Sponsored by Hudson Rock – Use Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are leading to ransomware attacks
| Favicon | Title | Type | Available | Last Visit | Server Info | FQDN | |
|---|---|---|---|---|---|---|---|
|
|
Human Verify | No | 2026-04-28T07:25:01 |
medusaxko7jxtrojdkxo66j7ck4q5tgktf7uqsqyfry4ebnxlcbkccyd.onion
|
|||
|
|
Medusa Chat | No | 2026-04-28T07:27:33 |
medusakxxtp3uo7vusntvubnytaph4d3amxivbggl3hnhpk2nmus34yd.onion
|
|||
|
|
Human Verify | Yes | 2026-05-13T16:37:01 | Apache 2.4.52 |
xfv4jzckytb4g3ckwemcny3ihv4i5p4lqzdpi624cxisu35my5fwi5qd.onion
|
||
|
|
503 Service Temporarily Unavailable | No | 2026-04-28T07:30:05 |
dlmfciajg5s4vliyo5dhs5jyzhi2xr2fnkebul46lpf4xudtqiue4nid.onion
|
|||
|
|
Human Verify | No | 2026-04-28T07:31:23 |
kyfiw76eol6ph2mq7pi5e5tdvce37bicddhai62qhdc5ja6jdchz4qqd.onion
|
|||
|
|
Human Verify | No | 2026-04-28T07:32:37 |
s7lmmhlt3iwnwirxvgjidl6omcblvw2rg75txjfduy73kx5brlmiulad.onion
|
|||
|
|
No | 2026-04-28T07:34:25 |
45.9.148.39
|
||||
|
|
Human Verify | No | 2026-04-28T07:36:17 |
cx5u7zxbvrfyoj6ughw76oa264ucuuizmmzypwum6ear7pct4yc723qd.onion
|
|||
|
|
No | 2026-04-28T07:36:58 |
hupxs7ps7md24kpz4lwsbra64abgxjx3pcc2wuca5ibawf2g5hlpfyqd.onion
|
| Discovery | RMM Tools | Defense Evasion | Credential Theft | OffSec | Networking | LOLBAS | Exfiltration |
|---|---|---|---|---|---|---|---|
|
Advanced IP Scanner
Navicat
PDQ Inventory
RoboCopy
SoftPerfect NetScan
|
AnyDesk
Atera
HCL BigFix
N-Able
PDQ Deploy
ScreenConnect
SimpleHelp
Splashtop
eHorus
|
EDRSandBlast
KillAV
ThrottleStop driver
|
Mimikatz
|
|
Cloudflared
FRP
Ligolo
PuTTY
RevSocks
|
BITSAdmin
Process Explorer
PsExec
|
RClone
|
| Vendor | Product | CVE | Source |
|---|---|---|---|
| SimpleHelp | SimpleHelp RMM | CVE-2024-57727 | arcticwolf.com |
| Initial Access | Execution | Defense Evasion | Credential Access | Discovery | Lateral Movement | Exfiltration | Command and Control | Impact |
|---|---|---|---|---|---|---|---|---|
| Valid Accounts | Windows Management Instrumentation | Impair Defenses | Brute Force | File and Directory Discovery | Remote Services | Exfiltration Over C2 Channel | Ingress Tool Transfer | Data Encrypted for Impact |
| External Remote Services | Command and Scripting Interpreter | Disable or Modify Tools | Network Share Discovery | Exfiltration Over Alternative Protocol | Service Stop | |||
| Phishing | Safe Mode Boot | Exfiltration Over Web Service | Inhibit System Recovery |