Sponsored by Hudson Rock – Use Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are leading to ransomware attacks
| Favicon | Title | Type | Available | Last Visit | Server Info | FQDN | |
|---|---|---|---|---|---|---|---|
|
|
404 Not Found | No | 2026-04-28T07:26:13 |
dnpscnbaix6nkwvystl3yxglz7nteicqrou3t75tpcc5532cztc46qyd.onion
|
|||
|
|
404 Not Found | No | 2026-04-28T07:28:46 |
aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion
|
|||
|
|
Blog | No | 2026-04-28T07:31:13 |
blogxxu75w63ujqarv476otld7cyjkq4yoswzt4ijadkjwvg3vrvd5yd.onion
|
| Discovery | RMM Tools | Defense Evasion | Credential Theft | OffSec | Networking | LOLBAS | Exfiltration |
|---|---|---|---|---|---|---|---|
|
AdFind
Bloodhound
|
|
|
|
Cobalt Strike
|
|
BITSAdmin
|
PrivatLab
RClone
Sendspace
|
| Initial Access | Execution | Defense Evasion | Credential Access | Discovery | Lateral Movement | Exfiltration | Command and Control | Impact |
|---|---|---|---|---|---|---|---|---|
| Valid Accounts | Command and Scripting Interpreter: PowerShell | Obfuscated Files or Information | OS Credential Dumping: LSASS Memory | System Information Discovery | Remote Services: Remote Desktop Protocol | Exfiltration Over Web Service: Exfiltration to Cloud Storage | Application Layer Protocol: Web Protocols | Data Encrypted for Impact |
| Exploit Public-Facing Application | Signed Binary Proxy Execution: Msiexec | Virtualization/Sandbox Evasion | Network Share Discovery | Inhibit System Recovery | ||||
| Supply Chain Compromise | Disable or Modify Tools |