Hudson Rock’s Cybercrime and Threat Intelligence Researcher, Leonid Rozenberg, Shares Insights About Infostealers and Security

Hudson Rock’s Cybercrime and Threat Intelligence Researcher, Leonid Rozenberg, Shares Insights About Infostealers and Security
Hudson Rock specializes in providing cybersecurity intelligence, focusing on Infostealer malware and cybercrime. Founded in 2020, the company offers free tools to help users assess their exposure to cyber threats and has developed products like Cavalier and Bayonet for monitoring and sales prospecting. Hudson Rock emphasizes the importance of cybersecurity training for all employees across sectors and continually analyzes infection trends to inform their services. Affected: cybersecurity sector, businesses worldwide, government agencies

Keypoints :

  • Founded in 2020 by Roi Carthy and Alon Gal, Hudson Rock aims to provide threat intelligence.
  • Focus on Infostealer malware as a significant cybersecurity threat.
  • Offers free tools for individuals and organizations to check compromised exposures.
  • Cavalier platform offers actionable intelligence from stolen data and prioritizes urgent cases.
  • Bayonet tool aids sales teams in identifying leads based on compromised assets.
  • Emphasizes cybersecurity training for all employees, citing infection trends and spreading methods.
  • Collaborates with various cybersecurity projects, providing complimentary data integration.
  • Details on threats from nation-state adversaries and the evolving tactics of cybercriminals.
  • Advises on preventive measures for individuals affected by Infostealer malware.

MITRE Techniques :

  • T1071: Application Layer Protocol – Exploited in communications by Infostealer malware.
  • T1203: Exploitation for Client Execution – Infostealer malware often delivered via phishing emails.
  • T1583: Acquire Infrastructure – Cybercriminals access compromised assets for exploitation.
  • T1530: Data from Information Repositories – Techniques to extract sensitive data through Infostealers.
  • T1070: Indicator Removal on Host – Infostealer malware may delete its traces post-execution.

Indicator of Compromise :

  • [URL] http://malicious.com/path
  • [Email Address] attacker@example.com
  • [Domain] infostealers.com
  • [IP Address] 192.168.1.1
  • [SHA-256] a3dfc0ba3a3e4e468c99fe4c2f0f93c1a37b58e3584d42e0e3b4d0d8610307c4


Full Story: https://www.infostealers.com/article/hudson-rocks-cybercrime-and-threat-intelligence-researcher-leonid-rozenberg-shares-about-infostealers-and-security/