Sponsored by Hudson Rock – Use Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are leading to ransomware attacks
| Favicon | Title | Type | Available | Last Visit | Server Info | FQDN | |
|---|---|---|---|---|---|---|---|
|
|
RansomHub | Home | No | 2026-04-28T07:26:01 |
ransomxifxwc5eteopdobynonjctkxxvap77yqifu2emfbecgbqdw6qd.onion
|
|||
|
|
Index of / | No | 2026-04-28T07:28:34 |
ransomgxjnwmu5ceqwo2jrjssxpoicolmgismfpnslaixg3pgpe5qcad.onion
|
|||
|
|
Index of / | No | 2026-04-28T07:31:06 |
fpwwt67hm3mkt6hdavkfyqi42oo3vkaggvjj4kxdr2ivsbzyka5yr2qd.onion
|
| Discovery | RMM Tools | Defense Evasion | Credential Theft | OffSec | Networking | LOLBAS | Exfiltration |
|---|---|---|---|---|---|---|---|
|
Angry IP Scanner
Nmap
SoftPerfect NetScan
WKTools
|
AnyDesk
Atera
N-Able
ScreenConnect
Splashtop
TightVNC
|
Acronis Disk Director
BadRentdrv2
Revo Uninstaller
ThreatFire System Monitor driver (BYOVD)
|
Mimikatz
|
Cobalt Strike
CrackMapExec
Impacket
Kerbrute
Metasploit
NetExec
Sliver
|
Cloudflared
Ngrok
Stowaway
|
BITSAdmin
PsExec
WMIC
|
FileZilla
PSCP
RClone
WinSCP
|
| Vendor | Product | CVE | Source |
|---|---|---|---|
| Apache | ActiveMQ | CVE-2023-46604 | cisa.gov |
| Atlassian | Confluence Data Center & Server | CVE-2023-22515 | cisa.gov |
| Citrix | NetScaler ADC & Gateway | CVE-2023-3519 | cisa.gov |
| Fortinet | FortiOS SSL-VPN & FortiProxy | CVE-2023-27997 | cisa.gov |
| Fortinet | FortiClientEMS | CVE-2023-48788 | cisa.gov |
| F5 | BIG-IP | CVE-2023-46747 | cisa.gov |
| Windows | NetLogon | CVE-2020-1472 | cisa.gov |
| Windows | BITS | CVE-2020-0787 | cisa.gov |
| Windows | SMBv1 | CVE-2017-0144 | cisa.gov |
| Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Impact | Resource Development |
|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Valid Accounts | Windows Management Instrumentation | Account Manipulation | Exploitation for Privilege Escalation | Obfuscated Files or Information | OS Credential Dumping | System Service Discovery | Remote Services | Data from Local System | Exfiltration Over Alternative Protocol | Application Layer Protocol: Web Protocols | Data Encrypted for Impact | Compromise Accounts |
| Valid Accounts: Local Accounts | Command and Scripting Interpreter | External Remote Services | Abuse Elevation Control Mechanism: Bypass UAC | Obfuscated Files or Information: Embedded Payloads | OS Credential Dumping: LSASS Memory | Internet Connection Discovery | Remote Services: Remote Desktop Protocol | Exfiltration Over Alternative Protocol: Asymmetric Encrypted Non-C2 Protocol | Web Service: Bidirectional Communication | Service Stop | ||
| Exploit Public-Facing Application | Command and Scripting Interpreter: PowerShell | Create Account | Obfuscated Files or Information: Encrypted/Encoded File | OS Credential Dumping: NTDS | Remote System Discovery | Remote Services: SMB/Windows Admin Shares | Exfiltration Over Alternative Protocol: Unencrypted Non-C2 Protocol | Remote Access Tools | Inhibit System Recovery | |||
| Phishing: Spearphishing Attachment | Command and Scripting Interpreter: Windows Command Shell | Create Account: Local Account | Masquerading | OS Credential Dumping: /etc/passwd and /etc/shadow | System Owner/User Discovery | Remote Services: SSH | Transfer Data to Cloud Account | System Shutdown/Reboot | ||||
| Phishing: Spearphishing Voice | Command and Scripting Interpreter: Python | Create Account: Domain Account | Process Injection: Process Hollowing | Brute Force | Network Service Discovery | Exploitation of Remote Services | Exfiltration Over Web Service | Account Access Removal | ||||
| Exploitation for Client Execution | Boot or Logon Autostart Execution | Indicator Removal | Brute Force: Password Spraying | Process Discovery | Lateral Tool Transfer | Exfiltration Over Web Service: Exfiltration to Cloud Storage | Disk Wipe: Disk Content Wipe | |||||
| Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder | Indicator Removal: Clear Windows Event Logs | Credentials from Password Stores: Password Managers | System Information Discovery | |||||||||
| Boot or Logon Autostart Execution: Winlogon Helper DLL | Modify Registry | File and Directory Discovery | ||||||||||
| Access Token Manipulation | Account Discovery | |||||||||||
| Access Token Manipulation: Token Impersonation/Theft | Account Discovery: Local Account | |||||||||||
| File and Directory Permissions Modification: Windows Permissions | Account Discovery: Domain Account | |||||||||||
| Execution Guardrails | Peripheral Device Discovery | |||||||||||
| Domain or Tenant Policy Modification: Group Policy Modification | Network Share Discovery | |||||||||||
| Impair Defenses: Disable or Modify Tools | Domain Trust Discovery | |||||||||||
| Impair Defenses: Disable or Modify Tools | ||||||||||||
| Hidden Artifacts | ||||||||||||
| Hidden Artifacts: Hidden Window | ||||||||||||
| Reflective DLL Injection |