Sponsored by Hudson Rock – Use Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are leading to ransomware attacks
| Favicon | Title | Type | Available | Last Visit | Server Info | FQDN | |
|---|---|---|---|---|---|---|---|
|
|
Shisa Ransomware Blog | No | 2026-05-16T11:45:58 | Apache 2.4.58 (Win64) OpenSSL 3.1.3 PHP 8.0.30 — PHP 8.0.30 |
longcc4fqrfcqt5lzceutylaxir6h66fp6df3oin6mvwvz6pfdbxc6qd.onion
|
| Vendor | Product | CVE | Source |
|---|---|---|---|
| DSM | DSM Data Collector | CVE-2025-43995 | |
| Microsoft | Windows Scripting Engine | CVE-2024-38178 | |
| Other | Console (ANSI Injection) | CVE-2025-55754 |
| Initial Access | Execution | Persistence | Defense Evasion | Lateral Movement | Exfiltration | Impact |
|---|---|---|---|---|---|---|
| Valid Accounts | Command and Scripting Interpreter: PowerShell | Scheduled Task/Job: Scheduled Task | Indicator Removal | Remote Services: Remote Desktop Protocol | Exfiltration Over C2 Channel | Data Encrypted for Impact |
| Command and Scripting Interpreter: Windows Command Shell | System Binary Proxy Execution | Inhibit System Recovery |
| Type | IOC |
|---|---|
tox
|
A458DAEFD26B207A65C2D0164B354DA25F7A77D7E52D1B16E577F3A143D8EC7C272B58F72FDD
|