Sponsored by Hudson Rock – Use Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are leading to ransomware attacks
| Favicon | Title | Type | Available | Last Visit | Server Info | FQDN | |
|---|---|---|---|---|---|---|---|
|
|
NitroBlog | No | 2026-05-20T12:43:06 |
nitrogenczslprh3xyw6lh5xyjvmsz7ciljoqxxknd7uymkfetfhgvqd.onion
|
|||
|
|
No | 2026-04-28T07:21:15 |
6lrsxvqscxtznb4fhux5u3vbslbanxjzxzgtokjtfwaitxe4pfgfebad.onion
|
| Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control |
|---|---|---|---|---|---|---|---|---|---|---|
| Drive-by Compromise | Command and Scripting Interpreter | Scheduled Task/Job | Exploitation for Privilege Escalation | Obfuscated Files or Information | OS Credential Dumping: LSASS Memory | System Service Discovery | Remote Services: Remote Desktop Protocol | Automated Collection | Automated Exfiltration | Application Layer Protocol |
| Command and Scripting Interpreter: PowerShell | Scheduled Task/Job: Scheduled Task | System Binary Proxy Execution | Process Discovery | Remote Services: SMB/Windows Admin Shares | Exfiltration Over C2 Channel | Application Layer Protocol: Web Protocols | ||||
| User Execution: Malicious File |