Group:
Dragonforce
Discovered by ransomware.live: 2026-02-05
Estimated attack date:
2026-02-05
Country:
Description:
An initial analysis of the structure and names of the files revealed that the directory contains software source codes, configuration and installation files, backup copies of information systems, database structures and dumps, as well as financial, administrative, operational, and technical documentation related to the functioning of the organization's IT systems. However, the presence or absence of personal data, including contact telephone numbers, cannot be reliably confirmed without additional analysis of the contents of the backups and databases, which indicates a potential area of risk in the context of data protection and information security management requirements. Listing files = 145MB.
DNS Records:
The following DNS records were found for the victim's domain.
- hostmx01.logix.in.
- hostmx02.logix.in.
- v=spf1 include:sender.zohobooks.com include:_spfnew.logix.in include:spf.protection.outlook.com ~all
- v=DKIM1; p=MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCq2Sh2Jot32dHOr/uqixQZlQropG6+i4IWQdtm5VkZBRZ917uAIn6+HYtDojWhRJ7FNw71tTMSLu+KOjOxk2BjLzt+HDy+F8j+OAyhlcO5Cb4NSRQa5ncepMSL5dmftyYGjkKZfOEYy5mRRbVoCLFIkDP8RWs9uMgciumBnlLwhwIDAQAB;
Cloud / SaaS Services Detected
No well-known cloud or SaaS service detected.
Leak Screenshot:
Legal Disclaimer:
Ransomware.live does not engage in the acquisition, exfiltration, downloading, possession,
hosting, access, consultation, redistribution, or disclosure of unlawfully obtained data.
This platform indexes only publicly visible information posted by ransomware operators and
open web sources without accessing or obtaining the underlying stolen content.
The service is provided to support public awareness, legitimate research, and cyber-resilience.
No stolen personal or confidential data is collected or distributed via this site.