Sponsored by Hudson Rock – Use Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are leading to ransomware attacks
| Favicon | Title | Type | Available | Last Visit | Server Info | FQDN | |
|---|---|---|---|---|---|---|---|
|
|
No | 2026-04-28T07:21:51 |
ekbgzchl6x2ias37.onion
|
||||
|
|
DDOS Protection | Yes | 2026-05-15T18:35:39 |
santat7kpllt6iyvqbr7q4amdv6dzrh6paatvyrzl7ry3zm72zigf4ad.onion
|
|||
|
|
TORRENT | CL0P^_- LEAKS | No | 2026-04-28T07:22:31 |
toznnag5o3ambca56s2yacteu7q7x2avrfherzmz4nmujrjuib4iusad.onion
|
| Discovery | RMM Tools | Defense Evasion | Credential Theft | OffSec | Networking | LOLBAS | Exfiltration |
|---|---|---|---|---|---|---|---|
|
|
|
|
|
Cobalt Strike
PowerShell Empire
TinyMet
|
|
|
|
| Vendor | Product | CVE | Source |
|---|---|---|---|
| Accellion | Accellion File Transfer Appliance | CVE-2021-27101, CVE-2021-27102, CVE-2021-27103, CVE-2021-27104 | mandiant.com |
| Cleo | Cleo VLTrader, Harmony, LexiCom | CVE-2024-55956 | huntress.com |
| Fortra | GoAnywhere Managed File Transfer | CVE-2023-0669 | censys.io |
| Oracle | E-Business | CVE-2025-61882 | crowdstrike.com |
| Progress Software | MOVEit | CVE-2023-34362 | cisa.gov |
| PaperCut | PaperCut Application Server | CVE-2023-27350, CVE-2023-27351 | twitter.com/MsftSecIntel |
| SolarWinds | SolarWinds Serv-U FTP | CVE-2021-35211 | research.nccgroup.com |
| Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Impact |
|---|---|---|---|---|---|---|---|---|---|---|
| Valid accounts | Command and scripting interpreter | Create or modify system process: Windows service | Exploitation for privilege escalation | Masquerading: invalid code signature | Query registry | Remote services: SMB/Windows admin shares | Data from local system | Exfiltration over web service | Application Layer Protocol | Data encrypted for impact |
| Exploit public-facing application | Native API | Boot or logon autostart execution | Domain Policy modification: Group Policy modification | Process injection: DLL injection | Remote system discovery | Lateral tool transfer | Inhibit system recovery | |||
| Phishing: Spear-phishing attachment | User execution | Hijack execution flow | Indicator removal on host: clear Windows event logs | Process discovery | ||||||
| Indicator removal on host: file deletion | Security software discovery | |||||||||
| Deobfuscate/Decode files or information | System information discovery | |||||||||
| Indirect command execution | File and directory discovery | |||||||||
| Impair defenses: disable or modify tools |
| Type | IOC |
|---|---|
Email
|
managersmaers@tutanota.com
|
Email
|
servicedigilogos@protonmail.com
|
Email
|
support@he1p-center.com
|
Email
|
support@in2pay.com
|
Email
|
unlock@cl-leaks.com
|
Email
|
unlock@goto-pay.com
|
Email
|
unlock@he1p-me.com
|
Email
|
unlock@rsv-box.com
|
Email
|
unlock@support-box.com
|