Sponsored by Hudson Rock – Use Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are leading to ransomware attacks
| Favicon | Title | Type | Available | Last Visit | Server Info | FQDN | |
|---|---|---|---|---|---|---|---|
|
|
Devman's Place | No | 2026-04-28T07:23:36 |
qljmlmp4psnn3wqskkf3alqquatymo6hntficb4rhq5n76kuogcv7zyd.onion
|
|||
|
|
DEVMAN 2.0 - Leaked Data | No | 2026-04-28T07:26:11 |
wugurgyscp5rxpihef5vl6b6m5ont3b6sezhl7boboso2enib2k3q6qd.onion
|
|||
|
|
Devman Ransomware | No | 2026-04-28T07:28:43 |
devmanblggk7ddrtqj3tsocnayow3bwnozab2s4yhv4shpv6ueitjzid.onion
|
| Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Impact |
|---|---|---|---|---|---|---|---|---|---|---|
| Valid Accounts | PowerShell | Valid Accounts | Exploitation for Privilege Escalation | Masquerading | OS Credential Dumping | Remote System Discovery | SMB/Windows Admin Shares | Data from Local System | Exfiltration Over C2 Channel | Data Encrypted for Impact |
| Exploitation of Remote Services | Exploitation for Client Execution | Disable or Modify Tools | Network Service Scanning | Service Stop | ||||||
| System Information Discovery | Inhibit System Recovery | |||||||||
| Defacement |