According to recent reports from The Register, log files containing compromised online account details are being advertised on dark web marketplaces for as little as 10 cents. Once acquired, cybercriminals can easily exploit companies in a number of ways, such as by deploying ransomware in an organization's IT environment and demanding extortionate sums of money for the safe return of their company’s entire operations.
Log files are automatically generated records that store data about system activity. This includes information about running applications, services, login data, and system errors. The files are often acquired via malware, such as infostealers, that swipe account passwords, financial information, and other sensitive data from infected PCs.