www.hudsonrock.com Open in urlscan Pro
34.249.200.254  Public Scan

Submitted URL: https://www.hudsonrock.com/blog/snowflake-massive-breach-access-through-infostealer-infection
Effective URL: https://www.hudsonrock.com/
Submission: On June 03 via api from TR — Scanned from DE

Form analysis 2 forms found in the DOM

/search

<form action="/search" id="domain-form" class="apk-form w-form"><input class="compromised-form-field w-input" maxlength="256" name="query" placeholder="Search now... Enter your domain." type="search" id="search-domain" required=""><input
    type="submit" class="submit-button w-button" value=""></form>

/search

<form action="/search" id="email-form" class="apk-form w-form"><input class="compromised-form-field w-input" maxlength="256" name="query" placeholder="Search now... Enter your email." type="search" id="search-email" required=""><input type="submit"
    class="submit-button w-button" value=""></form>

Text Content

This website uses cookies.

Learn More

Products

CavalierBayonetUse Cases
APIFree ToolsContact
About Us

Partner with UsCompanyBlogBlog
Customer Login

Schedule a Demo
Customer Login

Schedule a Demo




HUDSON ROCK’S PRODUCTS — CAVALIER & BAYONET — ARE POWERED BY OUR CONTINUOUSLY
AUGMENTED CYBERCRIME DATABASE, COMPOSED OF MILLIONS OF MACHINES COMPROMISED BY
INFOSTEALERS IN GLOBAL MALWARE SPREADING CAMPAIGNS.


Our high-fidelity data is sourced directly from threat actors — not from
database leaks.


27,903,934

Compromised Machines


3,932,099

Compromised Employees


THE HUDSON ROCK API


A Robust Cybercrime Intelligence Feed:

 * End-User Protection
 * Infrastructure Protection
 * Supply Chain Risk Assessment
 * Assets Discovery

Try Our Free Preview API Today


TRUSTED BY SECURITY & PRODUCT TEAMS AT LEADING COMPANIES.



Read Customer Use Cases


IS YOUR COMPANY OR SUPPLY CHAIN COMPROMISED?




HAS YOUR EMAIL BEEN COMPROMISED?




HUDSON ROCK IS TRUSTED BY:


 * Security & Threat Intelligence Teams
 * Cyber-Insurance Providers
 * 3rd Party Risk Assessment Providers
 * MSSPs
 * Governmental Agencies

Schedule a Demo


CAVALIER™ — FOR THREAT INTELLIGENCE PROFESSIONALS

Are you a security professional charged with bolstering platform integrity and
defending against Account Take Over (ATO), Ransomware Attacks & Corporate
Espionage?

With Cavalier™ you will be immediately notified about Compromised Credentials
belonging to your Employees, Customers, Users & Vendors.


CAVALIER™ INCLUDES:


 * Compromised Employees
 * Compromised Customers & Users
 * Compromised Supply Chain

 * Compromised Android Users
 * Compromised Leaked Database
 * Compromised CXO’s & Family Members


Schedule a DemoEXPLORE CAVALIER™


BAYONET™ — FOR CYBERSECURITY SALES TEAMS & MSSPS

Are you a sales professional selling products and services in the cybersecurity
space looking for more leads and prospects?

With Bayonet™ you get access to hundreds of thousands of compromised companies
around the world with active vulnerabilities that you can convert into
customers.


BAYONET™ INCLUDES:


 * Search for Prospects by Name
 * Search by Geography
 * Search by Industry
 * Search for Prospects by Login Infrastructure
   

 * Granular Supply Chain Risk Assessments

 * Compromised Credentials
 * Discover Technologies Used by Prospects
   


Schedule a DemoEXPLORE BAYONET™


IN THE PRESS:



USERS OF CYBERCRIME FORUMS OFTEN FALL VICTIM TO INFO-STEALERS, RESEARCHERS FIND

"After analyzing millions of computers infected with info-stealing malware,
researchers at cybersecurity firm Hudson Rock said they identified 120,000 that
contained credentials used for logging into cybercrime forums."
August 16, 2023


CYBERSECURITY FIRM LINKS PIERS MORGAN TWITTER HACK TO LEAK OF 400M RECORDS

"Israeli cyber-intelligence firm Hudson Rock appeared to be the first to notice
the posting offering the data of 400 million Twitter users, tweeting about the
“credible threat” three days ago."
January 1, 2023


533 MILLION FACEBOOK USERS' PHONE NUMBERS AND PERSONAL DATA HAVE BEEN LEAKED
ONLINE

"A database of that size containing the private information such as phone
numbers of a lot of Facebook's users would certainly lead to bad actors taking
advantage of the data to perform social-engineering attacks [or] hacking
attempts," Gal told Insider.
April 1, 2021


T-MOBILE HACK IS A RETURN TO THE ROOTS OF CYBERCRIME

“In the case of the T-Mobile attack, the alleged hacker said they had different
motivations. In a screenshot of a text conversation posted online by Alon Gal,
co-founder of cybercrime firm Hudson Rock, the hacker appears to tell Gal that
the attack was done “to harm US infrastructure.”
March 1, 2021
Hudson Rock ™ | Terms of Service | Privacy Statement
By clicking “Accept All Cookies”, you agree to the storing of cookies on your
device to enhance site navigation, analyze site usage, and assist in our
marketing efforts.
Cookies Settings Reject All Accept All Cookies



PRIVACY PREFERENCE CENTER

When you visit any website, it may store or retrieve information on your
browser, mostly in the form of cookies. This information might be about you,
your preferences or your device and is mostly used to make the site work as you
expect it to. The information does not usually directly identify you, but it can
give you a more personalized web experience. Because we respect your right to
privacy, you can choose not to allow some types of cookies. Click on the
different category headings to find out more and change our default settings.
However, blocking some types of cookies may impact your experience of the site
and the services we are able to offer.
More information
Allow All


MANAGE CONSENT PREFERENCES

STRICTLY NECESSARY COOKIES

Always Active

These cookies are necessary for the website to function and cannot be switched
off in our systems. They are usually only set in response to actions made by you
which amount to a request for services, such as setting your privacy
preferences, logging in or filling in forms. You can set your browser to block
or alert you about these cookies, but some parts of the site will not then work.
These cookies do not store any personally identifiable information.

TARGETING COOKIES

Targeting Cookies

These cookies may be set through our site by our advertising partners. They may
be used by those companies to build a profile of your interests and show you
relevant adverts on other sites. They do not store directly personal
information, but are based on uniquely identifying your browser and internet
device. If you do not allow these cookies, you will experience less targeted
advertising.

PERFORMANCE COOKIES

Performance Cookies

These cookies allow us to count visits and traffic sources so we can measure and
improve the performance of our site. They help us to know which pages are the
most and least popular and see how visitors move around the site. All
information these cookies collect is aggregated and therefore anonymous. If you
do not allow these cookies we will not know when you have visited our site, and
will not be able to monitor its performance.

Back Button


COOKIE LIST



Search Icon
Filter Icon

Clear
checkbox label label
Apply Cancel
Consent Leg.Interest
checkbox label label
checkbox label label
checkbox label label

Reject All Confirm My Choices