The Autonomous Adversary: From “Chatbot” to Criminal Enterprise

The Autonomous Adversary: When AIs Collaborate to Hack The Autonomous Adversary: From “Chatbot” to Criminal Enterprise By Hudson Rock Research Team | February 1, 2026 Executive Summary As of February 2026, the cybersecurity landscape has shifted from defending against human adversaries to combating autonomous AI agents. The convergence of OpenClaw (local runtime), Moltbook (collaboration network), […]
Compromised Machine in Gaza Strip Reveals Operational Documents From Breaking Dawn Operation

Hudson Rock researchers have recovered a full set of original internal documents from the Al-Aqsa Martyrs’ Brigades, exfiltrated from a compromised machine in the Gaza Strip
ClawdBot: The New Primary Target for Infostealers in the AI Era

ClawdBot Analysis – Hudson Rock ClawdBot: The New Primary Target for Infostealers in the AI Era January 26, 2026 Hudson Rock Research The rise of “Local-First” AI agents has introduced a new, highly lucrative attack surface for cybercriminals. ClawdBot, a rapidly growing open-source personal AI assistant, shifts the locus of computation from the cloud to […]
Pccomponentes “Breach”: How Infostealer Logs Enable Convincing Credential Stuffing

Pccomponentes “Breach”: How Infostealer Logs Enable Convincing Credential Stuffing Campaigns Pccomponentes “Breach”: How Infostealer Logs Enable Convincing Credential Stuffing Campaigns A recent cybersecurity incident involving the major Spanish electronics retailer, Pccomponentes, highlights a growing trend in the cybercrime ecosystem: the weaponization of Infostealer logs to stage convincing “fake breaches” that cause massive PR headaches. Recently, […]
Inside Al-Qassam Brigades (Hamas): A Compromised Machine View of Religious and Cultural Weaponization

Analysis of a compromised machine in Deir al-Balah (Gaza Strip) has revealed a focused collection of documents attributed to Hamas’ Al-Qassam Brigades.
The Art of Recruitment – A Jihadist Manual Found on a Compromised Machine

A comprehensive investigation conducted by the Hudson Rock team has identified a sophisticated Jihadist recruitment guide stored on an infostealer-compromised machine.
Dozens of Global Companies Hacked via Cloud Credentials from Infostealer Infections & More at Risk

Dozens of Global Companies Hacked via Cloud Credentials from Infostealer Infections & More at Risk Dozens of Global Companies Hacked via Cloud Credentials from Infostealer Infections & More at Risk Figure 1: The digital persona of “Zestix,” a threat actor specializing in auctioning corporate cloud access. Table of Contents 1. Executive Summary 2. The Threat […]
From Victim to Vector: How Infostealers Turn Legitimate Businesses into Malware Hosts

The Ouroboros of Cybercrime: ClickFix & Infostealers Hudson Rock Threat Intelligence The Ouroboros of Cybercrime From Victim to Vector: How Infostealers Turn Legitimate Businesses into Malware Hosts Figure 1: The ClickFix Hunter platform showing native integration with Hudson Rock, highlighting yeezyboostsalesos.us and associated administrative credentials. Executive Summary In the rapidly evolving landscape of cyber threats, […]
The Industrialization of “ClickFix”: Inside ErrTraffic

The Industrialization of “ClickFix”: Inside ErrTraffic – Hudson Rock The Industrialization of “ClickFix”: Inside ErrTraffic Author: Hudson Rock Threat Intelligence Team | Date: December 28, 2025 Topic: Cybercrime / Social Engineering / ClickFix / ErrTraffic / Infostealer Trends Executive Summary The landscape of cybercrime is undergoing a profound structural shift. We are witnessing the transition […]
WIRED Database Leaked: 40 Million Record Threat Looms for Condé Nast

WIRED Database Leaked – Condé Nast Breach Analysis Incident Analysis Report WIRED Database Leaked: 40 Million Record Threat Looms for Condé Nast A comprehensive investigation into the current WIRED database leak and the threat of an imminent, much larger compromise targeting the Condé Nast portfolio. Executive Summary In late 2025, the media world was hit […]
Largest Open-Source Repository, theHarvester, integrates Hudson Rock’s free Infostealer Tools

🚀 Big News for Recon & OSINT Professionals! 🚀 🤝 We are thrilled to announce that Hudson Rock is now officially integrated with theHarvester, one of the most widely used open-source intelligence tools in the world. 🕵 Reconnaissance is the foundation of every successful security assessment. By combining theHarvester’s powerful collection capabilities with Hudson Rock‘s […]
The Infostealer to APT Pipeline: How Lazarus Group Hijacked a Yemen Disinformation Network

Hudson Rock Report: The Infostealer to APT Pipeline HUDSON ROCK Cybercrime Intelligence Back to Home APT Threat Intel Disinformation The Infostealer to APT Pipeline: How Lazarus Group Hijacked a Yemen Disinformation Network Hudson Rock investigations reveal how a single infected computer in Yemen served as the bridge between a 2019 disinformation campaign and North Korea’s […]