Sponsored by Hudson Rock – Use Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are leading to ransomware attacks
| Favicon | Title | Type | Available | Last Visit | Server Info | FQDN | |
|---|---|---|---|---|---|---|---|
|
|
Black Basta Blog | No | 2026-04-28T07:22:43 |
stniiomyjliimcgkvdszvgen3eaaoz55hreqqx6o77yvmpwt7gklffqd.onion
|
|||
|
|
Chat Black Basta | No | 2026-04-28T07:25:17 |
aazsbsgya565vlu2c6bzy6yfiebkcbtvvcytvolt33s77xypi7nypxyd.onion
|
|||
|
|
Chat Black Basta | No | 2026-04-28T07:27:49 |
bastad5huzwkepdixedg2gekg7jk22ato24zyllp6lnjx7wdtyctgvyd.onion
|
| Discovery | RMM Tools | Defense Evasion | Credential Theft | OffSec | Networking | LOLBAS | Exfiltration |
|---|---|---|---|---|---|---|---|
|
AdFind
Bloodhound
PSNmap
PowerView
SoftPerfect NetScan
|
AnyDesk
Atera
NetSupport
ScreenConnect
Splashtop
Supremo
|
Backstab (Process Explorer driver)
|
Mimikatz
|
Brute Ratel C4
Cobalt Strike
Metasploit
PowerSploit
|
|
BITSAdmin
PsExec
Quick Assist
|
Qaz[.]im
RClone
|
| Vendor | Product | CVE | Source |
|---|---|---|---|
| ConnectWise | ScreenConnect | CVE-2024-1709, CVE-2024-1709 | cisa.gov |
| VMware | ESXi | CVE-2024-37085 | microsoft.com |
| Windows | Windows Error Reporting Service | CVE-2024-26169 | www.security.com |
| Windows | MSDT | CVE-2022-30190 | sentinelone.com / trendmicro.com |
| Windows | Active Directory | CVE-2021-42278, CVE-2021-42287 | cisa.gov |
| Windows | Print Spooler | CVE-2021-1675, CVE-2021-34527 | cisa.gov |
| Windows | NetLogon | CVE-2020-1472 | cisa.gov |
| Initial Access | Execution | Persistence | Privilege Escalation |
|---|---|---|---|
| Phishing: Spear phishing Attachment | Windows Management Instrumentation | Account Manipulation | Domain Policy Modification: Group Policy Modification |
| Command and Scripting Interpreter: PowerShell | Create Account | Create or Modify System Process: Windows Service | |
| System Services: Service Execution | Create or Modify System Process: Windows Service | Hijack Execution Flow: DLL Search Order Hijacking | |
| Hijack Execution Flow: DLL Search Order Hijacking |