Contact us Buy Me a Coffee

Sponsored by Hudson Rock Use Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are leading to ransomware attacks


Group Everest
Discovered 2026-05-02
Est. attack date 2026-05-02
Country US

Description:

[AI generated] Epiq Global is a US-based legal services company specializing in technology-driven solutions for complex legal matters. It provides services including class action and mass tort administration, bankruptcy case management, eDiscovery, document review, and legal notification. Operating across multiple countries, Epiq serves law firms, corporations, and government entities, helping manage large-scale legal proceedings efficiently.

Infostealer activity detected by HudsonRock

Compromised Employees: 3

Compromised Users: 7

Third Party Employee Credentials: 32


External Attack Surface: 7


DNS Records:

The following DNS records were found for the victim's domain.

WHOIS Emails
  • No emails found.
MX Records
  • epiqsystems3.mail.protection.outlook.com.
TXT Records
  • prodpad-domain-verification=QxVNCo2mrQ1D+01Pw4vVmwEnZvu5oqX2AYUnUMp9b0g=
  • Foxit-domain-verification=c6abb672c3fd325ea28841173e83f277
  • ms-domain-verification=f0227f7f-5253-43d7-a854-a9bc43d03eba
  • pardot76132=6097b4f27c0b70047835761d04b41e140ee0493c41048f2043f8b3bd2cda49de
  • google-site-verification=e0k1wZjtWx0up9rOinOQrCQgTpbzXAzhKVNk7Mpm_lQ
  • atlassian-domain-verification=0y7DyDqvwzCbLm85N8/MoLJYexQvy2q0NQnDCI4soVZMrshGPjHsJq8Cmr6yD2Gf
  • vmware-cloud-verification-f2743ffb-8e89-4300-b96d-ff1f15c66ba2
  • 668c5a55-5eb5-41aa-9aad-1e35381ee1ee
  • atlassian-sending-domain-verification=ab01adad-21c5-4cfa-b171-0214b2ed30e5
  • FeT9MNL7VUbYIK+Y0MuwM4dyLqY7l7gkILDCyF1QWKKipeWJpl3UI3J7Gpg1ojWGBx41vVUpiG37z2OFzGzhRQ==
  • v=spf1 mx ip4:203.38.21.0/24 ip4:64.78.52.27 ip4:13.108.238.0/24 ip4:64.235.30.170/29 ip4:66.220.10.61/24 ip4:13.111.2.174 " "ip4:68.233.77.18 ip4:198.2.129.105 ip4:23.21.109.197 ip4:23.21.109.212 ip4:147.160.167.0/26 ip4:64.235.22.171 ip4:64.235.22.172 ip4:64.235.22.4 " "include:spf.protection.outlook.com include:_spf.salesforce.com " "include:_spf.bullhornmail.com include:app.aventri.com include:_spf.act-on.net -all
  • 7fcg2ln865swnkq510gd9gpj1tbjtvvm
  • miro-verification=a34f6d155dd3774274984d74588a39d06fa20145
  • box-domain-verification=df8b5a23d4ffb9e15c68f536633ac298a0a814dc243127d13b8396ab88f4e729
  • google-site-verification=ztq_GjHQtsHwLqiyuE1y7vBxG7Fubdyrg295iDZf3pQ.
  • MS=ms68289203
  • pardot995642=c981fb7dac840daafacefd52277d728a002e53cefe1c6bf9ad88a97e0039eb3c
  • apple-domain-verification=ynyLadhw8Hl3bSaQ
  • docusign=eaa7aebf-47b9-4688-8dea-e5763bd55bff
  • asv_domain=12620683ffdc6cf18a750c006998476f
  • _5vv2l7yh22ebzcic8t3q2m0ll0aumeu
Cloud / SaaS Services Detected
Apple Atlassian Microsoft 365 Salesforce Box Miro DocuSign

Leak Screenshot:

Leak Screenshot