Buy Me a Coffee

Sponsored by Hudson Rock Use Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are impacting your business

Logo Bretagne Telecom

Group: doppelpaymer

Discovered by ransomware.live: 2020-01-01

Estimated attack date: 2020-01-01

Country: FR


🕵️ Infostealer activity detected by HudsonRock

Compromised Employees: 1

Compromised Users: 7

Third Party Employee Credentials: 0


External Attack Surface: 18


Infostealer Distribution


DNS Records:

The following DNS records were found for the victim's domain.

WHOIS Emails
  • support bretagnetelecom.com
  • nicolas.boittin bretagnetelecom.com
MX Records
  • mail.bretagnetelecom.fr.
TXT Records
  • dn4kr8rd4shh6jbq5fwnzvjcw4jl0prp
  • 2jvggsjddtk8wbyxmpg9mf2d7lh559kx
  • [RANDOM STRING]
  • _11934gfy2m6ayu7je2ea0q2tkvkwsu2
  • m30mzdwjlt2y89pxbpp185ptrlwt20gr
  • f607ngsvwwpzw9rhjyyyxg6szm3vjp98
  • q7gzjqsjp95zm40ykmdmh5ddtdf5q5f7
  • 0mt53bb300q8rm68637b81ml0drnz4t2
  • zcpxwpn9ljz1g38m8w9x1xp8n6rr21x9
  • vvzr0wg1l1825j545ttq88t87ytxjg3b
  • v=spf1 mx a ip4:77.74.208.203/32 ~all
  • 43yw6s5zlkrfy2snw7rkmzg4y8skxqn0
  • 0pqrfxr09q0hnlmfztjt6f0cdfss482g
  • zkvslsmlzsy45z1jbw3nvcdgf1cb7j0f
  • 3gknsb4qgw1tf982j2027110vlwtw3xs
  • _ounpxt62v1s4bud27hq1l0hvcr217av
  • t0f3vxqfc78crbz8nh6ljwm86lr5kkbd
  • lw7lb3v2w6m0h0vvtlpwx2j05jnmrddv
  • v6b7j7h45mkldj1g02y54njjtv9tcj5g
  • _j59wlr6dvp8jtu4zn8mdtp42tpz6pk8
  • 0fdrgbg7ph55gkgf7jgqfr6kn9wp5g9s
  • m725wxsrgx8ccq8ryjrzh93nbxcbzh54
Cloud / SaaS Services Detected
No well-known cloud or SaaS service detected.