Contact us Buy Me a Coffee

Sponsored by Hudson Rock Use Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are leading to ransomware attacks


Group 8base
Discovered 2024-05-13
Est. attack date 2024-05-13
Country FR

Description:

About fifty employees with experience in accounting, taxation, auditing and laware at your disposal every day to implement all your projects. All work is supervised by one of the qualified specialists https://www.fic-expertise.fr/

Infostealer activity detected by HudsonRock

Compromised Employees: 0

Compromised Users: 4

Third Party Employee Credentials: 0


External Attack Surface: 10


DNS Records:

The following DNS records were found for the victim's domain.

WHOIS Emails
  • tech@ovh.net
  • f8by9dxwtvklaencewix@k.o-w-o.info
  • support@ovh.net
MX Records
  • alt2.aspmx.l.google.com.
  • alt1.aspmx.l.google.com.
  • aspmx3.googlemail.com.
  • aspmx2.googlemail.com.
  • aspmx.l.google.com.
  • feedback-smtp.eu-west-1.amazonses.com.
TXT Records
  • v=spf1 a:smtp-gw1.silae.fr ip4:5.226.2.176/28 include:_spf.google.com include:spf.mailjet.com include:mailgun.org include:mx.ovh.com ~all
  • google-site-verification=WS4vo0OMlgzCx8LtFFlhue-gY7sFMUgg9H0_nIPhGNA
  • brevo-code:0098809329218f1247945bb0cb18be5b
  • google-site-verification=pn8T56jdiJfSw6En2Utj40THf9gK7sGjBVvD-p1pkyI
Cloud / SaaS Services Detected
Amazon SES/WorkMail Mailgun Mailjet

Leak Screenshot:

Leak Screenshot