Sponsored by Hudson Rock – Use Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are leading to ransomware attacks
| Favicon | Title | Type | Available | Last Visit | Server Info | FQDN | |
|---|---|---|---|---|---|---|---|
|
|
Cross Lock - Data leak | No | 2026-04-28T07:23:21 |
crosslock5cwfljbw4v37zuzq4talxxhyavjm2lufmjwgbpfjdsh56yd.onion
|
| Execution | Privilege Escalation | Defense Evasion | Discovery | Lateral Movement | Impact |
|---|---|---|---|---|---|
| Command and Scripting Interpreter | Abuse Elevation Control Mechanism | Process Injection | System Service Discovery | Remote Services | Data Encrypted for Impact |
| Indicator Removal | Process Discovery | Inhibit System Recovery | |||
| File and Directory Discovery |