Sponsored by Hudson Rock – Use Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are impacting your business
Victims count: 1012
Last discovered victim 2025-05-09
First discovered victims: 2020-03-13
No tools used available.
Vendor | Product | CVE | Source |
---|---|---|---|
Accellion | Accellion File Transfer Appliance | CVE-2021-27101, CVE-2021-27102, CVE-2021-27103, CVE-2021-27104 | mandiant.com |
Fortra | GoAnywhere Managed File Transfer | CVE-2023-0669 | censys.io |
Progress Software | MOVEit | CVE-2023-34362 | cisa.gov |
PaperCut | PaperCut Application Server | CVE-2023-27350, CVE-2023-27351 | twitter.com/MsftSecIntel |
SolarWinds | SolarWinds Serv-U FTP | CVE-2021-35211 | research.nccgroup.com |
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|
Phishing: Spear-phishing attachment | Native API | Boot or logon autostart execution | Domain Policy modification: Group Policy modification | Masquerading: invalid code signature | File and directory discovery | Lateral tool transfer | Data from local system | Application Layer Protocol | Exfiltration over web service | Data encrypted for impact |
Exploit public-facing application | Command and scripting interpreter | Create or modify system process: Windows service | Exploitation for privilege escalation | Impair defenses: disable or modify tools | Remote system discovery | Remote services: SMB/Windows admin shares | Inhibit system recovery | |||
Valid accounts | User execution | Hijack execution flow | Deobfuscate/Decode files or information | Process discovery | ||||||
Indicator removal on host: file deletion | System information discovery | |||||||||
Process injection: DLL injection | Query registry | |||||||||
Indirect command execution | Security software discovery | |||||||||
Indicator removal on host: clear Windows event logs |
No negotiation chats available.