Skip to content
CavalierGPT: The First Comprehensive Infostealers AI Bot -
Try Now →
HOME
LEARN
REPORTS
TECHNIQUES
VICTIMS
COLLABS
FREE INDIVIDUAL PROTECTION
HOME
LEARN
REPORTS
TECHNIQUES
VICTIMS
COLLABS
FREE INDIVIDUAL PROTECTION
Articles | InfoStealers
De-anonymizing Threat Actors and Exposing Their Infrastructure Using Infostealer Intelligence
December 4, 2025
Speaker: Leonid Rozenberg, Cybercrime Researcher, Hudson Rock. Infostealing malware has become a near-perfect tool for cybercriminals, enabling the theft of sensitive data with remarkable efficiency. However, there are moments when the malware backfires, exposing the attackers themselves. This talk delves into cases where cybercriminals accidentally infected their own systems with Infostealer malware, providing Hudson Rock […]
Exclusive Look Inside a Compromised North Korean APT Machine Linked to The Biggest Heist in History
December 3, 2025
*Interactive simulator can be accessed via desktop – www.hudsonrock.com/northkorean In the world of Threat Intelligence, we are usually looking at the aftermath of an attack: the encrypted servers, the stolen databases, or the fraudulent transactions. Rarely do we get a look through the eyes of the attacker. But even state-sponsored hackers make mistakes. And sometimes, […]
The Infostealer to Government-Backed Hackers Pipeline
December 2, 2025
The Infostealer-to-APT Pipeline – Hudson Rock Infographic HUDSON ROCK THE INFOSTEALER TO APT PIPELINE How stolen diplomatic credentials fuel cyber-political power plays. The Dangerous Escalation Opportunistic Infection Random malware download Diplomat Compromised Valid MOFA credentials stolen APT Espionage State-sponsored attacks Global Diplomatic Exposure Hudson Rock detected infections exposing Ministry of Foreign Affairs (MOFA) credentials across […]
How Hackers Are Actually Using Infostealers (Top 4 Real Methods)
December 2, 2025
How Hackers Really Use Infostealers – Hudson Rock Infographic HUDSON ROCK HOW HACKERS REALLY USE INFOSTEALERS An analysis of the specific tactics used in the biggest recent cyber breaches. 30,000,000+ Infected Computers Monitored Major Victims AT&T, Uber, EA, Ticketmaster Top Tactics VPNs, Webmail, Slack, Cloud 1. VPN Credentials Hackers use stolen credentials to log in […]
Microsoft’s New Update Creates an Agentic OS Infostealer Attack Vector
November 19, 2025
Infographic: The Agentic OS & Hudson Rock Defense HUDSON ROCK Threat Intelligence Report The Agentic OS Attack Vector Microsoft’s new Windows 11 update centralizes data for AI agents. It’s the ultimate convenience for users and the ultimate shortcut for Infostealers. A Analyst Get insights or trends R Researcher Generate a report @| Tools Search The […]
Nikkei Breached: Infostealer Infection Grants Access to 17K+ Employee Slack Chat Histories
November 5, 2025
Over 17,000 employees and partners now face the fallout from a breach that started with a single infostealer infection on a Japanese computer in August 2025, ultimately handing attackers the keys to Nikkei’s Slack at nikkeidevs.slack.com. Hudson Rock‘s deep dive into stolen credential logs reveals the mechanics behind this intrusion, the incident spotlights how Infostealers […]
Approaching Infostealer Devs: a Brief Interview with AURA
November 3, 2025
To completely understand what’s going on in a market that has been growing in the last years I found mandatory to know which players are dominating it. Always remember that behind every user of the Internet there is another human like you, so if you can be kind enough to reach them and they agree, […]
Russian Authorities Bust Meduza Infostealer Developers: Young Hackers Detained in Major Cybercrime Crackdown
October 31, 2025
In a swift operation that underscores Russia’s growing crackdown on domestic cyber threats, the Ministry of Internal Affairs (MВД) has arrested a group of young IT specialists accused of creating and distributing the Meduza Infostealer malware. This credential-harvesting tool, which has been circulating on underground forums since mid-2023, specializes in siphoning login details, cryptocurrency wallet […]
Logins.zip Leverages Chromium Zero-Day: Stealthy Infostealer Builder Promises 99% Credential Theft in Under 12 Seconds
October 29, 2025
In the ever-evolving landscape of cyber threats, Hudson Rock‘s research team has uncovered a potent new Infostealer builder: Logins(.)zip. Marketed as the “go-to infostealer” on underground forums, this web-based tool exploits Chromium browser vulnerabilities to achieve near-total credential extraction – up to 99% of saved logins, cookies, and autofills, in just 12 seconds post-infection. This […]
Reports | InfoStealers
Infostealers Weekly Report: 2025-12-01 – 2025-12-08
December 8, 2025
InfoStealers Weekly Report – In this comprehensive report, we provide you with valuable insights into the most pressing threats facing organizations today. As cyberattacks continue to grow in complexity and scale, our mission is to equip you with the knowledge and tools needed to safeguard your sensitive information. Join us as we analyze the top […]
Infostealers Weekly Report: 2025-11-24 – 2025-12-01
December 1, 2025
