Buy Me a Coffee

Sponsored by Hudson Rock Use Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are impacting your business

Logo MARITZ.COM

Group: Clop

Discovered by ransomware.live: 2025-11-13

Estimated attack date: 2025-11-13

Country: US

Description:

[AI generated] Maritz.com is a sales and marketing services company. Located in St. Louis, Missouri, it offers customer experience (CX) solutions, including advertising, digital marketing, sales channels, performance improvement initiatives, travel services, corporate trade and reward programs. With a presence in 28 different countries, Maritz uses a customer-first approach to draw actionable insights and support businesses to drive growth.


🕵️ Infostealer activity detected by HudsonRock

Compromised Employees: 9

Compromised Users: 8

Third Party Employee Credentials: 6


External Attack Surface: 11


Infostealer Distribution


DNS Records:

The following DNS records were found for the victim's domain.

WHOIS Emails
  • abuse enom.com
MX Records
  • maritz-com.mail.protection.outlook.com.
TXT Records
  • maritzqa-301590-single.azurewebsites.net
  • \010atlassian-domain-verification=eg0KR502/V38NQfHDVi8zaQf0O0jYK1pmnP9ZtdKicIkDSNbj1fAW5bRrxjKny0U\010
  • atlassian-domain-verification=BP4uyUnox5n3AgNjr5Ij68nNmdJq0W/NGGmpqKxIBwdeaoPJdoXDW0cfn2ksjYHy
  • google-site-verification=5tsbU4x4A2jR5KKq74XugimNyzPQI85iaE-fznNKZeI
  • google-site-verification=wdVhfBUuw0LFLO0PRj7NDe7cDpK65PggkmtpL1NhBAo
  • amazonses:I58eLCFjhPAuKj3LS6vT8e/6BST/PXaf1psv1nNulJc=
  • google-site-verification=jjt4-agaULEbtwtjZuOTOiVZXXWEhqvwx4IfqvYUJ8I
  • TXT Token: onetrust-domain-verification=af110a39c86e4c9f985fecf2fe342f13
  • apple-domain-verification=cJXXFfGOUCDH44U0
  • traction-guest=d77cdeb2-3a29-44e3-b0d1-8f669aab2c87
  • pardot35352=ef49934d0a7b4455b6fb230c077a9ec9c0e6a3a57a71b7cf1d4d324765bd4908
  • have-i-been-pwned-verification=6b5fd4c5fd7d2715427d0ca675a6b5c7
  • FU4jmjX92D7th9Dnq8QVuWV2UmeDOONRmDlWRsalJmK1QaTxsXGlfbSVOFN6SCBuN/kl05zh/WG+JGIvJEQPlg==
  • google-site-verification=zbZQNabkXImP3RriA7IMxek7K0oCeAwVHhFk250NLaU
  • maritzproduction-195180-cd2.azurewebsites.net
  • google-site-verification=rLGpja5Qhvjy75NNwO2Jcej_Z7fonOyPsWMOoe83eKY
  • 9g22d50jy4cdnyxwjc6wbwq7whkgbskq
  • Dp+iJOJEraF+ajr1M3dmQil5T140wWyz/qhUC5dkz9c=
  • v=spf1 include:_s00875701.autospf.email ~all
  • smartsheet-site-validation=98JHzZkXhU1IAww5wBnGxBTMoK1yhUQy
  • google-site-verification=F3kna5pWKy032mUhZmEcJoUIab8tyOaohf-zIc5LuAw
  • MS=ms30363779
  • google-site-verification=ItaKrmwwE3LJzstEVnXWwqIhRTTB5WPRolMEHL7k3vc
  • miro-verification=011e05724c3ea8c5c28991183d1c46928d68cb98
  • _gitlab-pages-verification-code.maritz.com TXT gitlab-pages-verification-code=97c4c8b9b04cb654833438294bd2f984
  • mandrill_verify.qNLMefzhpOfatFvO0z99Eg
Cloud / SaaS Services Detected
Apple Atlassian Amazon SES/WorkMail Mailchimp Microsoft 365 Salesforce Miro OneTrust Have I Been Pwned

Leak Screenshot:

Leak Screenshot