Buy Me a Coffee

Sponsored by Hudson Rock Use Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are impacting your business

Logo TripleA (aaa.com)

Group: Shinyhunters

Discovered by ransomware.live: 2025-10-03

Estimated attack date: 2025-05-02

Country: SG

Description:

[AI generated] TripleA is a fintech company that aims to simplify cryptocurrency transactions. It provides a business-to-business platform for companies to accept Bitcoin and other cryptocurrency payments. Using blockchain technology, TripleA converts received cryptocurrencies into a local currency, mitigating exchange rate risks. It also supports cross-border transactions, enabling businesses globally to accept cryptocurrency payments from any country.


🕵️ Infostealer activity detected by HudsonRock

Compromised Employees: 8

Compromised Users: 14955

Third Party Employee Credentials: 558


External Attack Surface: 105


Infostealer Distribution


DNS Records:

The following DNS records were found for the victim's domain.

WHOIS Emails
  • abusecomplaints markmonitor.com
  • whoisrequest markmonitor.com
MX Records
  • No MX records found.
TXT Records
  • cfeq5hfk1por6ljt48705ei6lm
  • wz1rkpvpvvfzh1f9f4z8rg4sztwdywfj
  • FA38-6E17-227C-1BC1-5A14-B8D7-B0EB-3AE5
  • xpzkvf98mkw4mtsbjm188cs76fdlvwrq
  • 66lv5gxvd8xmk6rw81lwgb9kfxf9j7nl
  • google-site-verification=bkLaSD15dzk-m2Mu3hbs76P1s9_LkLG_Hf9hPUJi1kQ
  • _yzin11c5ohiq57qfp3f80sc1lcupgl6
  • apq4t1i0612g9pc69b4pkj2s2r
  • 9xj7k916bqtwy74zjs2q4bz2dnt94wrl
  • globalsign-domain-verification=f1074ed7a09f78f15fcca26f83c3f9fc
  • _7s6txocg34ar7mn77crguq3z1yi9tzm
  • google-site-verification=dY3jMjQv0p6B_62uSI8kwXUHZ4YOGlqVB4kwzeCpHZw
  • t1ypxdg8bg3r7r71mqfn2g5p968sy1fm
  • _vsbg4qprw1qy50breoqbs6b9g7mp07m
  • fdveja64jlfcs0hv13i9pd34kq
  • 247j5tj5v903f1x20v89rggfdhwpgv75
  • i6tfto0br3dphasqcb0p2hpqau
  • ekcv6rc9d44ttqocfehvr3m8vr
  • zscaler-verification-134272523-11062025-K#7B310NR
  • 6urjouvfrdi6ph2fjftr8ek67e
  • _2j871yc4531neszv94e0vibgou94xui
  • _dy8qlhkk1x8k9eike8jj0hapef3m2ps
  • 4q666jpvpvqzzzcc6nzd4fsx67hlyqlj
  • google-gws-recovery-domain-verification=62088695
  • 44D1-08A4-B4FB-B689-D5DC-E966-CBC2-30FE
  • 6p8sc7wr41wbbw73d3ljqry0x5pph1hs
  • _vj4mrlppcbgu25uopwy8la6smnwctae
  • apple-domain-verification=eTs6_6qi7-ojZijObIhbxo8ISMz4ELuwAEELFO_ynF4
  • rbf8wq0dhvpb2mchwdqcgs6x9g4626z1
  • _7991b7sklpb1xxhbmceqcigvpbgmhtj
  • _lw7kb3cizh27m29ycon3f9bvfu136ia
  • gh2mosm9fi3b9f96eltjuvf622
  • eqf9c3ovro1sldh3cm6urvfbqt
  • l8g4g54j6m65d8ffnn6jvacnk7
  • p5scwcz5tw0ctsr01n2yt22yxc2jb2fh
  • 1hnl1iu1l42qeatttltda7ss9p
  • _wxbqm8bxlci7wldoynia4pl3u6r0dsp
  • glc9ujvhvs94hr6oj2id094qu3
  • _2anvbln3dm65rhswca0u9j2sjablzvl
  • google-site-verification=OXZwE8L4XGZTwueJC7sz2D23npDVx3QhlUxS0DY7QRs
  • 8p7amcv4i9ksacqnmpn89desv4
  • D39B-6EDE-D147-F843-551C-3F44-3579-8D1F
  • 9o54qj4fm74ig2jdntiqabqbg6
  • google-site-verification=nxm7rcXKT1VfSxCnCFVQ9j-CrM-huAQCJJhJf5-Jc7g
  • _uhflfmq9p24lh4g8ny4s3nrh95eiq4g
  • lmvin4nlenn01arknb6brnajun
  • 2AD6-6EAE-E938-0DDC-09B5-1B13-7270-65FE
  • globalsign-domain-verification=AB9215594777E3E32FCA222DDBDD081E
  • iqju6lv9evd473jgftem71anvb
  • _cvtc4y65c07l0ocw0m3k1fb451a6wox
  • l01ra88of48f21tbbq65s1ubvc
  • _vtesmahxs5x1ho5ba1uf80nchnmp2ud
  • khj670qif50j8omlecjbbgdv1d
  • 4me2mkom8pdsuu32ln7qk1uld
  • _bm1xp2bkquetsbl6t32iamqo4s3rsan
  • 150728
  • google-site-verification=vnsvEx6eHqPU8yeJYitByKHKwGHxjifIHBZEDTWp1DY
  • Probely=d29279f1-ac8b-415f-a6e1-f10422f3f104
  • globalsign-domain-verification=0E35B95A68BF8FCC953DF6B8F1A059DC
  • google-site-verification=nid6eJqErYGyq5YSiKuVUSWGaDXUdVmAaaDLKLxrzTc
  • _refx100r9e8dfv2jwhqni8pwyulel72
  • v8hr8l054k3cqzqck40cr0ljm37zkst3
  • vnsvEx6eHqPU8yeJYitByKHKwGHxjifIHBZEDTWp1DY
  • _y2xw1wbr4ed0uw9wpp03w5jwzrvdtka
  • _1zzk2uuiyxhlehwepmqjv1aded69msa
  • globalsign-domain-verification=C28CC827BEED534A45F396CCB8D89FF7
  • 3i37j35k04dlke4189evt2nird
  • gn2s6dcc7n4nm3089p8s3hbjlq401nnf
  • _4zi1d16h05wgvuj1iy6zfwcwhnbj0ir
Cloud / SaaS Services Detected
Apple

Leak Screenshot:

Leak Screenshot