Discovered
2026-04-14
Est. attack date
2026-04-14
Description:
[AI generated] Flash Charm Inc is a software company associated with Idera, Inc., a US-based technology firm headquartered in Houston, Texas. Idera develops and provides database management, developer tools, and test management software solutions. Its products support database administrators and developers across multiple platforms. Flash Charm Inc appears to operate as a subsidiary or affiliated entity within Idera's broader portfolio of software brands serving enterprise IT markets.
Infostealer activity detected by HudsonRock
Compromised Employees: 2
Compromised Users: 169
Third Party Employee Credentials: 21
External Attack Surface:
19
DNS Records:
The following DNS records were found for the victim's domain.
- domain.operations@web.com
- alt2.aspmx.l.google.com.
- alt3.aspmx.l.google.com.
- alt4.aspmx.l.google.com.
- aspmx.l.google.com.
- alt1.aspmx.l.google.com.
- knowbe4-site-verification=c2601f709fa62bce1f741c2c778107e7
- google-site-verification=7FIxq8Qt_88OQrIBDAy5GoBXFm1X6GioHzfXd94RPXM
- atlassian-domain-verification=SzxB0TuhwvB2KrScnCCpTuHLdL/umKqG7oy3Zuvv7LMVO/oikYsWpzKliWsoG2qS
- google-site-verification=v0flvdZbFdJWDYWHTdvY3Yv59ux4PLdZb3x5XlKLf1A
- h9ts4fqqmmf8glp50w5kj8z62lfz6581
- google-site-verification=2BKlIfJD3WcOLkvE-cLFxvMlMSo1E3VTdNCMGjftcnA
- atlassian-domain-verification=ayyQDizqatmaN0m2Jska1tX5dlm6TtXy3UulkkH3qg4vUDULBAo2Q1cTwXGX2MZV
- anthropic-domain-verification-dn113s=lAilbtpnZNCnoYeDB3Sb8U3pa
- docusign=a0069487-537e-4529-8e1e-096e33854156
- j6cnbrqdylxkq17dx1syn5v2zfvp7v3b
- google-site-verification=vab3aD5RtUci_vhtFCTmOFzvOz0LvrGfTEGj2clHdKk
- intacct-esk=563FB407CC0D68F8E0538C06A8C0C10C
- v=spf1 ip4:204.61.221.66 a:relay01.embarcadero.com include:mail.zendesk.com include:_spf.google.com include:spf.dynect.net include:_spf.intacct.com include:_spf.salesforce.com include:46028435.spf02.hubspotemail.net include:spf.protection.outlook.com ip4:" "23.21.109.197 ip4:23.21.109.212 ip4:147.160.167.0/26 -all
- google-site-verification=pPRycOC0v1P8Dz927td-pOsHa0kA_04R4vPlEA6PnFE
- atlassian-domain-verification=uH54tDJHrGvFyuNWLyKP6I6RUX3ReiuF4ishRjTGYRLOMvp/4HyP8w2Wv1VJQGgA
- SeZRBBZBrE3VYFihKlMQ1zwiYlmlbWAC
- google-site-verification=IjuxZYZqsd0cjuSOD8Qa9Nz_DuK4A5Tt_dpuRca2jDQ
- google-site-verification=x8nFo_Rh3DcErjbZdLRXH1W-DljWLQb9prbTAuMsQso
Cloud / SaaS Services Detected
Atlassian
HubSpot
Salesforce
Zendesk
Sage
KnowBe4
DocuSign
Leak Screenshot:
Legal Disclaimer:
Ransomware.live does not engage in the acquisition, exfiltration, downloading, possession,
hosting, access, consultation, redistribution, or disclosure of unlawfully obtained data.
This platform indexes only publicly visible information posted by ransomware operators and
open web sources without accessing or obtaining the underlying stolen content.
The service is provided to support public awareness, legitimate research, and cyber-resilience.
No stolen personal or confidential data is collected or distributed via this site.