Sponsored by Hudson Rock – Use Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are leading to ransomware attacks
| Favicon | Title | Type | Available | Last Visit | Server Info | FQDN | |
|---|---|---|---|---|---|---|---|
|
|
DragonForce | Blog | Yes | 2026-05-16T07:42:44 | openresty — Nuxt |
z3wqggtxft7id3ibr7srivv5gjof5fwg76slewnzwwakjuf3nlhukdid.onion
|
||
|
|
DragonForce | Recovery | Yes | 2026-05-16T07:43:21 | openresty — Nuxt |
3pktcrcbmssvrnwe5skburdwe2h3v6ibdnn5kbjqihsg6eu6s6b7ryqd.onion
|
||
|
|
DragonForce | Leaks | Yes | 2026-05-16T07:42:07 | openresty |
dragonforxxbp3awc7mzs5dkswrua3znqyx5roefmi4smjrsdi22xwqd.onion
|
| Discovery | RMM Tools | Defense Evasion | Credential Theft | OffSec | Networking | LOLBAS | Exfiltration |
|---|---|---|---|---|---|---|---|
|
Advanced IP Scanner
PingCastle
SoftPerfect NetScan
|
|
|
Mimikatz
|
|
|
|
|
| Execution | Defense Evasion | Discovery | Impact |
|---|---|---|---|
| User Execution | Indicator Removal: File Deletion | File and Directory Discovery | Data Encrypted for Impact |
| Impair Defenses: Disable or Modify Tools |