Contact us Buy Me a Coffee

Sponsored by Hudson Rock Use Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are leading to ransomware attacks


Group Payload
Discovered 2026-04-01
Est. attack date 2026-04-01
Country LB

Description:

Sayegh 1944 presents itself as an educational company, yet its activities appear broad and somewhat lacking in transparency. Under the umbrella of developing learning materials and services for schools, it spans multiple areas where a clear core expertise is hard to identify. Overall, it gives the impression of an organization trying to cover many segments of education without demonstrating a strong, well-defined specialization or standout results.

Infostealer activity detected by HudsonRock

Compromised Employees: 2

Compromised Users: 16

Third Party Employee Credentials: 2


External Attack Surface: 6


DNS Records:

The following DNS records were found for the victim's domain.

WHOIS Emails
  • abuse@godaddy.com
MX Records
  • mail.sayeghonline.com.
TXT Records
  • google-site-verification=zWjRiysFewZmnd2xEBy5CGUVdW26bq-PmKeCr5GuS7E
  • jguRQQJZzRM8_12_sRUzObrSJhebAo1RvwKgEtVzEOY
  • v=spf1 mx a ip4:217.182.21.145 ?all
  • google-site-verification=xlz3ehLBMoOgZ5NbXuQPyha3mxmGLfhGfATHNlCSodY
Cloud / SaaS Services Detected
No well-known cloud or SaaS service detected.

Leak Screenshot:

Leak Screenshot