. Credential stuffing attacks leveraging combo lists grew 84% year-over-year in 2024, with early 2025 data suggesting approximately a 180% jump in credential theft over 2023.
How do combo lists work?
Combo lists are constructed through systematic aggregation and normalization processes.
Source collection begins with criminals aggregating credentials from multiple breach databases, stealer logs, and leaked datasets. These sources include publicly disclosed data breaches, privately traded breach databases, infostealer malware output, and credentials harvested through phishing campaigns. Data normalization converts various credential formats into standardized "EMAIL:PASSWORD" text format, making the credentials usable across automated attack tools. Deduplication removes duplicate entries across compiled sources, though significant duplication persists across separately compiled lists.
Organization follows, with credentials sorted by domain, quality tier, or freshness. Premium combo lists segment credentials by target service, geographic region, or validation status. Distribution occurs through dark web markets, Telegram channels, or direct sales to criminal buyers.
Once compiled, combo lists enable automated credential stuffing attacks. Specialized tools rapidly test credentials against target services, cycling through large credential sets to identify valid logins. Attackers verify credentials through automated login attempts; successful authentications are called "hits." Verified credentials command higher prices and are resold separately from unverified lists. Successful logins trigger immediate exploitation for fraud, data theft, account takeover, or sale to other criminals.
The pricing structure reflects validation status and target value. According to Trustwave's "How Prices are Set on the Dark Web" report (2024), raw combo lists sell for $5-$50 depending on size and age. Verified credentials ("hits") command $1-$20 per confirmed valid credential depending on target service. Premium enterprise credentials fetch $50-$500+ for high-value targets. Bulk access negotiations establish flat rates for all verified hits within specific domains.
Verizon's 2025 Data Breach Investigations Report found that 22% of breaches began with stolen credentials. If only 1% of 2 billion credentials are valid for any given service, attackers can automate successful logins indefinitely. The credential reuse problem amplifies this: the average user reuses passwords across 4.8 services, meaning compromised credentials in combo lists multiply in effective value.
The phishing-as-a-service connection accelerates credential availability. According to BreachSense's 2024 analysis, phishing-as-a-service kits are expected to account for 50% of credential theft by 2025, up from 30% in 2024. Quishing (QR code phishing) grew 25% year-over-year, with 17% of phishing attacks now incorporating QR codes. DeepStrike's 2025 research indicates that 89% of QR phishing attacks target credential theft specifically, feeding fresh credentials into combo list compilations.
How do combo lists differ from stealer logs and fullz?
Aspect | Combo List | Stealer Logs | Fullz |
|---|---|---|---|
Source | Multiple breaches aggregated | Single infected system | Complete identity profiles |
Data Included | Email + password pairs | Passwords, cookies, financial data, screenshots, system info | Full PII (name, SSN, address, financial data) |
Format | Text files (EMAIL:PASSWORD) | ZIP files with multiple data types | Structured identity profiles |
Scale | Billions of credentials | 1.8B credentials stolen annually | Millions of profiles on markets |
Primary Attack | Credential stuffing | Initial access, network reconnaissance | Identity theft, account takeover |
Verification | Requires testing against targets | Pre-harvested, lower verification needed | Higher initial credibility |
Market Price | $5-$50 raw; hits: $1-$20 | $1-$100+ per log | $20-$500+ per profile |
Ideal for | Automated credential stuffing | Initial system compromise | Identity theft operations |
Combo lists aggregate credentials from multiple historical breaches into simple text files containing only email/password pairs. Stealer logs capture comprehensive data from single compromised systems in structured ZIP files. Fullz contain complete identity profiles including social security numbers, addresses, and financial account details.
Data scope distinguishes them operationally. Combo lists contain only username/password pairs stripped of contextual information. Stealer logs include passwords, cookies, financial data, screenshots, and system information collected directly from infected devices. Fullz expand to include full personally identifiable information like names, social security numbers, addresses, dates of birth, and financial account credentials.
Format differences affect usage. Combo lists use simple text format optimized for automated credential stuffing tools. Stealer logs arrive as ZIP files containing multiple data types organized in folders and files. Fullz are structured identity profiles formatted for identity theft and account takeover operations requiring extensive personal verification.
Source differences matter for freshness. Combo lists represent historical aggregations from multiple breaches over time, with significant age variation. Stealer logs come from recent system compromises and contain fresh data harvested directly from active systems. Fullz are assembled identity profiles constructed from various sources.
Primary attack applications reflect these characteristics. Combo lists power automated credential stuffing campaigns against authentication systems at scale. Stealer logs enable initial network access, credential harvesting, and system reconnaissance. Fullz support identity theft, financial fraud, and sophisticated account takeover requiring extensive personal details for verification.
Why do combo lists matter?
