Buy Me a Coffee

Sponsored by Hudson Rock Use Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are impacting your business

Logo REH

Group: blackbasta

Discovered by ransomware.live: 2023-10-11

Estimated attack date: 2023-10-11

Country: GB

Description:

Edwardian Hotels London is one of the UK’s largest privately owned hotel groups, which has been operating and developing its hospitality portfolio. Edwardian Hotels London owns and operates a collection of four and five-star hotels and restaurants, including The Londoner, a member of Preferred Hotels & Resorts’ prestigious Legend Collection; The May Fair and The Edwardian Manchester, both part of premium lifestyle brand Radisson Collection; and 10 Radisson Blu Edwardian hotels across London. For several decades, Edwardian Hotels London has contributed to the fabric of our neighbourhoods. The diversity and long-standing nature of Edwardian’s network of partners has created a trusted link between key organisations across the arts and culture, trade, education, and technology sectors.SITE: www.edwardian.com Address 140 Bath Rd, London Greater London, UB3 5AW United Kingdom



DNS Records:

The following DNS records were found for the victim's domain.

WHOIS Emails
  • abuse godaddy.com
MX Records
  • edwardian-com.mail.protection.outlook.com.
TXT Records
  • v=spf1 include:spf.protection.outlook.com mx include:oracleindustry.com include:amazonses.com ip4:161.12.34.46/32 ip4:52.208.166.252/32 ip4:66.96.128.0/18 a:mail3.edwardian.com a:mail4.edwardian.com a:mailout.edwardian.com include:spf.mandrillapp.com incl" "ude:spf.mailjet.com include:_spf.salesforce.com include:sendgrid.net ip4:194.72.122.173 ip4:161.12.34.180/32 ip4:161.12.34.181/32 ip4:194.72.122.192/32 ip4:194.72.122.193/32 ip4:194.72.122.194/32 ip4:194.72.122.195/32 ip4:213.70.228.37/32 ip4:213.70.228.3" "8/32 ip4:159.65.212.138/32 ip4:157.245.44.218/32 -all
  • MS=7E120E483F7A7822078BD7D37DC384F0E94966CB
  • uhlibc94shho6o26jj9234o5vu
  • amazonses:PzbB5iCVt2QpTFVPg0rV4bEScXMH5Y785wqziPLfdpQ=
  • 9r64cbko1c9ifk1h5495bq50su
  • mandrill._domainkey.edwardian.com v=DKIM1
  • ruvpdv2g8ejid9b1sbk7od1ota
  • pardot883823=3a2088a80a03c3d52d470575aaa423732873aeac73194b289db84e8c6ce4efe3
  • 2MbZ9U5hWNGwin16dG/4C9aeVxPow5ycBGUmtNN9aqUiMoGRLk8Raa8mgiJtpfVzvn9a8vyEtLfwQqNu3jas4g==
  • 5hq820a6iddb0r2t576vegsh0f
  • apple-domain-verification=ndw6NJMHBtEUVQRp
  • MS=ms33833848
  • BL/qTa5xFwzGd879k2teeIlmi/Uerdc9RsTwIxqzJqrggrxICSqzgWjI0QV+Ir9EzuqcWX484EmQJsuKsM9T/Q==
  • acr41jfs5d05sbha823mjbh3vg
  • b49j47kgjhrjr2ibsv8qnnobqn
Cloud / SaaS Services Detected
Apple Amazon SES/WorkMail Microsoft 365 Salesforce Mandrill Mailjet SendGrid

Leak Screenshot:

Leak Screenshot