Infostealer infection of an Orange employee results in BGP disruptions
Using the stolen account, the threat actor modified the AS number belonging to Orange’s IP address, resulting in major disruptions…
Home » Threat Actor
Using the stolen account, the threat actor modified the AS number belonging to Orange’s IP address, resulting in major disruptions…
A hacker who goes by the username “irleaks” posted a thread in which they attempt to sell over 160,000,000 records of Iranians…
A threat actor attempts to sell access to a sensitive area of Binance — the major cryptocurrency exchange’s…
It is not uncommon for threat actors to exploit login data obtained from Infostealer infections to carry out various types of cyberattacks…
In today’s digital landscape, the reliance on password managers has become commonplace, providing users with a sense of security…
Threat actor “La_Citrix” is known for hacking companies and selling access to their citrix/vpn/RDP servers or otherwise for selling info-stealer logs from computer infections…
Hudson Rock’s data exploration capabilities allow for seamless analysis of massive amounts of assets associated with Infostealer infections. In this example, we analyze all domains
As of late August 2024, attackers have been using fraudulent “human verification” pages to trick users into executing a malicious PowerShell script. This blog post
Check out our latest interview featuring Leonid Rozenberg, where he speaks with Boris Agranovich on the Risk Management Show about the growing threat of Infostealers.
Stay informed with the latest insights in our Infostealers weekly report. Explore key findings, trends and data on info-stealing activities.