# Hudson Rock

| **Hudson Rock**  | **Quick Overview**                                                                                                                                                  |
| ---------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------- |
| URL              | <https://www.hudsonrock.com/>                                                                                                                                       |
| What it does     | Tracks data stolen by infostealer malware and lets you search for exposed emails, domains, and companies linked to breaches.                                        |
| How to use it    | Search an email, username, or domain to check if it appears in known infostealer logs. Review associated infections, compromised machines, and exposed credentials. |
| Cost             | Partially free (basic searches free, deeper intelligence paid).                                                                                                     |
| Account required | No (for basic searches).                                                                                                                                            |
| Cookies          | A mix of analytics and tracking cookies.                                                                                                                            |
| Ownership        | Co-founded and owned by Roi Carthy and Alon Gal from Israel.                                                                                                        |
| Use in Reporting | Great for evidencing credential exposure, compromised employees, or organisational risk from infostealer infections.                                                |

### What does Hudson Rock do?

Hudson Rock collects and analyses data from infostealer malware infections. These infections harvest sensitive data like passwords, browser sessions, cookies, and autofill info from infected devices.

The platform turns that raw stolen data into searchable intelligence you can use to identify compromised individuals or organisations.

**The lowdown:** It’s fast, simple to use, and highly effective for uncovering stolen data and infected machines tied to individuals or organisations, but works best when combined with other sources.

### How to Use:

**1. Go to the homepage and use the search bar. Enter an email address, username, or company domain. E.g. we searched YouTube.**

Note: email addresses usually give the most precise results.&#x20;

<figure><img src="/files/d1tcfCjAjStqk7E55DsX" alt=""><figcaption></figcaption></figure>

**2. Review results showing number of infected machines, exposed credentials, infection timelines, and linked employees or users.**

**3. Pivot your investigation by using what you find to expand, for example:**

* **Reuse emails/usernames in other tools**
* **Check domains for wider organisational exposure**
* **Identify patterns (same password, same malware, etc.)**

### Cost

* [ ] Free
* [x] Partially Free
* [ ] Paid

Basic searches are free. Deeper intelligence requires payment.

## Data Processing

### Account Required:

* [ ] Yes
* [x] No

Account required for advanced searches.

### Cookies:&#x20;

Hudson Rock uses a mix of analytics and tracking cookies (mainly Google Analytics and Reddit tags) It also sets cookies for geolocation, referral tracking, and consent preferences.

### Use in Reporting

Hudson Rock is useful for:

* Demonstrating real-world compromise not just theoretical risk.
* Supporting breach investigations.
* Profiling organisational cyber hygiene.
* Adding weight to threat intelligence reports.

[Hudson Rock was central to uncovering a large-scale campaign ](https://expertinsights.com/news/infostealer-fuels-cloud-file-sharing-breaches)affecting nearly 50 organisations worldwide, including aviation, healthcare, and infrastructure, legal, and government-adjacent sectors. The activity centred on compromised enterprise file-sharing platforms, including ShareFile, Nextcloud, and OwnCloud.

| **Capabilities**                              | **Limitations**                                               |
| --------------------------------------------- | ------------------------------------------------------------- |
| Identifies compromised emails and domains.    | Only covers data from infostealer malware (not all breaches). |
| Shows infected machines linked to users.      | Data may be incomplete or time-lagged.                        |
| Surfaces stolen credentials and data types.   | Limited detail without paid access.                           |
| Tracks infostealer malware activity.          | Potential for false positives if emails are reused/shared.    |
| Links individuals to organisational breaches. | <p><br></p>                                                   |

### Summary

Hudson Rock is a powerful OSINT tool for uncovering real cyber compromises via infostealer data, most useful in the analysis and enrichment stage of the OSINT workflow.

### Ownership

Hudson Rock is an Israeli cybersecurity company co-founded and owned by [Roi Carthy ](https://www.linkedin.com/in/roicarthy/)(CEO) and [Alon Gal](https://www.linkedin.com/in/alon-gal-utb/) (CTO).

### Ethical Considerations

* Handle exposed personal data responsibly.
* Avoid misuse of credentials or sensitive information.
* Ensure compliance with data protection laws.
* Use strictly for legitimate investigative or defensive purposes.

### Related Tools:

* [Have I been pwned?](/osint-tools/have-i-been-pwned.md)
* DeHashed
* [IntelligenceX](/osint-tools/intelligencex.md)

#### Sources

<https://www.hudsonrock.com/>&#x20;

<https://www.hudsonrock.com/about>

<https://www.linkedin.com/in/alon-gal-utb/>&#x20;

<https://www.linkedin.com/in/roicarthy/>&#x20;

<https://www.reddit.com/user/hudsonrock-reddit/>&#x20;

<https://expertinsights.com/news/infostealer-fuels-cloud-file-sharing-breaches>&#x20;


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://tools.osintnewsletter.com/osint-tools/hudson-rock.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
