Sponsored by Hudson Rock – Use Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are leading to ransomware attacks
| Favicon | Title | Type | Available | Last Visit | Server Info | FQDN | |
|---|---|---|---|---|---|---|---|
|
|
Database Shop | No | 2026-04-28T07:21:45 |
3slz4povugieoi3tw7sblxoowxhbzxeju427cffsst5fo2tizepwatid.onion
|
|||
|
|
Stormous _ official Site | No | 2026-04-28T07:24:18 |
h3reihqb2y7woqdary2g3bmk3apgtxuyhx4j2ftovbhe3l5svev7bdyd.onion
|
|||
|
|
Stormous.Leak | No | 2026-05-21T14:36:56 |
pdcizqzjitsgfcgqeyhuee5u6uki6zy5slzioinlhx6xjnsw25irdgqd.onion
|
|||
|
|
StormouS.X BLOG | Official blog | No | 2026-04-28T07:26:54 |
stmxylixiz4atpmkspvhkym4xccjvpcv3v67uh3dze7xwwhtnz4faxid.onion
|
| Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Impact | Resource Development | Reconnaissance |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Valid Accounts | Command and Scripting Interpreter | Scheduled Task/Job | Abuse Elevation Control Mechanism: Bypass UAC | Obfuscated Files or Information | OS Credential Dumping | Network Service Discovery | Remote Services: Remote Desktop Protocol | Data from Local System | Exfiltration Over C2 Channel | Application Layer Protocol: Web Protocols | Data Encrypted for Impact | Obtain Capabilities: Tool | Active Scanning |
| Exploit Public-Facing Application | Command and Scripting Interpreter: Visual Basic | Account Manipulation | Obfuscated Files or Information: Software Packing | File and Directory Discovery | Remote Services: SMB/Windows Admin Shares | Archive Collected Data | Exfiltration Over Web Service: Exfiltration to Cloud Storage | Inhibit System Recovery | |||||
| Trusted Relationship | User Execution: Malicious File | Server Software Component: Web Shell | Obfuscated Files or Information: Fileless Storage | ||||||||||
| Phishing | Create or Modify System Process: Windows Service | Obfuscated Files or Information: Encrypted/Encoded File | |||||||||||
| Phishing: Spearphishing Attachment | Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder | Indicator Removal | |||||||||||
| Impair Defenses: Disable or Modify Tools |