Buy Me a Coffee

Sponsored by Hudson Rock Use Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are leading to ransomware attacks

Logo C.A. LINDMAN Inc.

Group: Dragonforce

Discovered by ransomware.live: 2026-03-06

Estimated attack date: 2026-03-06

Country: US

Description:

Numerous data items, including financial and project details, were leaked from servers located at the company's headquarters in Florida, Maryland, and North Carolina. C.A. Lindman, Inc., founded in 1990, has grown from a small restoration company with less than 10 employees, into one of the top 20 national firms specializing in exterior concrete and masonry repairs over the last 30 years. The founders, Rob Pusheck and Jeff Procter, have kept Lindman focused on meeting all of their clients’ needs and expectations. The “Lindman Difference” is the company’s motto and delivering this superior service is the company-wide goal every day.



DNS Records:

The following DNS records were found for the victim's domain.

WHOIS Emails
  • abuse@godaddy.com
MX Records
  • d108575a.ess.barracudanetworks.com.
  • d108575b.ess.barracudanetworks.com.
TXT Records
  • v=spf1 include:spf.protection.outlook.com include:spf.ess.barracudanetworks.com -all
  • 81usrp0g3i1ulptainbq57ntrs
  • v=verifydomain MS=4941209
  • 356901d62750cfb9621567ef68d7ac24
Cloud / SaaS Services Detected
Microsoft 365

Leak Screenshot:

Leak Screenshot