Sponsored by Hudson Rock – Use Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are leading to ransomware attacks
| Favicon | Title | Type | Available | Last Visit | Server Info | FQDN | |
|---|---|---|---|---|---|---|---|
|
|
Shisa Ransomware Blog | No | 2026-04-01 17:30:59 | longcc4fqrfcqt5lzceutylaxir6h66fp6df3oin6mvwvz6pfdbxc6qd.onion |
No tools used available.
| Vendor | Product | CVE | Source |
|---|---|---|---|
| DSM | DSM Data Collector | CVE-2025-43995 | |
| Microsoft | Windows Scripting Engine | CVE-2024-38178 | |
| Other | Console (ANSI Injection) | CVE-2025-55754 |
| Initial Access | Execution | Persistence | Defense Evasion | Lateral Movement | Exfiltration | Impact |
|---|---|---|---|---|---|---|
| Valid Accounts | Command and Scripting Interpreter: PowerShell | Scheduled Task/Job: Scheduled Task | System Binary Proxy Execution | Remote Services: Remote Desktop Protocol | Exfiltration Over C2 Channel | Data Encrypted for Impact |
| Command and Scripting Interpreter: Windows Command Shell | Indicator Removal | Inhibit System Recovery |
No negotiation chats available.
No YARA rules available.
No IoCs available for this group.