Buy Me a Coffee

Sponsored by Hudson Rock Use Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are impacting your business

Logo Massachusetts Bay Community College

Group: Qilin

Discovered by ransomware.live: 2025-10-07

Estimated attack date: 2025-10-07

Country: US

Description:

Massachusetts Bay Community College is a comprehensive, open-access community college, offering associate degrees and certificate programs. We gave MassBay every opportunity to prevent this publication. We engaged their leadership. Their re ...


🕵️ Infostealer activity detected by HudsonRock

Compromised Employees: 18

Compromised Users: 74

Third Party Employee Credentials: 43


External Attack Surface: 33


Infostealer Distribution


DNS Records:

The following DNS records were found for the victim's domain.

WHOIS Emails
  • No emails found.
MX Records
  • massbay-edu.mail.eo.outlook.com.
TXT Records
  • MS=19C824309138B867743B38C04189E33A121D78E7
  • v=spf1 a:massbay-edu.mail.eo.outlook.com ip4:23.185.0.2 ip4:134.241.90.237 mx:mx.collegenet.com include:spf.protection.outlook.com include:mh.blackboard.com include:outboundmail.blackbaud.net ip4:3.128.236.80" " ip4:3.139.232.78 ip4:3.223.100.88 ip4:34.200.182.36 ip4:54.151.112.86 ip4:50.18.89.44 ip4:54.214.32.131 ip4:129.33.243.30" " ip4:52.35.81.117 ip4:167.89.101.146 ip4:167.89.101.149 ip4:167.89.60.152 ip4:167.89.89.156 ip4:198.21.5.85 include:_spf.explore-blue.com ip4:52.210.155.131 ip4:34.194.230.233 ip4:34.230.107.215 ip4:34.250.203.24 ip4:34.250.117.27" " ip4:52.62.198.211 ip4:52.60.116.9 ip4:52.60.157.49 ip4:150.230.240.226 ip4:52.70.104.58 ip4:35.174.117.211 ip4:51.112.32.123 ip4:3.28.77.232 ip4:52.86.177.169 ip4:168.245.29.173" " ip4:23.21.109.197 ip4:23.21.109.212 ip4:147.160.167.0/26 ip4:69.43.75.0/24 ip4:208.185.229.0/24 ip4:208.185.235.0/24 ip4:148.59.108.0/23 ip4:148.59.106.0/23 ip4:148.59.100.16/28 ~all
  • icm4n6k48rchfiobt652dscuor
  • wh58kjznkjkg78sdgls2r11hktzdmdzq
  • bo82d4o7u2jesdiag32b6q8t99
  • rs9OAxGRKziHxtiNQD7S20gnfEvDhLVbLK06VrEGyL5jZUTUpLQby12zLLObCMElfLsHh2s9KcSpIRjRQxbtJQ==
  • apple-domain-verification=iqHcVVv7Ve1XXXdg
  • MS=ms75412962
  • oaop09mdchh55grs814ssl0d47
  • cogi1namr53q9qrakkp87nm4ak
  • ophu735jtdt259s2a60tmncenf
  • b849flnqe4qpsgmlcc5obf29d5
  • cisco-ci-domain-verification=7da6a75ab00b896a8b650295f386f58d72449f05710c282802b52aaaec8ef4e0
  • google-site-verification=ptY3dFXKwrTy25iSJhpVL7yD__vgeSmtdkBC-KRwqBI
  • c4c16ga8gafv3401cack9s1ael
  • google-site-verification=qz84D0UCR6inRIkIaRVXX7jAu3t5LNdpbtEacFupDSM
  • google-site-verification=QAXQhEAkPXr7_OI5eiKX7aXPrFpFjXZgToupJ8o7b1c
  • 4ke86acekeohebrho6m2b8893t
  • facebook-domain-verification=1hhjnjy6l3gm0dbn31914w9yszg0ml
  • ly8km3z15sbg0ms7gclv6sns228kcr37
  • d2vnw87ttft13q6f0n2c842f0pb5hk4z
Cloud / SaaS Services Detected
Apple Microsoft 365 Cisco

Leak Screenshot:

Leak Screenshot