Combo lists democratize cybercrime by lowering the technical barrier to credential-based attacks. Even unsophisticated attackers can launch credential stuffing campaigns using purchased lists and freely available automation tools. This accessibility drives the credential stuffing attack surge—an 84% year-over-year increase in 2024 according to DeepStrike's 2025 research.
The ransomware connection is particularly severe. DeepStrike's 2025 analysis found that 54% of ransomware victims had credentials exposed in stealer log and combo list marketplaces before the attack. Ransomware groups use combo lists to identify valid credentials for network entry, lateral movement, and privilege escalation. The combination of stolen credentials from combo lists and targeted credential stuffing precedes 80%+ of enterprise ransomware attacks.
Notable incidents demonstrate the scale. The "Combo List 93M" incident exposed 93 million email/password pairs on dark web markets simultaneously. Researchers regularly observe 50M-200M credential sets compiled and distributed through underground channels. According to Strategic Revenue's 2024 analysis, market accessibility means that combo lists enable credential stuffing campaigns by attackers with minimal technical skills.
The credential reuse problem amplifies damage. Users reusing passwords across 4.8 services on average means that a single compromised credential from a low-security service breach enables attacks against high-security targets. Banking, corporate VPN, and cloud service accounts become vulnerable when users reuse passwords from compromised entertainment or social media accounts.
Organizational exposure is widespread. If any employee uses the same password across personal and corporate accounts, combo lists containing those personal credentials threaten corporate systems. Group-IB's 2024 research indicates that organizations with leaked credentials on dark web markets are 2.5 times more likely to suffer breaches involving fullz-enabled attacks.
The economic impact is substantial. According to DataDome's 2024 analysis, account takeover fraud costs reached approximately $15.6 billion in 2024, representing a 23% increase from the previous year. Combo lists significantly increase ATO success rates—credentials alone may yield 1-3% success, but combo lists enable automated testing at scale that makes even low success rates profitable.
What are the limitations of combo lists?
High credential staleness: Many passwords in combo lists are months or years old and no longer valid. Users change passwords, accounts close, or services implement forced resets. Even premium combo lists may yield only 1-5% valid credentials depending on target service and time elapsed since breach. According to Group-IB's "Combolists and ULP Files on the Dark Web" report (2024), effective unique credentials available drop significantly as lists age.
Duplicate proliferation: The same credentials appear in multiple lists across markets, reducing the effective unique credential count. Criminals repackage and resell the same breached data under different names. This duplication creates artificial scale; advertised credential counts often exceed actual unique valid credentials by 50-80%.
Compromised integrity: Combo lists from unreliable sources may contain fake credentials injected to poison competitor lists or honeypot credentials inserted by security researchers. Buyers cannot verify authenticity or freshness before purchase, creating trust deficits. SecurityResearch's 2025 analysis indicates that 15-30% of advertised combo list contents may be fabricated or poisoned.
MFA defeats credential-only attacks: Multi-factor authentication eliminates utility of password-only credentials. Organizations implementing MFA reduce successful credential stuffing by 90%+ according to security industry analysis. While attackers increasingly target MFA bypass techniques, standard credential stuffing against MFA-protected services yields minimal results.
Automated defenses improving: Credential stuffing detection systems increasingly block patterns associated with combo list usage. Rate limiting, CAPTCHA challenges, behavioral analysis, and machine learning models identify automated login attempts. DataDome's 2025 research shows that advanced detection systems block 85-95% of credential stuffing attacks.
Service-specific obsolescence: Credentials valid for one service may have been changed on other services. Users who experienced a breach often change passwords on high-value accounts while leaving low-value accounts unchanged. This selective security behavior reduces combo list utility for high-value targets.
How can organizations defend against combo lists?
Require unique passwords per service using password managers like Bitwarden, 1Password, or KeePass. Password managers maintain unique credentials for each account, breaking the credential reuse pattern that makes combo lists effective. According to DeepStrike's 2025 guidance, password manager adoption reduces credential stuffing success rates by 95%+ as compromised credentials from one breach cannot be used against other services.
Enable multi-factor authentication on all accounts, especially email, banking, VPN access, and critical services. MFA implementation reduces successful credential-based attacks by 90%+ even when valid passwords are compromised. Organizations should enforce MFA for all external access points and consider adaptive MFA that increases authentication requirements based on risk indicators.
Deploy credential stuffing detection systems using behavioral analytics rather than relying solely on IP reputation. DataDome, Imperva, and Cloudflare offer solutions analyzing request patterns, device fingerprinting, and behavioral signals to identify automated attacks. These systems detect coordinated credential stuffing across distributed infrastructure even when attackers use residential proxies.
Implement rate limiting and CAPTCHA challenges on authentication endpoints. Login attempt throttling prevents rapid automated testing of credential lists. Adaptive CAPTCHA systems increase challenge difficulty when suspicious patterns emerge. Velocity checks monitor for impossible travel—authenticated sessions from one geographic location then instantly another—indicating credential compromise.
