Buy Me a Coffee

Sponsored by Hudson Rock Use Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are leading to ransomware attacks

Logo San Silvestre School

Group: Qilin

Discovered by ransomware.live: 2026-01-11

Estimated attack date: 2026-01-11

Country: PE

Description:

N/A


🕵️ Infostealer activity detected by HudsonRock

Compromised Employees: 0

Compromised Users: 16

Third Party Employee Credentials: 9


External Attack Surface: 12


Infostealer Distribution


DNS Records:

The following DNS records were found for the victim's domain.

WHOIS Emails
  • No emails found.
MX Records
  • ALT1.ASPMX.L.GOOGLE.COM.
  • ASPMX4.GOOGLEMAIL.COM.
  • ASPMX5.GOOGLEMAIL.COM.
  • ALT2.ASPMX.L.GOOGLE.COM.
  • ALT1.ASPMX.L.GOOGLE.COM.
  • ASPMX2.GOOGLEMAIL.COM.
  • ALT4.ASPMX.L.GOOGLE.COM.
  • ASPMX.L.GOOGLE.COM.
  • ASPMX3.GOOGLEMAIL.COM.
  • ALT3.ASPMX.L.GOOGLE.COM.
  • ALT2.ASPMX.L.GOOGLE.COM.
TXT Records
  • v=DMARC1; p=none
  • google-site-verification=F_vkkf7GNxfwPyoznS-lywbM3XpzxbGwltTGvA8TPio
  • google-site-verification=W0oKa5N4X-656CZi68gSHBWqj9DZqSNpzW9deNf1y5Q
  • zoho-verification=zb82027897.zmverify.zoho.com
  • kq70Xe6JsOSTNlfBdcZ7mf9VLDxGJ3kfMSkFoO1+W5UejKXAVrCLrKb9exOHVVY2h9HMoSU7KtYRicmLEVxdNA==
  • MS=ms21663280
  • ZOOM_verify_QowqlVmBT-ugvgVhHALaoA
  • v=spf1 include:spf.protection.outlook.com include:_spf.google.com include:servers.mcsv.net ip4:209.45.40.195 ip4:209.45.40.194 include:_spf.email-platform.com -all
Cloud / SaaS Services Detected
Mailchimp Microsoft 365 Zoho Campaigns Zoom

Leak Screenshot:

Leak Screenshot