Buy Me a Coffee

Sponsored by Hudson Rock Use Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are impacting your business

Logo Grupo Serex

Group: Dragonforce

Discovered by ransomware.live: 2025-10-08

Estimated attack date: 2025-10-08

Country: CR

Description:

Segramar — Bulk Handling at Ports Bulk cargo unloading and loading of raw materials at Maracaibo and Puerto Cabello ports. Berthing assistance for bulk carriers. Import, export and commercialization of animal-feed raw materials. Transmarine — Shipping Agency Full ship agency services for bulk carriers in Venezuela. Operational and logistics support alongside modern procedures focused on safety and environmental compliance. Office in Puerto Cabello (Carabobo). Transcargo — Heavy Transport & Logistics National bulk transport of commodities (corn, wheat, coal, etc.). Heavy/oversized cargo movements: equipment, structures, platforms. National and international logistics solutions; HQ in Zulia state. Proalex (Productora de Alimentos Serex) — Poultry & Feed Poultry processing and commercialization (packed chicken and by-products). Manufacturing of animal balanced feed (ABA). Vertically integrated from breeding to processing. Alto Prado — Cacao Products Production and national/international commercialization of Venezuelan cacao. Product lines: cocoa beans, nibs, liquor (paste), butter, powder. Emphasis on traceability and sustainability. Group overview The group frames itself as integrated solutions for bulk loading/unloading and raw-material transport, with parallel poultry and cacao businesses. Handy if you enjoy conglomerates that do everything from docking a bulker to selling chicken nuggets.


🕵️ Infostealer activity detected by HudsonRock

Compromised Employees: 6

Compromised Users: 1

Third Party Employee Credentials: 8


External Attack Surface: 4


Infostealer Distribution


DNS Records:

The following DNS records were found for the victim's domain.

WHOIS Emails
  • abuse godaddy.com
MX Records
  • gruposerex-com.mail.protection.outlook.com.
TXT Records
  • v=spf1 include:spf.protection.outlook.com -all
  • v=verifydomain MS=8913580
  • google-site-verification=aop15GjLI-A8bn39pLBpSPW6LW-tOu3ntVsVUE_YhxY
Cloud / SaaS Services Detected
Microsoft 365

Leak Screenshot:

Leak Screenshot