Buy Me a Coffee

Sponsored by Hudson Rock Use Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are impacting your business

Logo HERTZ.COM

Group: clop

Discovered by ransomware.live: 2025-01-24

Estimated attack date: 2025-01-24

Country: US

Description:

[AI generated] Hertz.com is the online portal for The Hertz Corporation, a leading car rental service in the U.S. The company provides vehicle rental services including cars, trucks, and utility vehicles to consumers and businesses globally. It also offers additional services such as car sales, vehicle leasing, and fleet management. Its website, Hertz.com, allows customers to book rentals, manage reservations, and access special deals. Founded in 1918, Hertz is a subsidiary of Hertz Global Holdings.


🕵️ Infostealer activity detected by HudsonRock

Compromised Employees: 8

Compromised Users: 7695

Third Party Employee Credentials: 30


External Attack Surface: 107



DNS Records:

The following DNS records were found for the victim's domain.

WHOIS Emails
  • abusecomplaints markmonitor.com
  • domainadmin hertz.com
  • whoisrequest markmonitor.com
MX Records
  • mxb-00034201.gslb.pphosted.com.
  • mxa-00034201.gslb.pphosted.com.
TXT Records
  • msfpkey=3bh3x8yaiq2v4u7299q3pav40
  • parkable-domain-verification=ioyWPZCFOHUtBmZ_91fSt7_cqzkzGzQWnH1sEFD_Mow=
  • spf2.0/pra ip4:66.216.133.19 ip4:66.109.239.154 ip4:66.109.242.2 ?all
  • v=spf1 include:%{ir}.%{v}.%{d}.spf.has.pphosted.com ~all
  • MS=ms13411640
  • _globalsign-domain-verification=-jzefWdoUCJxai9FWTvTDdRNc9N2JJFgFuKXH3uf7r
  • amazonses:/IPm1hhpAyQ6uAN3f5XmTLtE6VZpUY582Ppr6IOcIVU=
  • atlassian-domain-verification=UIjQlEnCPaW6i0RzVM3AR436tSaICZapas/EUtMfpkfZBIa0JMzmiltvbLYSbZug
  • ff965r3f3xkp2dmt55k49yhvx2ssydw6
  • google-site-verification=wyQk_1YHMYyIMjnMnFHe9mV1rFZov5GexcMMgoyz6e4
  • infoblox-domain-mastery=7ada838ff03c6654eac9005e99b87df0bd7804a0345fa5e54ca2d91c5db9ee287e
Cloud / SaaS Services Detected
Atlassian Amazon SES/WorkMail Microsoft 365 Proofpoint

Leak Screenshot:

Leak Screenshot