sfp_hudsonrock - poppopjmp/spiderfoot GitHub Wiki
Purpose: Queries Hudson Rock's Cavalier OSINT API for infostealer intelligence. Searches for compromised credentials, infected machines, and stealer malware data associated with domains, emails, usernames, and phone numbers. Hudson Rock aggregates data from millions of computers compromised by infostealer malware worldwide.
Category: Leaks, Dumps and Breaches
- No API key required — uses Hudson Rock's free OSINT endpoint.
- Watches for
DOMAIN_NAME,INTERNET_NAME,EMAILADDR,USERNAME, andPHONE_NUMBERevents. - Can be run from the web UI or CLI:
python sf.py -s example.com -t DOMAIN_NAME -m sfp_hudsonrock python sf.py -s [email protected] -t EMAILADDR -m sfp_hudsonrock
| Event Type | Cavalier API Endpoint |
|---|---|
DOMAIN_NAME / INTERNET_NAME
|
search-by-domain |
EMAILADDR |
search-by-email |
USERNAME |
search-by-username |
PHONE_NUMBER |
search-by-username |
| Event Type | Description |
|---|---|
RAW_RIR_DATA |
Domain-level summary (total compromised, employees/users/third-parties, stealer families, password strength stats) and individual stealer machine records |
EMAILADDR_COMPROMISED |
Email found associated with infostealer-compromised machine |
PHONE_NUMBER_COMPROMISED |
Phone number found associated with infostealer-compromised machine |
MALICIOUS_INTERNET_NAME |
Domain with employee credentials compromised by infostealers |
Hudson Rock Infostealer Intelligence for example.com
Total compromised credentials: 1247
Employees: 89 | Users: 1102 | Third-parties: 56
Top stealer families: RedLine: 412, Lumma: 298, Raccoon: 187, Vidar: 95
Employee passwords: 89 total, 48.8% weak, 29.2% strong
User passwords: 1102 total, 67.0% weak, 20.7% strong
[email protected] [Hudson Rock - Infostealer]
Hudson Rock [[email protected]]: Date: 2026-01-15T10:00:00.000Z | Host: DESKTOP-ABC | OS: Windows 11 | Stealer: Lumma | Malware: C:\Users\test\malware.exe | IP: 192.168.1.1 | AV: Windows Defender
| Option | Default | Description |
|---|---|---|
delay |
1 |
Delay in seconds between API requests to avoid rate-limiting |
max_stealers |
50 |
Maximum number of stealer records to process per query (0 = unlimited) |
- None — Hudson Rock's Cavalier OSINT API is free and requires no authentication.
- Combine with
sfp_haveibeenpwnedandsfp_leakcheckfor comprehensive breach/leak coverage. - Use domain queries to assess organizational exposure to infostealer campaigns.
- Employee credential compromise findings can indicate active risk of account takeover.
- Stealer family data helps identify which malware campaigns targeted an organization.
Module added in response to Issue #324 — Hudson Rock Infostealer Intelligence Integration.