Sponsored by Hudson Rock – Use Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are leading to ransomware attacks
| Favicon | Title | Type | Available | Last Visit | Server Info | FQDN | |
|---|---|---|---|---|---|---|---|
|
|
No | 2026-05-13T19:07:17 |
lockbitkodidilol.onion
|
| Vendor | Product | CVE | Source |
|---|---|---|---|
| Apache | Log4j | CVE-2021-44228 | cisa.gov |
| Citrix | NetScaler ADC & Gateway | CVE-2023-4966 | doublepulsar.com |
| Fortinet | FortiOS | CVE-2018-13379 | cisa.gov |
| Fortra | GoAnywhere Managed File Transfer | CVE-2023-0669 | cisa.gov |
| F5 | iControl REST | CVE-2021-22986 | cisa.gov |
| PaperCut | PaperCut Application Server | CVE-2023-27350, CVE-2023-27351 | twitter.com/MsftSecIntel |
| Windows | NetLogon | CVE-2020-1472 | cisa.gov |
| Windows | Remote Desktop Services | CVE-2019-0708 | cisa.gov |
| Initial Access | Execution | Persistence | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Impact |
|---|---|---|---|---|---|---|---|---|---|---|
| Valid Accounts | Windows Management Instrumentation | Boot or Logon Autostart Execution: Registry Run Keys | Obfuscated Files or Information | OS Credential Dumping: LSASS Memory | Network Service Discovery | Remote Services: Remote Desktop Protocol | Archive Collected Data: Archive via Utility | Exfiltration Over Alternative Protocol | Proxy: Multi-hop Proxy | Data Encrypted for Impact |
| Exploit Public-Facing Application | Scheduled Task/Job: Scheduled Task | Indicator Removal: Clear Windows Event Logs | Brute Force | Domain Trust Discovery | Remote Services: SMB/Windows Admin Shares | Exfiltration Over Web Service: Exfiltration to Cloud Storage | Remote Access Software | Service Stop | ||
| Phishing | Command and Scripting Interpreter: PowerShell | Disable or Modify Tools | Exploitation of Remote Services | Inhibit System Recovery |