Israeli Threat Intelligence Firm Uncovers Credentials Associated with Cybercrime Forums on 120,000 Infected Computers

Israeli threat intelligence company, Hudson Rock, has made a significant discovery in the world of cybercrime. Through their analysis of a massive database consisting of over 14.5 million machines infected with information stealers, they have identified credentials associated with cybercrime forums on approximately 120,000 infected computers. This discovery has far-reaching implications in the fight against cybercriminals and their illicit activities.

Background

As part of their ongoing research and analysis, Hudson Rock delved into a database containing millions of infected machines. With information stealers as their primary focus, the researchers sifted through the data in search of any valuable insights and potential leads.

Potential impact of the findings

The data gathered by Hudson Rock can potentially be utilized to unmask the true identities of the hackers and cybercriminals behind these forums. By uncovering these credentials, Hudson Rock not only gains insight into their activities but also enables the possibility of accessing additional online accounts and personal information. This crucial information can help in identifying and apprehending these cybercriminals.

Previous exposure by Hudson Rock

This recent breakthrough is not the first time Hudson Rock has made significant strides in the world of cybersecurity. In a previous incident, they exposed a hacker who intentionally infected his computer with an information stealer. Through this act, the hacker managed to breach multiple companies, underscoring the threat that these information stealers pose to individuals and organizations alike.

Notable cybercrime forums

Among the cybercrime forums identified, ‘Nulled.to’ emerged as the forum with the highest number of compromised users. Following closely behind are ‘Cracked.io’ and ‘Hackforums.net’. These forums serve as hubs for cybercriminal activities, where stolen information and tools are traded and discussed.

Strength of user passwords on forums

In their analysis, Hudson Rock found variations in password strength across different cybercrime forums. ‘Breached.to’ was observed to have the strongest user passwords among these forums, demonstrating a higher level of sophistication by its users. On the other hand, ‘Rf-cheats.ru’ showcased some of the weakest passwords, potentially indicating a lack of awareness or negligence by the forum’s users.

Comparison to government and military websites

Interestingly, the passwords used on cybercrime forums were found to be stronger than those used on government and military websites. This finding presents a concerning disparity, as it indicates that cybercriminals are often more vigilant in securing their illicit activities than some legitimate organizations are in protecting their sensitive information.

Countries with infected hackers

The analysis by Hudson Rock revealed the top five countries with infected hackers. Tunisia, Malaysia, Belgium, the Netherlands, and Israel emerged as the countries with the highest number of compromised machines hosting these cybercriminal activities. This highlights the global nature of cybercrime and the need for international cooperation in combating such threats.

Notable information stealers responsible for infections

Among the various information stealers identified, Redline was found to be the most prevalent in causing infections. Other observed information stealers include Raccoon and Azorult. These info-stealers have become favored initial attack vectors for cybercriminals, facilitating the execution of more sophisticated cyberattacks such as ransomware and data breaches.

Growing Threat of Info-Stealer Infections

The scale of info-stealer infections has seen a staggering increase of 6,000% since 2018. This alarming rise highlights the growing threat posed by these malicious tools. Information stealers serve as a gateway for cybercriminals to gain unauthorized access and exploit sensitive data, compromising both individuals and organizations. Such infections have become integral to carrying out successful cyberattacks, underscoring the urgent need for enhanced cybersecurity measures.

Hudson Rock’s breakthrough discovery of credentials associated with cybercrime forums on infected computers provides valuable insights into the workings of cybercriminals. This revelation not only enables the identification of these hackers but also offers the potential to gain access to additional online accounts and personal information, assisting in the fight against cybercrime. The stark disparities in password strength and the global spread of infected hackers call for organizations and governments to heighten their vigilance and collaborate on developing robust cybersecurity strategies. As cybercriminals continually evolve their tactics, it is crucial for all stakeholders to remain proactive in defending against these threats.

Explore more

Raedbots Launches Egypt’s First Homegrown Industrial Robots

The metallic clang of traditional assembly lines is finally being replaced by the precise, rhythmic hum of domestic innovation as Raedbots unveils a suite of industrial machines that redefine local manufacturing. For decades, the Egyptian industrial sector remained shackled to the high costs of European and Asian imports, making the dream of a fully automated factory floor an expensive luxury

Trend Analysis: Sustainable E-Commerce Packaging Regulations

The ubiquitous sight of a tiny electronic component rattling inside a massive cardboard box is rapidly becoming a relic of the past as global regulators target the hidden environmental costs of e-commerce logistics. For years, the digital retail sector operated under a “speed at any cost” mentality, often prioritizing packing convenience over spatial efficiency. However, as of 2026, the legislative

How Are AI Chatbots Reshaping the Future of E-commerce?

The modern digital marketplace operates at a velocity where a three-second delay in response time can result in a permanent loss of consumer interest and substantial revenue. While traditional storefronts relied on human intuition to guide shoppers through aisles, the current e-commerce landscape uses sophisticated artificial intelligence to simulate and surpass that personalized touch across millions of simultaneous interactions. This

Stop Strategic Whiplash Through Consistent Leadership

Every time a leadership team decides to pivot without a clear explanation or warning, a shockwave travels through the entire organizational chart, leaving the workforce disoriented, frustrated, and increasingly cynical about the future. This phenomenon, frequently described as strategic whiplash, transforms the excitement of a new executive direction into a heavy burden of wasted effort for the staff. Instead of

Most Employees Learn AI by Osmosis as Training Lags

Corporate boardrooms across the country are echoing with the same relentless command to integrate artificial intelligence immediately, yet the vast majority of people expected to use these tools have never received a single hour of formal instruction. While two-thirds of organizations now demand AI implementation as a standard operating procedure, the workforce has been left to navigate this technological frontier