From Victim to Vector: How Infostealers Turn Legitimate Businesses into Malware Hosts

The Ouroboros of Cybercrime: ClickFix & Infostealers Hudson Rock Threat Intelligence The Ouroboros of Cybercrime From Victim to Vector: How Infostealers Turn Legitimate Businesses into Malware Hosts Figure 1: The ClickFix Hunter platform showing native integration with Hudson Rock, highlighting yeezyboostsalesos.us and associated administrative credentials. Executive Summary In the rapidly evolving landscape of cyber threats, […]
The Industrialization of “ClickFix”: Inside ErrTraffic

The Industrialization of “ClickFix”: Inside ErrTraffic – Hudson Rock The Industrialization of “ClickFix”: Inside ErrTraffic Author: Hudson Rock Threat Intelligence Team | Date: December 28, 2025 Topic: Cybercrime / Social Engineering / ClickFix / ErrTraffic / Infostealer Trends Executive Summary The landscape of cybercrime is undergoing a profound structural shift. We are witnessing the transition […]
WIRED Database Leaked: 40 Million Record Threat Looms for Condé Nast

WIRED Database Leaked – Condé Nast Breach Analysis Incident Analysis Report WIRED Database Leaked: 40 Million Record Threat Looms for Condé Nast A comprehensive investigation into the current WIRED database leak and the threat of an imminent, much larger compromise targeting the Condé Nast portfolio. Executive Summary In late 2025, the media world was hit […]
Largest Open-Source Repository, theHarvester, integrates Hudson Rock’s free Infostealer Tools

🚀 Big News for Recon & OSINT Professionals! 🚀 🤝 We are thrilled to announce that Hudson Rock is now officially integrated with theHarvester, one of the most widely used open-source intelligence tools in the world. 🕵 Reconnaissance is the foundation of every successful security assessment. By combining theHarvester’s powerful collection capabilities with Hudson Rock‘s […]
The Infostealer to APT Pipeline: How Lazarus Group Hijacked a Yemen Disinformation Network

Hudson Rock Report: The Infostealer to APT Pipeline HUDSON ROCK Cybercrime Intelligence Back to Home APT Threat Intel Disinformation The Infostealer to APT Pipeline: How Lazarus Group Hijacked a Yemen Disinformation Network Hudson Rock investigations reveal how a single infected computer in Yemen served as the bridge between a 2019 disinformation campaign and North Korea’s […]
De-anonymizing Threat Actors and Exposing Their Infrastructure Using Infostealer Intelligence

Speaker: Leonid Rozenberg, Cybercrime Researcher, Hudson Rock. Infostealing malware has become a near-perfect tool for cybercriminals, enabling the theft of sensitive data with remarkable efficiency. However, there are moments when the malware backfires, exposing the attackers themselves. This talk delves into cases where cybercriminals accidentally infected their own systems with Infostealer malware, providing Hudson Rock […]
Exclusive Look Inside a Compromised North Korean APT Machine Linked to The Biggest Heist in History

*Interactive simulator can be accessed via desktop – www.hudsonrock.com/northkorean In the world of Threat Intelligence, we are usually looking at the aftermath of an attack: the encrypted servers, the stolen databases, or the fraudulent transactions. Rarely do we get a look through the eyes of the attacker. But even state-sponsored hackers make mistakes. And sometimes, […]
The Infostealer to Government-Backed Hackers Pipeline

The Infostealer-to-APT Pipeline – Hudson Rock Infographic HUDSON ROCK THE INFOSTEALER TO APT PIPELINE How stolen diplomatic credentials fuel cyber-political power plays. The Dangerous Escalation Opportunistic Infection Random malware download Diplomat Compromised Valid MOFA credentials stolen APT Espionage State-sponsored attacks Global Diplomatic Exposure Hudson Rock detected infections exposing Ministry of Foreign Affairs (MOFA) credentials across […]
How Hackers Are Actually Using Infostealers (Top 4 Real Methods)

How Hackers Really Use Infostealers – Hudson Rock Infographic HUDSON ROCK HOW HACKERS REALLY USE INFOSTEALERS An analysis of the specific tactics used in the biggest recent cyber breaches. 30,000,000+ Infected Computers Monitored Major Victims AT&T, Uber, EA, Ticketmaster Top Tactics VPNs, Webmail, Slack, Cloud 1. VPN Credentials Hackers use stolen credentials to log in […]
Microsoft’s New Update Creates an Agentic OS Infostealer Attack Vector

Infographic: The Agentic OS & Hudson Rock Defense HUDSON ROCK Threat Intelligence Report The Agentic OS Attack Vector Microsoft’s new Windows 11 update centralizes data for AI agents. It’s the ultimate convenience for users and the ultimate shortcut for Infostealers. A Analyst Get insights or trends R Researcher Generate a report @| Tools Search The […]
Nikkei Breached: Infostealer Infection Grants Access to 17K+ Employee Slack Chat Histories

Over 17,000 employees and partners now face the fallout from a breach that started with a single infostealer infection on a Japanese computer in August 2025, ultimately handing attackers the keys to Nikkei’s Slack at nikkeidevs.slack.com. Hudson Rock‘s deep dive into stolen credential logs reveals the mechanics behind this intrusion, the incident spotlights how Infostealers […]
Approaching Infostealer Devs: a Brief Interview with AURA

To completely understand what’s going on in a market that has been growing in the last years I found mandatory to know which players are dominating it. Always remember that behind every user of the Internet there is another human like you, so if you can be kind enough to reach them and they agree, […]