Skip to content
CavalierGPT: The First Comprehensive Infostealers AI Bot -
Try Now →
HOME
LEARN
REPORTS
TECHNIQUES
VICTIMS
COLLABS
FREE INDIVIDUAL PROTECTION
HOME
LEARN
REPORTS
TECHNIQUES
VICTIMS
COLLABS
FREE INDIVIDUAL PROTECTION
Articles | InfoStealers
AI Agents’ Most Downloaded Skill Is Discovered to Be an Infostealer
February 6, 2026
AI Agents’ Most Downloaded Skill Is Discovered to Be an Infostealer | Hudson Rock AI Agents’ Most Downloaded Skill Is Discovered to Be an Infostealer By Hudson Rock Intelligence Team | February 6, 2026 In a sophisticated intersection of AI hype and malicious intent, a new threat has emerged targeting developers and AI power-users. Recent […]
A Technical and Ethical Post-Mortem of the Feb 2026 Harvard University ShinyHunters Data Breach
February 4, 2026
Systematic Failure: The Harvard ShinyHunters Leak Analysis Systematic Failure of Data Sovereignty A Technical and Ethical Post-Mortem of the 2026 Harvard University ShinyHunters Data Breach On February 4, 2026, the cybersecurity landscape of higher education was fundamentally altered. A breach attributed to the cybercriminal syndicate ShinyHunters – operating as part of the “Scattered LAPSUS$ Hunters” […]
The Autonomous Adversary: From “Chatbot” to Criminal Enterprise
February 1, 2026
The Autonomous Adversary: When AIs Collaborate to Hack The Autonomous Adversary: From “Chatbot” to Criminal Enterprise By Hudson Rock Research Team | February 1, 2026 Executive Summary As of February 2026, the cybersecurity landscape has shifted from defending against human adversaries to combating autonomous AI agents. The convergence of OpenClaw (local runtime), Moltbook (collaboration network), […]
Compromised Machine in Gaza Strip Reveals Operational Documents From Breaking Dawn Operation
January 27, 2026
Hudson Rock researchers have recovered a full set of original internal documents from the Al-Aqsa Martyrs’ Brigades, exfiltrated from a compromised machine in the Gaza Strip The post Compromised Machine in Gaza Strip Reveals Operational Documents From Breaking Dawn Operation appeared first on InfoStealers.
ClawdBot: The New Primary Target for Infostealers in the AI Era
January 26, 2026
ClawdBot Analysis – Hudson Rock ClawdBot: The New Primary Target for Infostealers in the AI Era January 26, 2026 Hudson Rock Research The rise of “Local-First” AI agents has introduced a new, highly lucrative attack surface for cybercriminals. ClawdBot, a rapidly growing open-source personal AI assistant, shifts the locus of computation from the cloud to […]
Pccomponentes “Breach”: How Infostealer Logs Enable Convincing Credential Stuffing
January 21, 2026
Pccomponentes “Breach”: How Infostealer Logs Enable Convincing Credential Stuffing Campaigns Pccomponentes “Breach”: How Infostealer Logs Enable Convincing Credential Stuffing Campaigns A recent cybersecurity incident involving the major Spanish electronics retailer, Pccomponentes, highlights a growing trend in the cybercrime ecosystem: the weaponization of Infostealer logs to stage convincing “fake breaches” that cause massive PR headaches. Recently, […]
Inside Al-Qassam Brigades (Hamas): A Compromised Machine View of Religious and Cultural Weaponization
January 15, 2026
Analysis of a compromised machine in Deir al-Balah (Gaza Strip) has revealed a focused collection of documents attributed to Hamas’ Al-Qassam Brigades. The post Inside Al-Qassam Brigades (Hamas): A Compromised Machine View of Religious and Cultural Weaponization appeared first on InfoStealers.
The Art of Recruitment – A Jihadist Manual Found on a Compromised Machine
January 7, 2026
A comprehensive investigation conducted by the Hudson Rock team has identified a sophisticated Jihadist recruitment guide stored on an infostealer-compromised machine. The post The Art of Recruitment – A Jihadist Manual Found on a Compromised Machine appeared first on InfoStealers.
