Skip to content
CavalierGPT: The First Comprehensive Infostealers AI Bot -
Try Now →
HOME
LEARN
REPORTS
TECHNIQUES
VICTIMS
COLLABS
FREE INDIVIDUAL PROTECTION
HOME
LEARN
REPORTS
TECHNIQUES
VICTIMS
COLLABS
FREE INDIVIDUAL PROTECTION
Articles | InfoStealers
Nikkei Breached: Infostealer Infection Grants Access to 17K+ Employee Slack Chat Histories
November 5, 2025
Over 17,000 employees and partners now face the fallout from a breach that started with a single infostealer infection on a Japanese computer in August 2025, ultimately handing attackers the keys to Nikkei’s Slack at nikkeidevs.slack.com. Hudson Rock‘s deep dive into stolen credential logs reveals the mechanics behind this intrusion, the incident spotlights how Infostealers […]
Approaching Infostealer Devs: a Brief Interview with AURA
November 3, 2025
To completely understand what’s going on in a market that has been growing in the last years I found mandatory to know which players are dominating it. Always remember that behind every user of the Internet there is another human like you, so if you can be kind enough to reach them and they agree, […]
Russian Authorities Bust Meduza Infostealer Developers: Young Hackers Detained in Major Cybercrime Crackdown
October 31, 2025
In a swift operation that underscores Russia’s growing crackdown on domestic cyber threats, the Ministry of Internal Affairs (MВД) has arrested a group of young IT specialists accused of creating and distributing the Meduza Infostealer malware. This credential-harvesting tool, which has been circulating on underground forums since mid-2023, specializes in siphoning login details, cryptocurrency wallet […]
Logins.zip Leverages Chromium Zero-Day: Stealthy Infostealer Builder Promises 99% Credential Theft in Under 12 Seconds
October 29, 2025
In the ever-evolving landscape of cyber threats, Hudson Rock‘s research team has uncovered a potent new Infostealer builder: Logins(.)zip. Marketed as the “go-to infostealer” on underground forums, this web-based tool exploits Chromium browser vulnerabilities to achieve near-total credential extraction – up to 99% of saved logins, cookies, and autofills, in just 12 seconds post-infection. This […]
Infostealers Disguised as Free Video Game Cheats
October 28, 2025
It is human nature to be competitive, to try your best when competing against others. It is no different when it comes to video games. Major E-Sports tournament prize pools regularly reach the multi millions. Last year the CS2 PGL Major hosted in Copenhagen had a prize pool of $1.25M. Esports along with normal sports […]
Email Leaked Credentials Search
October 25, 2025
How to Check if an Email Address Has Been Compromised To determine if an email address has been affected by an Infostealer infection and has leaked credentials involved, you can use the free tool provided by Hudson Rock, our cybersecurity firm that specializes in cybercrime intelligence. Here are the steps: * You can receive a one-time […]
Username Leaked Credentials Search
October 25, 2025
How to Check if a Username Has Been Compromised To determine if a username has been affected by an Infostealer infection and has leaked credentials involved, you can use the free tool provided by Hudson Rock, our cybersecurity firm that specializes in cybercrime intelligence. Here are the steps: * You can receive a one-time historical ethical […]
Collins Aerospace Hit Twice: 2022 Infostealer Infection Enabled a Separate Breach
October 23, 2025
The Incident Breakdown At Hudson Rock, we’ve been closely analyzing the cyber incidents that struck Collins Aerospace, a subsidiary of RTX Corporation, during the week of September 15–19, 2025. The company reported a ransomware attack to the SEC, leading to the shutdown of its Multi-User System Environment (MUSE) passenger processing system and causing major disruptions […]
Approaching Infostealers Devs: a Brief Interview with MacSync (ex-mentalpositive)
September 4, 2025
To completely understand what’s going on in a market that has been growing in the last years I found mandatory to know which players are dominating it. Always remember that behind every user of the Internet there is another human like you, so if you can be kind enough to reach them and they agree, […]
Reports | InfoStealers
Infostealers Weekly Report: 2025-10-27 – 2025-11-03
November 3, 2025
InfoStealers Weekly Report – In this comprehensive report, we provide you with valuable insights into the most pressing threats facing organizations today. As cyberattacks continue to grow in complexity and scale, our mission is to equip you with the knowledge and tools needed to safeguard your sensitive information. Join us as we analyze the top […]
Infostealers Weekly Report: 2025-10-20 – 2025-10-27
October 27, 2025
InfoStealers Weekly Report – In this comprehensive report, we provide you with valuable insights into the most pressing threats facing organizations today. As cyberattacks continue to grow in complexity and scale, our mission is to equip you with the knowledge and tools needed to safeguard your sensitive information. Join us as we analyze the top […]
