Buy Me a Coffee

Sponsored by Hudson Rock Use Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are impacting your business

Logo Lidera Network

Group: Worldleaks

Discovered by ransomware.live: 2025-11-01

Estimated attack date: 2025-11-01

Country: ES

Description:

[AI generated] Lidera Network is a technology company that specializes in distribution of IT solutions. The company focuses on security, virtualization, networking, and data center operations. Their services also include technical solutions, sales support, and training services. The company works with a broad network of channels to distribute quality solutions to their clients across multiple sectors. It's based in Madrid, Spain.


🕵️ Infostealer activity detected by HudsonRock

Compromised Employees: 0

Compromised Users: 101

Third Party Employee Credentials: 0


External Attack Surface: 18


Infostealer Distribution


DNS Records:

The following DNS records were found for the victim's domain.

WHOIS Emails
  • trustandsafety support.aws.com
  • d74114f9-3dfe-42ba-9b8a-403edadb515e identity-protect.org
MX Records
  • lidera-com.mail.protection.outlook.com.
TXT Records
  • _globalsign-domain-verification=C0Hbjxo8MbNw4kkJOWmVFkdtj4V2IiCk5iaMYmmruP
  • _globalsign-domain-verification=k2Ro0cASNPhlyzaqqxJGiguwqwnEEaLSrhaYX-ep52
  • _globalsign-domain-verification=OYFNHVv1kp8W2SIy4epJdt8_ppnpeMV-qcQRLIrynr
  • _globalsign-domain-verification=XUO7bZdhrXn5dYq0Hgq5oneNrK5J8Wsc-yhqx9-flB
  • _globalsign-domain-verification=qo_lrxH2Yu6oYaS034mnuvmWXVREMq9c1W6lwSsfLJ
  • _globalsign-domain-verification=mOMtVmGT4Q7omSPqbtw_3CjPkS_A0Z1GMJGlx7OTrV
  • google-site-verification=xGCDT89445GbS4QYUUike0ccisjv1BkHNXXeid7i6NM
  • google-site-verification=rUQ39faFZeoJG4zK_s2d38B0Rhbmlv1DtyUXzXsCc9M
  • zwm61s71qjrpd06q38yw2p56f5dg5z21
  • _globalsign-domain-verification=7M6zQIP6DzIbDuJlpbf9zFEwpZvOuv0hWlUqq_6JGe
  • sjcg0rxvb8b1v3dwlwr7s1dj8jb0q7bj
  • _globalsign-domain-verification=bYHXw2RVuunkGO1Q1tosxQM6gOTmWXH8qIQydusfvd
  • _globalsign-domain-verification=260zTB7xFN9OuUPZlmIRFfCvjPeyxntGt0_rE3ykkR
  • d365mktkey=bJJCm55a8Q8AONUxfGZxbYkx8IkHjoGllw9KlYUyXiUx
  • _globalsign-domain-verification=GcWjrwi3Ycz6fN-lgYQMMWpUUQ3mNyKSLzN5rwVlvC
  • _globalsign-domain-verification=CHwjr6N2eTOQWLtVm9TS-ZEHyCLpZ1buoBxwp-8XKK
  • google-site-verification=xZrfoc6xq5vz-mFaXDdSnkP0VoiSYS35Vf4SrxfnvCw
  • v=spf1 ip4:81.42.217.196 ip4:81.46.194.254 ip4:81.46.218.126 ip4:81.42.214.166 ip4:63.34.218.0/24 ip4:3.123.5.0/24 ip4:3.112.100.128/25 ip4:3.112.100.0/25 ip4:3.112.99.0/24 ip4:38.27.116.128/27 ip4:16" "5.254.91.16/28 ip4:209.135.212.132 ip4:162.210.234.132 ip4:149.13.95.34 ip4:154.57.155.23 ip4:35.174.145.124 ip6:2603:10a6:10:47a::19 ip6:2603:10a6:150:90::5 ip6:2603:10a6:10:2c9::13 ip6:2603:10a6:150" ":ae::12 include:spf.protection.outlook.com include:mail.zendesk.com include:amazonses.com -all
  • MS=ms50569124
Cloud / SaaS Services Detected
Amazon SES/WorkMail Microsoft 365 Zendesk

Leak Screenshot:

Leak Screenshot