Dozens of Global Companies Hacked via Cloud Credentials from Infostealer Infections & More at Risk
January 5, 2026
Dozens of Global Companies Hacked via Cloud Credentials from Infostealer Infections & More at Risk Dozens of Global Companies Hacked via Cloud Credentials from Infostealer Infections & More at Risk Figure 1: The digital persona of “Zestix,” a threat actor specializing in auctioning corporate cloud access. Table of Contents 1. Executive Summary 2. The Threat […]
Reports | InfoStealers
Infostealers Weekly Report: 2026-01-26 – 2026-02-02
February 2, 2026
InfoStealers Weekly Report – In this comprehensive report, we provide you with valuable insights into the most pressing threats facing organizations today. As cyberattacks continue to grow in complexity and scale, our mission is to equip you with the knowledge and tools needed to safeguard your sensitive information. Join us as we analyze the top […]
Infostealers Weekly Report: 2026-01-19 – 2026-01-26
January 26, 2026
InfoStealers Weekly Report – In this comprehensive report, we provide you with valuable insights into the most pressing threats facing organizations today. As cyberattacks continue to grow in complexity and scale, our mission is to equip you with the knowledge and tools needed to safeguard your sensitive information. Join us as we analyze the top […]
Infostealers Weekly Report: 2026-01-12 – 2026-01-19
January 19, 2026
InfoStealers Weekly Report – In this comprehensive report, we provide you with valuable insights into the most pressing threats facing organizations today. As cyberattacks continue to grow in complexity and scale, our mission is to equip you with the knowledge and tools needed to safeguard your sensitive information. Join us as we analyze the top […]
Infostealers Weekly Report: 2026-01-05 – 2026-01-12
January 12, 2026
InfoStealers Weekly Report – In this comprehensive report, we provide you with valuable insights into the most pressing threats facing organizations today. As cyberattacks continue to grow in complexity and scale, our mission is to equip you with the knowledge and tools needed to safeguard your sensitive information. Join us as we analyze the top […]
Infostealers Weekly Report: 2025-12-29 – 2026-01-05
January 5, 2026
InfoStealers Weekly Report – In this comprehensive report, we provide you with valuable insights into the most pressing threats facing organizations today. As cyberattacks continue to grow in complexity and scale, our mission is to equip you with the knowledge and tools needed to safeguard your sensitive information. Join us as we analyze the top […]
Infostealers Weekly Report: 2025-12-22 – 2025-12-29
December 29, 2025
InfoStealers Weekly Report – In this comprehensive report, we provide you with valuable insights into the most pressing threats facing organizations today. As cyberattacks continue to grow in complexity and scale, our mission is to equip you with the knowledge and tools needed to safeguard your sensitive information. Join us as we analyze the top […]
Infostealers Weekly Report: 2025-12-15 – 2025-12-22
December 22, 2025
InfoStealers Weekly Report – In this comprehensive report, we provide you with valuable insights into the most pressing threats facing organizations today. As cyberattacks continue to grow in complexity and scale, our mission is to equip you with the knowledge and tools needed to safeguard your sensitive information. Join us as we analyze the top […]
Techniques | InfoStealers
Formbook/xLoader
Formbook is an information-stealing malware, discovered in 2016, that is capable of stealing data entered into HTML website forms and logging keystrokes... The post Formbook/xLoader appeared first on InfoStealers.
LummaC2 Stealer
Heatmap of instances of ATT&CK techniques for LummaC2 Stealer based on recent public CTI reporting (sources in Notes for each technique)... The post LummaC2 Stealer appeared first on InfoStealers.
Luca Stealer
Heatmap of instances of ATT&CK techniques for Luca Stealer based on recent public CTI reporting (sources in Notes for each technique)... The post Luca Stealer appeared first on InfoStealers.
Python Dependency Stealer January 2023
Heatmap of instances of ATT&CK techniques for an information stealer discovered in January 2023 that achieves initial access via a malicious software dependency (a Python package)... The post Python Dependency Stealer January 2023 appeared first on InfoStealers.
Aurora Stealer
Aurora is an information stealer advertised on underground forums beginning in September 2022 (it was previously advertised in a different form, as a botnet with different functionality... The post Aurora Stealer appeared first on InfoStealers.
DuckTail Stealer
Heatmap of instances of ATT&CK techniques for DuckTail Stealer based on recent public CTI reporting (sources in notes for each technique)... The post DuckTail Stealer appeared first on InfoStealers.
RisePro Stealer
Heatmap of (sub)techniques mentioned in Sekoia.io's report "New RisePro Stealer distributed by the prominent PrivateLoader"... The post RisePro Stealer appeared first on InfoStealers.
Prynt Infostealer
Heatmap of instances of ATT&CK techniques referenced in recent, public CTI reporting around Prynt Infostealer (source links included in Notes per technique below)... The post Prynt Infostealer appeared first on InfoStealers.
Rhadamanthys Stealer
Heatmap of instances of ATT&CK techniques for Rhadamanthys Stealer based on recent public CTI reporting (sources in notes for each technique)... The post Rhadamanthys Stealer appeared first on InfoStealers.
Erbium Stealer
Heatmap of instances of ATT&CK techniques for Erbium Stealer based on recent public CTI reporting (sources in notes for each technique)... The post Erbium Stealer appeared first on InfoStealers.
HOME
LEARN
REPORTS
TECHNIQUES
VICTIMS
COLLABS
FREE INDIVIDUAL PROTECTION
BE THE FIRST TO KNOW
Get FREE access to
Cavalier GPT
Stay informed with the latest insights in our Infostealers weekly report.
Receive a notification if your email is involved in an Infostealer infection.
Powered by Hudson Rock
No Spam, We Promise
Email Address
Subscribe →
BE THE FIRST TO KNOW
Get FREE access to
Cavalier GPT
Stay informed with the latest insights in our Infostealers weekly report.
Receive a notification if your email is involved in an Infostealer infection.
Powered by Hudson Rock
No
Spam,
We Promise
Email Address
Subscribe →