Buy Me a Coffee

Sponsored by Hudson Rock Use Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are leading to ransomware attacks

Logo Perpetuuiti

Group: Dragonforce

Discovered by ransomware.live: 2026-02-05

Estimated attack date: 2026-02-05

Country: IN

Description:

An initial analysis of the structure and names of the files revealed that the directory contains software source codes, configuration and installation files, backup copies of information systems, database structures and dumps, as well as financial, administrative, operational, and technical documentation related to the functioning of the organization's IT systems. However, the presence or absence of personal data, including contact telephone numbers, cannot be reliably confirmed without additional analysis of the contents of the backups and databases, which indicates a potential area of risk in the context of data protection and information security management requirements. Listing files = 145MB.



DNS Records:

The following DNS records were found for the victim's domain.

WHOIS Emails
  • abuse@godaddy.com
MX Records
  • hostmx01.logix.in.
  • hostmx02.logix.in.
TXT Records
  • v=spf1 include:sender.zohobooks.com include:_spfnew.logix.in include:spf.protection.outlook.com ~all
  • v=DKIM1; p=MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCq2Sh2Jot32dHOr/uqixQZlQropG6+i4IWQdtm5VkZBRZ917uAIn6+HYtDojWhRJ7FNw71tTMSLu+KOjOxk2BjLzt+HDy+F8j+OAyhlcO5Cb4NSRQa5ncepMSL5dmftyYGjkKZfOEYy5mRRbVoCLFIkDP8RWs9uMgciumBnlLwhwIDAQAB;
Cloud / SaaS Services Detected
No well-known cloud or SaaS service detected.

Leak Screenshot:

Leak Screenshot