Infostealers Weekly Report: 2025-10-13 – 2025-10-20
October 20, 2025
InfoStealers Weekly Report – In this comprehensive report, we provide you with valuable insights into the most pressing threats facing organizations today. As cyberattacks continue to grow in complexity and scale, our mission is to equip you with the knowledge and tools needed to safeguard your sensitive information. Join us as we analyze the top […]
Infostealers Weekly Report: 2025-10-06 – 2025-10-13
October 13, 2025
InfoStealers Weekly Report – In this comprehensive report, we provide you with valuable insights into the most pressing threats facing organizations today. As cyberattacks continue to grow in complexity and scale, our mission is to equip you with the knowledge and tools needed to safeguard your sensitive information. Join us as we analyze the top […]
Infostealers Weekly Report: 2025-09-29 – 2025-10-06
October 6, 2025
InfoStealers Weekly Report – In this comprehensive report, we provide you with valuable insights into the most pressing threats facing organizations today. As cyberattacks continue to grow in complexity and scale, our mission is to equip you with the knowledge and tools needed to safeguard your sensitive information. Join us as we analyze the top […]
Infostealers Weekly Report: 2025-09-22 – 2025-09-29
September 29, 2025
InfoStealers Weekly Report – In this comprehensive report, we provide you with valuable insights into the most pressing threats facing organizations today. As cyberattacks continue to grow in complexity and scale, our mission is to equip you with the knowledge and tools needed to safeguard your sensitive information. Join us as we analyze the top […]
Infostealers Weekly Report: 2025-09-15 – 2025-09-22
September 22, 2025
InfoStealers Weekly Report – In this comprehensive report, we provide you with valuable insights into the most pressing threats facing organizations today. As cyberattacks continue to grow in complexity and scale, our mission is to equip you with the knowledge and tools needed to safeguard your sensitive information. Join us as we analyze the top […]
Techniques | InfoStealers
Formbook/xLoader
Formbook is an information-stealing malware, discovered in 2016, that is capable of stealing data entered into HTML website forms and logging keystrokes... The post Formbook/xLoader appeared first on InfoStealers.
LummaC2 Stealer
Heatmap of instances of ATT&CK techniques for LummaC2 Stealer based on recent public CTI reporting (sources in Notes for each technique)... The post LummaC2 Stealer appeared first on InfoStealers.
Luca Stealer
Heatmap of instances of ATT&CK techniques for Luca Stealer based on recent public CTI reporting (sources in Notes for each technique)... The post Luca Stealer appeared first on InfoStealers.
Python Dependency Stealer January 2023
Heatmap of instances of ATT&CK techniques for an information stealer discovered in January 2023 that achieves initial access via a malicious software dependency (a Python package)... The post Python Dependency Stealer January 2023 appeared first on InfoStealers.
Aurora Stealer
Aurora is an information stealer advertised on underground forums beginning in September 2022 (it was previously advertised in a different form, as a botnet with different functionality... The post Aurora Stealer appeared first on InfoStealers.
DuckTail Stealer
Heatmap of instances of ATT&CK techniques for DuckTail Stealer based on recent public CTI reporting (sources in notes for each technique)... The post DuckTail Stealer appeared first on InfoStealers.
RisePro Stealer
Heatmap of (sub)techniques mentioned in Sekoia.io's report "New RisePro Stealer distributed by the prominent PrivateLoader"... The post RisePro Stealer appeared first on InfoStealers.
Prynt Infostealer
Heatmap of instances of ATT&CK techniques referenced in recent, public CTI reporting around Prynt Infostealer (source links included in Notes per technique below)... The post Prynt Infostealer appeared first on InfoStealers.
Rhadamanthys Stealer
Heatmap of instances of ATT&CK techniques for Rhadamanthys Stealer based on recent public CTI reporting (sources in notes for each technique)... The post Rhadamanthys Stealer appeared first on InfoStealers.
Erbium Stealer
Heatmap of instances of ATT&CK techniques for Erbium Stealer based on recent public CTI reporting (sources in notes for each technique)... The post Erbium Stealer appeared first on InfoStealers.
HOME
LEARN
REPORTS
TECHNIQUES
VICTIMS
COLLABS
FREE INDIVIDUAL PROTECTION
BE THE FIRST TO KNOW
Get FREE access to
Cavalier GPT
Stay informed with the latest insights in our Infostealers weekly report.
Receive a notification if your email is involved in an Infostealer infection.
Powered by Hudson Rock
No Spam, We Promise
Email Address
Subscribe →
BE THE FIRST TO KNOW
Get FREE access to
Cavalier GPT
Stay informed with the latest insights in our Infostealers weekly report.
Receive a notification if your email is involved in an Infostealer infection.
Powered by Hudson Rock
No
Spam,
We Promise
Email Address
Subscribe →