Buy Me a Coffee

Sponsored by Hudson Rock Use Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are leading to ransomware attacks

Logo Traffic Tech

Group: Qilin

Discovered by ransomware.live: 2026-03-01

Estimated attack date: 2026-03-01

Country: CA

Description:

N/A


🕵️ Infostealer activity detected by HudsonRock

Compromised Employees: 1

Compromised Users: 8

Third Party Employee Credentials: 1


External Attack Surface: 5


Infostealer Distribution


DNS Records:

The following DNS records were found for the victim's domain.

WHOIS Emails
  • registrar-abuse@cloudflare.com
MX Records
  • mailstream-west.mxrecord.io.
  • mailstream-east.mxrecord.io.
  • mailstream-central.mxrecord.mx.
TXT Records
  • cloudflare_dashboard_sso=ef3af354326b77dab7a42b29c1bf39ee
  • HOVmtz0U0nxwXGgMbBM746XFMi5Q2scFllfFNZWU3JCHxAiDW5LGbv67O0+T+TofWcHB+ITquSPnRojdvlEKiw==
  • cisco-ci-domain-verification=c91cb6cd51e34bca5a194a6d999568526d1d9309a79b167e9485b29dc3dade4
  • rnbd5c2tfvmk7kfbbekebm42qi
  • brevo-code:e7198d7868f8759ff17192399207a23c
  • MS=ms65254699
  • gm580frbgb0nva3617kqfqq8jb
  • _9zh9kbnazep5ahqi9jtv6wthm2bl5at
  • duo_sso_verification=TMKSqxQoZD6Ehv5pODVrQ3sbDEvwUNAM2R6yNR84h3SvJsrzFmsaPhTqh15GAHYW
  • v=spf1 include:spf.protection.outlook.com include:_netblocks.mimecast.com include:40678181.spf06.hubspotemail.net ip4:208.97.198.195 ~all
  • teamviewer-sso-verification=80bb445239e645d4b160f72815f92a99
Cloud / SaaS Services Detected
HubSpot Microsoft 365 Teamviewer Cisco Cisco Duo Mimecast

Leak Screenshot:

Leak Screenshot