Sponsored by Hudson Rock – Use Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are leading to ransomware attacks
No ransom notes available.
No tools used available.
| Vendor | Product | CVE | Source |
|---|---|---|---|
| Oracle | Oracle E-Business Suite (EBS) | CVE-2025-61882 | |
| Cisco | Cisco Unified Communications | CVE-2026-20045 | |
| Snowflake | Snowflake (credential stuffing / no MFA) | OAuth Abuse |
| Initial Access | Defense Evasion | Collection | Exfiltration |
|---|---|---|---|
| Phishing: Spearphishing Voice (Vishing) | Use Alternate Authentication Material: Application Access Token | Data from Information Repositories | Exfiltration Over Web Service |
| Unsecured Credentials: Private Keys |
No negotiation chats available.
No YARA rules available.
| Type | IOC |
|---|---|
email
|
shinyc0rp@tuta.io
|
telegram
|
https://t.me/s/andrewfedman
|
telegram
|
https://t.me/shinygr0up
|
telegram
|
https://t.me/s/SLSH6
|
telegram
|
https://t.me/specialagentadam
|