InfoStealers Weekly Report – In this comprehensive report, we provide you with valuable insights into the most pressing threats facing organizations today. As cyberattacks continue to grow in complexity and scale, our mission is to equip you with the knowledge and tools needed to safeguard your sensitive information. Join us as we analyze the top […]
Infostealers Weekly Report: 2025-11-17 – 2025-11-24
November 24, 2025
InfoStealers Weekly Report – In this comprehensive report, we provide you with valuable insights into the most pressing threats facing organizations today. As cyberattacks continue to grow in complexity and scale, our mission is to equip you with the knowledge and tools needed to safeguard your sensitive information. Join us as we analyze the top […]
Infostealers Weekly Report: 2025-11-10 – 2025-11-17
November 17, 2025
InfoStealers Weekly Report – In this comprehensive report, we provide you with valuable insights into the most pressing threats facing organizations today. As cyberattacks continue to grow in complexity and scale, our mission is to equip you with the knowledge and tools needed to safeguard your sensitive information. Join us as we analyze the top […]
Infostealers Weekly Report: 2025-11-03 – 2025-11-10
November 10, 2025
InfoStealers Weekly Report – In this comprehensive report, we provide you with valuable insights into the most pressing threats facing organizations today. As cyberattacks continue to grow in complexity and scale, our mission is to equip you with the knowledge and tools needed to safeguard your sensitive information. Join us as we analyze the top […]
Infostealers Weekly Report: 2025-10-27 – 2025-11-03
November 3, 2025
InfoStealers Weekly Report – In this comprehensive report, we provide you with valuable insights into the most pressing threats facing organizations today. As cyberattacks continue to grow in complexity and scale, our mission is to equip you with the knowledge and tools needed to safeguard your sensitive information. Join us as we analyze the top […]
Infostealers Weekly Report: 2025-10-20 – 2025-10-27
October 27, 2025
InfoStealers Weekly Report – In this comprehensive report, we provide you with valuable insights into the most pressing threats facing organizations today. As cyberattacks continue to grow in complexity and scale, our mission is to equip you with the knowledge and tools needed to safeguard your sensitive information. Join us as we analyze the top […]
Techniques | InfoStealers
Formbook/xLoader
Formbook is an information-stealing malware, discovered in 2016, that is capable of stealing data entered into HTML website forms and logging keystrokes... The post Formbook/xLoader appeared first on InfoStealers.
LummaC2 Stealer
Heatmap of instances of ATT&CK techniques for LummaC2 Stealer based on recent public CTI reporting (sources in Notes for each technique)... The post LummaC2 Stealer appeared first on InfoStealers.
Luca Stealer
Heatmap of instances of ATT&CK techniques for Luca Stealer based on recent public CTI reporting (sources in Notes for each technique)... The post Luca Stealer appeared first on InfoStealers.
Python Dependency Stealer January 2023
Heatmap of instances of ATT&CK techniques for an information stealer discovered in January 2023 that achieves initial access via a malicious software dependency (a Python package)... The post Python Dependency Stealer January 2023 appeared first on InfoStealers.
Aurora Stealer
Aurora is an information stealer advertised on underground forums beginning in September 2022 (it was previously advertised in a different form, as a botnet with different functionality... The post Aurora Stealer appeared first on InfoStealers.
DuckTail Stealer
Heatmap of instances of ATT&CK techniques for DuckTail Stealer based on recent public CTI reporting (sources in notes for each technique)... The post DuckTail Stealer appeared first on InfoStealers.
RisePro Stealer
Heatmap of (sub)techniques mentioned in Sekoia.io's report "New RisePro Stealer distributed by the prominent PrivateLoader"... The post RisePro Stealer appeared first on InfoStealers.
Prynt Infostealer
Heatmap of instances of ATT&CK techniques referenced in recent, public CTI reporting around Prynt Infostealer (source links included in Notes per technique below)... The post Prynt Infostealer appeared first on InfoStealers.
Rhadamanthys Stealer
Heatmap of instances of ATT&CK techniques for Rhadamanthys Stealer based on recent public CTI reporting (sources in notes for each technique)... The post Rhadamanthys Stealer appeared first on InfoStealers.
Erbium Stealer
Heatmap of instances of ATT&CK techniques for Erbium Stealer based on recent public CTI reporting (sources in notes for each technique)... The post Erbium Stealer appeared first on InfoStealers.
HOME
LEARN
REPORTS
TECHNIQUES
VICTIMS
COLLABS
FREE INDIVIDUAL PROTECTION
BE THE FIRST TO KNOW
Get FREE access to
Cavalier GPT
Stay informed with the latest insights in our Infostealers weekly report.
Receive a notification if your email is involved in an Infostealer infection.
Powered by Hudson Rock
No Spam, We Promise
Email Address
Subscribe →
BE THE FIRST TO KNOW
Get FREE access to
Cavalier GPT
Stay informed with the latest insights in our Infostealers weekly report.
Receive a notification if your email is involved in an Infostealer infection.
Powered by Hudson Rock
No
Spam,
We Promise
Email Address
Subscribe →