Sponsored by Hudson Rock – Use Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are impacting your business
| Favicon | Title | Type | Available | Last Visit | Server Info | FQDN | |
|---|---|---|---|---|---|---|---|
|   | Cross Lock - Data leak | No | 2025-06-01 21:18:31 | crosslock5cwfljbw4v37zuzq4talxxhyavjm2lufmjwgbpfjdsh56yd.onion | 
No ransom notes available.
No tools used available.
No vulnerabilities exploited available.
| Execution | Defense Evasion | Privilege Escalation | Discovery | Lateral Movement | Impact | 
|---|---|---|---|---|---|
| Command and Scripting Interpreter | Process Injection | Abuse Elevation Control Mechanism | System Service Discovery | Remote Services | Data Encrypted for Impact | 
| Indicator Removal | Process Discovery | Inhibit System Recovery | |||
| File and Directory Discovery | 
No negotiation chats available.
No YARA rules available.
No IoCs available for this group.