Subscribe to dark web monitoring services that detect organizational credentials in combo list marketplaces. Have I Been Pwned, SpyCloud, and Flashpoint offer monitoring platforms alerting when employee or customer credentials appear in breached databases or combo lists. Upon detection, organizations should immediately reset all affected credentials and investigate for signs of compromise.
Configure SIEM systems to monitor for bulk login attempts with varied usernames but similar patterns. Failed authentication attempts from common sources, sequential credential testing, or distributed attacks coordinated from botnet infrastructure all indicate combo list usage. User behavior analytics identify logins from anomalous geographic locations or devices, flagging potential account takeover attempts.
Deploy adaptive authentication increasing verification requirements based on risk signals. Systems analyzing geographic location, device fingerprinting, time of access, and behavioral patterns can require additional authentication factors when anomalies emerge. This approach prevents account takeover even when valid credentials are compromised.
Immediately reset all credentials upon detection of organizational presence in combo lists. Incident response protocols should treat combo list appearances as active compromises requiring immediate action. Force password resets, rotate API keys, review access logs for unauthorized activity, and monitor for lateral movement or privilege escalation.
FAQs
What's the difference between a "combo list" and a "breached database"?
Combo lists are aggregations of credentials from multiple sources compiled into single collections, while breached databases represent single-source dumps from individual incidents. A combo list might contain 50 million credentials from 500 different breaches mixed together, whereas a breach database contains credentials from one specific incident. According to Group-IB's 2024 research, combo lists are more valuable for credential stuffing because they increase the probability of hitting multiple services with the same email address. Attackers prefer combo lists over individual breach databases because users reusing passwords across services mean aggregated credentials multiply attack opportunities. Breach databases require attackers to compile and normalize data themselves; combo lists arrive pre-processed and optimized for automated attacks.
How do criminals know if a credential in a combo list actually works?
They test it through automated credential stuffing tools that rapidly attempt login with each credential against target services. Valid credentials are called "hits" and immediately resold at premium prices. According to StealthMole's "Combo Lists: The Criminal's Key for Cyber Attacks" report (2024), the testing process is largely automated, allowing attackers to verify millions of credentials in hours. Specialized software distributes login attempts across residential proxies to evade detection, tests credentials against multiple services simultaneously, and flags successful authentications for immediate exploitation or resale. The verification infrastructure operates similarly to penetration testing tools but at criminal scale. Some attackers offer "validation-as-a-service" where they verify combo lists for other criminals in exchange for percentage of valid hits discovered.
Are combo lists used for anything other than credential stuffing?
Yes, but credential stuffing remains the primary application. Combo lists also support account takeover fraud where criminals use valid credentials to access accounts for financial theft or data exfiltration. Identity theft operations may use combo list credentials combined with public information for social engineering attacks. According to Group-IB's 2024 analysis, phishing campaigns sometimes use combo lists for post-breach credential verification—attackers send phishing emails specifically to addresses in combo lists to update potentially changed passwords. However, the credential stuffing use case dominates because automation enables testing millions of credentials with minimal manual effort. The economic model favors volume: even 1% success rates yield thousands of compromised accounts when testing millions of credentials.
How often are combo lists updated with new credentials?
Continuously. Active combo lists receive new credentials daily from infostealer malware, new breaches, and other sources. According to BreachSense's 2024 research, some dark web vendors maintain "fresh" combo lists updated within hours of breach disclosure. However, the average combo list ages rapidly; 6-month-old credentials have significantly reduced attack value as users change passwords, accounts close, or organizations implement forced resets. Criminals prioritize freshness, continuously regenerating combo lists from new breaches to maintain effectiveness. The market operates on freshness tiers: premium "fresh" lists (hours to days old) command 5-10x pricing versus aged lists (months old). DeepStrike's 2025 analysis indicates that fresh combo lists from recent stealer malware may have 30-50% valid rates, while older aggregations drop to 1-5% validity.
What percentage of combo list credentials are actually valid for their target accounts?
Highly variable depending on list age and source. According to Group-IB's 2024 research, fresh combo lists from recent stealer malware may have 30-50% valid rates for password-protected services. Older aggregations drop to 1-5% validity as users change passwords or delete accounts. When users change passwords or services implement forced resets, credentials become invalid. This degradation is why attackers continuously seek fresh credentials and prioritize recent breaches. The credential reuse factor improves effectiveness—users reusing passwords across 4.8 services on average means that even aged credentials may remain valid on some services while invalid on others. Attackers test credentials against multiple targets simultaneously, improving overall hit rates through diversification. Enterprise credentials maintain value longer because corporate password rotation policies are often quarterly or annual, giving attackers months of validity.



