Buy Me a Coffee

Sponsored by Hudson Rock Use Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are impacting your business

Logo SystemPavers

Group: Medusa

Discovered by ransomware.live: 2024-10-15

Estimated attack date: 2024-10-15

Country: US

Description:

System Pavers is a design and installation company in the outdoor remodel industry. System Pavers inc. corporate office is located in 1570 Brookhollow Dr, Santa Ana, California, 92705, United States and has 496 employees.


🕵️ Infostealer activity detected by HudsonRock

Compromised Employees: 1

Compromised Users: 6

Third Party Employee Credentials: 1


External Attack Surface: 12



DNS Records:

The following DNS records were found for the victim's domain.

WHOIS Emails
  • domain.operations@web.com
MX Records
  • us-smtp-inbound-1.mimecast.com.
  • us-smtp-inbound-2.mimecast.com.
TXT Records
  • ZOOM_verify_oOe1wcFCTgWzpfnVG437bA
  • 0ed1fe018aace69cad4c7e4fefb12045fd57c6c41f
  • fdllvcj06f40n104jkfehnqphj
  • klaviyo-site-verification=UaKzTP
  • d365mktkey=JFIns9etDzmHZMJOKvI9kSmszdXMfykJiUWAdpdGcBIx
  • m7hglr7l7e097nqvom46om4ikr
  • 37f3larafit47mjv6613r326c9
  • lcvsvqe5bfe07vfv7fgs994btg
  • docusign=64cf8fc7-2550-4e96-b3a5-ccc7ab976ba9
  • 2iaca3pjvn4dkbgrcspq0cjjib
  • sophos-domain-verification=f588073cc870bab15bff57e733a6cda50187785a
  • d365mktkey=wRG9QP6oeMYrlh1nGMAsxKjIKdOGTR9Jk7Ilkku1syUx
  • v=DKIM1 ; t=s ; p=MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAoLjjSOXucbSXK08+xMdB5S1dFSWtPtDte6t4X3Kl6l54tzAdiQkhwT3BE93QGjsLjmAK+TkORXXcC5W8IcFBp6nEzVsmP1PkVYHW1UmV8caD81xO2j3ll1H5ZmGThYSdR0mJbcKp73X8qPZYoCbb95EXKkNJ3pB57M3pryYSKjSD2qDMNIIbqwyGDwG057Gi9" "J5Xlt6Fs32OYBwlOpEsRQNKwNB+wKGxaZLbt3ociGHp/yWBUnop78jqd5HOym8ZcWyyk9tnZTM/0GpvaCJOgzyaSuq2d6vS56vizoVm7roixzcT1Xyo5TA5qvF1racJXf3wtVOyurmQNbgKU+PP1QIDAQAB
  • google-gws-recovery-domain-verification=64828493
  • PdlFosti+TzY62eICJAZ9OwRTqBbjkpfjODW09ID0QvQnCCW79E8KP6gU9gmP2Gefh4ItSqH68JL3W0Q8euPVg==
  • iajfov1e07b7rsfvjkcd762evl
  • MS=ms89073272
  • bvjt044bmg5uskl6q6le0gb89k
  • 7hvqss3v9cuthr3hk8j16grqa1
  • google-site-verification=S1Pe_kjS911xYUo-YfIqHYTf52lgyKmTRKF5VQFOm1A
  • apple-domain-verification=li6BxkLUKwtzeak6
  • d365mktkey=faxSKuLjawD2R9h8VBWFfVk32Jw0S2epmbciE6YV8gox
  • google-gws-recovery-domain-verification=64618343
  • v=spf1 include:us._netblocks.mimecast.com ip4:18.220.12.142 ip4:18.216.7.10 ip4:52.53.50.55 ip4:104.47.33.36 ip4:104.47.34.36 ip4:198.203.192.51 ip4:198.203.192.52 ip4:192.203.192.53 ip4:62.17.112.109 ip4:62.17.112.110 ip4:62.17.112.111 ip4:207.166.92.11 " "ip4:207.166.95.11 ip4:207.166.101.207 ip4:207.166.104.207 ip4:67.231.152.177 ip4:208.84.65.220 ip4:67.231.151.29 ip4:67.231.158.158 ip4:203.31.38.110 include:mail.zendesk.com include:_spf.act-on.net include:spf.protection.outlook.com include:mailgun.org -" "all
Cloud / SaaS Services Detected
Apple Microsoft 365 Zendesk Mailgun Mimecast DocuSign Sophos Zoom

Leak Screenshot:

Leak Screenshot