Contact us Buy Me a Coffee

Sponsored by Hudson Rock Use Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are leading to ransomware attacks

Cass information Systems

cassinfo.com

Discovered 2026-05-11 13:51 UTC
Est. attack date 2026-05-11
Country US
Duplicate Entry
This victim has been identified as a duplicate of another entry in our database. However, this may not always be the case: the same organization can be targeted multiple times by the same or different ransomware groups, which may result in separate legitimate entries. Search for related entries

Description:

[AI generated] Cass Information Systems is a US-based company specializing in payment and information services. It provides freight invoice processing, auditing, and payment solutions, along with utility and telecom expense management. Operating primarily in the financial technology and business process outsourcing industry, Cass serves large corporations across North America and globally, helping clients manage and analyze invoice data to optimize spending and operational efficiency.

Infostealer activity detected by HudsonRock

Compromised Employees: 2

Compromised Users: 18

Third Party Employee Credentials: 5


External Attack Surface: 6


Infostealer Distribution

DNS Records:

The following DNS records were found for the victim's domain.

WHOIS Emails
  • domain.operationsweb.com
MX Records
  • cassinfo-com.mail.protection.outlook.com. Microsoft 365
  • cassinfo-com.mail.protection.outlook.com. Microsoft 365
TXT Records
  • intacct-esk=1759BFF0D9CF5011E0633506790AD9E5
  • duo_sso_verification=yNWlsi1MF4kbyXTDtHdfDs1UidzhFQlAAWB0nun8AtDt0HeBCkS6GsEJtfy2f6ZA
  • VZm8SpyD5MZiLibUchYTqJOXInp2FLFu
  • v=spf1 include:_spf.cassinfo_com._d.easydmarc.pro ~all
  • google-site-verification=wo0LZ2udBuIqiRvLOpzrVNkSleLUeFiusranUOtomr4\010
  • k=rsa; p=MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDGoQCNwAQdJBy23MrShs1EuHqK/dtDC33QrTqgWd9CJmtM3CK2ZiTYugkhcxnkEtGbzg+IJqcDRNkZHyoRezTf6QbinBB2dbyANEuwKI5DVRBFowQOj9zvM3IvxAEboMlb0szUjAoML94HOkKuGuCkdZ1gbVEi3GcVwrIQphal1QIDAQAB;
  • google-site-verification=HvX9Z8Xh0bz0-TWVzg0_DPUt0HAYQi4c83UTT4RvKqE
  • 748ecc8b8e975767d64ccfafe0f8c63c.8634dfb2e7059678efbef58f4e085c35.sectigo.com.
  • sending_domain668083=24f133fbc1865bdbe0d365b9f0b02e040a462a59d4d78a265436cbf89c9d044a
  • bmuskctem7blapc0g0r40cj8h4
  • tq6cmr3lndbqstg4shi8f9ik2n
  • AD37B03299C4589FBA2F69444F581C45FDC65132909DD76E08AF962F237A4C54
  • 8rpjk9pt5jdnb70708cot2gohi
  • _4loqircg2fk2nf6snhimxld2jszpjld
  • 7KfpjUO7AHtJgKKzEl1p1l/04oYFtZ/y9ufZFa3ZLLv9fj6zp5RSMopTb6MT1gzfj6mHB2qD3h6TOkDdNAyiug==
  • MS=ms86728024
  • docusign=036bdb40-91a8-4274-9018-79027656342b
  • 16F7C4F6F646DFAE75FC2C8FA7FDE3CCCC6E269F92F7C15FB324E5EBE87ECADA
  • docusign=bd3b856e-e494-483e-b193-6805fd796c07
  • uv88f85o9ce98ltblfen6gfabt
  • spf2.0/pra a mx include:spf.protection.outlook.com ip4:216.71.142.218 ip4:216.71.147.197 include:senderidhost.messageprovider.com include:_spf.salesforce.com ~all
  • intacct-esk=0F53D536ADC38BE5E0633606790ACFEE
  • ms-domain-verification=4f6e9a31-6e00-489b-a481-aa39fa4aa7de
  • element-sso-domain-verification=db23cada9fdcb40f7baa2843be54c8a3
  • l679ucl76bd1jub1fgfhn8t6hc
Cloud / SaaS Services Detected
Microsoft 365 Salesforce Sage Cisco Duo DocuSign

Leak Screenshot:

Leak Screenshot