Sponsored by Hudson Rock – Use Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are leading to ransomware attacks
| Favicon | Title | Type | Available | Last Visit | Server Info | FQDN | |
|---|---|---|---|---|---|---|---|
|
|
CONTI.News | No | 2026-04-28T07:23:11 |
continewsnv5otx5kaoje7krkto2qbu3gtqef22mnr7eaxw3y6ncz3ad.onion
|
|||
|
|
Access Blocked | No | 2026-04-28T07:25:44 |
continews.click
|
|||
|
|
Error Response Page | No | 2026-04-28T07:28:04 |
continews.bz
|
| Discovery | RMM Tools | Defense Evasion | Credential Theft | OffSec | Networking | LOLBAS | Exfiltration |
|---|---|---|---|---|---|---|---|
|
AdFind
Bloodhound
PowerView
Seatbelt
ShareFinder
SharpView
SoftPerfect NetScan
|
AnyDesk
Atera
Splashtop
|
GMER
PCHunter
|
Mimikatz
ProcDump
Router Scan
SharpChrome
|
Cobalt Strike
Metasploit
Meterpreter
PowerShell Empire
PowerSploit
Rubeus
|
|
BITSAdmin
NTDS Utility (ntdsutil)
PsExec
WMIC
|
Dropfiles
MEGA
Qaz[.]im
RClone
Sendspace
WinSCP
|
| Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Impact |
|---|---|---|---|---|---|---|---|---|---|---|---|
| Valid Accounts: Domain Accounts | Windows Management Instrumentation | Create Account: Domain Account | Exploitation for Privilege Escalation | Signed Binary Proxy Execution: Rundll32 | OS Credential Dumping: LSASS Memory | Network Service Discovery | Remote Services: Remote Desktop Protocol | Data from Local System | Exfiltration Over Web Service: Exfiltration to Cloud Storage | Application Layer Protocol: Web Protocols | Data Encrypted for Impact |
| Exploit Public-Facing Application | Command and Scripting Interpreter: PowerShell | Boot or Logon Autostart Execution: Registry Run Keys | Disable or Modify Tools | OS Credential Dumping: NTDS | Domain Trust Discovery | Remote Services: SMB/Windows Admin Shares | Archive Collected Data: Archive via Utility | Remote Access Software | Inhibit System Recovery | ||
| Phishing: Spearphishing Attachment |