Discovered
2023-12-22
Est. attack date
2023-12-22
Country
Description:
We've obtained 100 GB of Nissan Australia. They seem not to be very interested in the data, so we will upload it for you within afew days. You will find docs with personal information of their employees in the archives and much other interested stuff like NDAs, projects, information about clients and partners etc. By the way, there is a notice on their website regarding investigation about possible personal information leakage, so we will confirm that with the data uploading.
Infostealer activity detected by HudsonRock
Compromised Employees: 0
Compromised Users: 60
Third Party Employee Credentials: 0
External Attack Surface:
12
DNS Records:
The following DNS records were found for the victim's domain.
- facebook-domain-verification=yd4xpiytuvr6akhxj6fh07shwpoj0m
- google-site-verification=vJPN5-KBKo41Y7mKMvXLvBE69ZX4YnjrVU-qcF4CrnM
- v=spf1 a mx a:outbound.nissan.com.au ip4:103.130.244.0/24 ip4:203.41.2.72 ip4:103.67.155.4/30 ip4:103.122.54.20 ip4:103.239.164.193 include:spf.mandrillapp.com include:spf02.sabacloud.com include:spf1.fraedom.com include:_spf.zycus.com include:_spf.create" "send.com -all
- MS=ms16591726
- nlg3q5vhx040azvng81ot4h4s14aqt
Cloud / SaaS Services Detected
Microsoft 365
Mandrill
Legal Disclaimer:
Ransomware.live does not engage in the acquisition, exfiltration, downloading, possession,
hosting, access, consultation, redistribution, or disclosure of unlawfully obtained data.
This platform indexes only publicly visible information posted by ransomware operators and
open web sources without accessing or obtaining the underlying stolen content.
The service is provided to support public awareness, legitimate research, and cyber-resilience.
No stolen personal or confidential data is collected or distributed via this site.