Access to the cloud of logs from stealers.
Allmost all crypto logs are in the cloud.
The logs contain wallets and all other information....