Contact us Buy Me a Coffee

Sponsored by Hudson Rock Use Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are leading to ransomware attacks

UNITE HERE!

unitehere.org

Discovered 2025-09-14 12:20 UTC
Est. attack date 2024-04-22
Country US
Duplicate Entry
This victim has been identified as a duplicate of another entry in our database. However, this may not always be the case: the same organization can be targeted multiple times by the same or different ransomware groups, which may result in separate legitimate entries. Search for related entries

Description:

UNITE HERE is a labor union in the United States and Canada with roughly 300,000 active members. The union's members work predominantly in the hotel, food service, laundry, warehouse, and casino gaming industries. The union was formed in 2004 by the merger of Union of Needletrades, Industrial, and Textile Employees (UNITE) and Hotel Employees and Restaurant Employees Union (HERE). In 2005, UNITE HERE withdrew from the AFLCIO and joined the Change to Win Federation, along with several other unions, including the Teamsters, Service Employees International Union (SEIU) and the UFCW. In May 2009, union president Bruce Raynor (originally from UNITE) left UNITE HERE, taking with him numerous local unions and between 105,000 and 150,000 members, mostly garment workers and a labor-owned bank, Amalgamated Bank. They formed a new SEIU affiliate called Workers United. On September 17, 2009, UNITE HERE announced that it would re-affiliate with the AFLCIO.

DNS Records:

The following DNS records were found for the victim's domain.

WHOIS Emails
  • abuseenom.com
MX Records
  • unitehere-org.mail.protection.outlook.com. Microsoft 365
TXT Records
  • anthropic-domain-verification-ewyg3n=oiA0sh9etHO4BG3PJzeRSWyF8
  • monday-com-verification=EIn5jO2hOxOKTZEiGTfrzW6ccbC-3WS1rTumtzklaVc
  • 36176F4DE8
  • apple-domain-verification=xHnLN2tNG1OWC6RZ
  • miro-verification=cdbd3248ea1e4b5e32481d5191682e8d5434e3ff
  • v=spf1 include:spf.intermedia.net include:spf.protection.outlook.com ip4:96.126.103.30 ip4:45.79.147.79 ip4:68.71.252.161 ip4:104.237.143.251 ip4:50.116.48.244 ip4:192.225.170.98 include:spf-2248456.jmsend.com include:sendgrid.net include:mailgun.org" " include:registroactivo.com include:emailus.freshservice.com include:sender.zohobooks.com include:_spf.intacct.com include:relay.mailchannels.net ~all
  • amazonses:Kk0ppF5hGPEQKYxxFGNgbh5kA6MsxqqIcj452YNAsO0=
  • _bh2eu795symltj6m53ez4qy4dpijam3
  • intacct-esk=93CD51F0195D6618E053AA06A8C07C49
  • logmein-verification-code=1693f8fc-5fad-419e-b474-fc25de2bafed
  • google-site-verification=oZQ3FghViX5DrBhNEaBt7dznzLaN-Q0tRqffZlPfi0s
  • Foxit-domain-verification=9c713bd0379c034a412355f8d84c3bdc
Cloud / SaaS Services Detected
Apple Amazon SES/WorkMail Anthropic Sage Miro LogMeIn Mailgun SendGrid

Leak Screenshot:

Leak Screenshot