Sponsored by Hudson Rock – Use Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are leading to ransomware attacks
| Favicon | Title | Type | Available | Last Visit | Server Info | FQDN | |
|---|---|---|---|---|---|---|---|
|
|
This domain has been seized | No | 2026-04-28T07:24:07 |
hiveleakdbtnp76ulyhi52eag6c6tyc3xw7ez7iqy6wc34gd2nekazyd.onion
|
|||
|
|
This domain has been seized | No | 2026-04-28T07:26:41 |
hivecust6vhekztbqgdnkks64ucehqacge3dij3gyrrpdp57zoq3ooqd.onion
|
|||
|
|
This domain has been seized | No | 2026-04-28T07:29:13 |
hiveapi4nyabjdfz2hxdsr7otrcv6zq6m4rk5i2w7j64lrtny4b7vjad.onion
|
| Discovery | RMM Tools | Defense Evasion | Credential Theft | OffSec | Networking | LOLBAS | Exfiltration |
|---|---|---|---|---|---|---|---|
|
Advanced IP Scanner
Bloodhound
SoftPerfect NetScan
|
Atera
ScreenConnect
Splashtop
|
GMER
PCHunter
|
|
Cobalt Strike
Impacket
Metasploit
Meterpreter
PowerShell Empire
|
|
BCDEdit
BITSAdmin
WMIC
Windows Event Utility (wevtutil)
|
MEGA
PrivatLab
RClone
Sendspace
UFile
|
| Initial Access | Execution | Defense Evasion | Credential Access | Discovery | Lateral Movement | Exfiltration | Command and Control | Impact |
|---|---|---|---|---|---|---|---|---|
| Valid Accounts: Remote Desktop Protocol | Command and Scripting Interpreter: PowerShell | Indicator Removal: Clear Windows Event Logs | OS Credential Dumping: LSASS Memory | Network Service Discovery | Remote Services: Remote Desktop Protocol | Exfiltration Over Web Service: Exfiltration to Cloud Storage | Remote Access Software | Data Encrypted for Impact |
| Exploit Public-Facing Application | Command and Scripting Interpreter: Windows Command Shell | Disable or Modify Tools | Remote Services: SMB/Windows Admin Shares | Inhibit System Recovery | ||||
| Phishing: Spearphishing Attachment |