Hudson Rock says initial access was likely obtained using credentials harvested by infostealers like RedLine, Lumma, and Vidar.

Hudson Rock says initial access was likely obtained using credentials harvested by infostealers like RedLine, Lumma, and Vidar.