Buy Me a Coffee

Sponsored by Hudson Rock Use Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are impacting your business

Logo Voltus GmbH

Group: everest

Discovered by ransomware.live: 2025-08-15

Estimated attack date: 2025-08-12

Country: DE

Description:

[AI generated] Voltus GmbH is a German company that provides demand-side energy management service. It specializes in distributed energy resources, focused on aggregated load reduction and energy efficiency, enabling customers in industrial and commercial sectors to decrease their energy usage. The company's platform aggregates small resources into distributed networks of demand management assets that interact with energy markets, saving cost and resources.


🕵️ Infostealer activity detected by HudsonRock

Compromised Employees: 0

Compromised Users: 325

Third Party Employee Credentials: 0


External Attack Surface: 8


Infostealer Distribution


DNS Records:

The following DNS records were found for the victim's domain.

WHOIS Emails
  • No emails found.
MX Records
  • mail.voltus.de.
TXT Records
  • atlassian-domain-verification=dnyi8TUKPq/HRwaMgfAAdKA9Xb05t0uywahU7e5FS8GVDU01EP30PKJADGjONA87
  • _globalsign-domain-verification=Hej9gr3s-rllC3aECT5P3NzROT9aamlpbhvaXmSMsS
  • -----BEGIN CERTIFICATE REQUEST-----\010MIICazCCAVMCAQAwJjELMAkGA1UEBhMCREUxFzAVBgNVBAMMDm5ld3Mudm9sdHVz\010LmRlMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAnnbtABLpsh63BtHb\010waxsJaBxxUhi8wden3zjikYHJNhMz+kvym/0Jct4nHe1fgH3Qxv6s/PDtaf8xEI2\010xKJQjneQgtZ98AgZpuKKtqQl" "yei6XARGteWomIU7x20hRT21HES73niaVjD0NvHQ\010FipzDAnipMVnfw3vZm8i8DsjlkZdNnNqZWyVwYyohI/LleBH4EpJEqYvOqIsxu+t\010b9/iuzXF/MQykZJmovvdA8DmZOKAyrtVZdCPNdGr4DKf7JNLY3TQGqXmNq0dZmAq\010xXm4IGwJfrcJyTd08urERIIrUI2Ebhy0IFMtbTlmVqRUyQokRe8X0I6GKfXIdrnl\010uOoy2wIDAQABoAAwDQY" "JKoZIhvcNAQELBQADggEBAIP0aNOapzsSxIX6srNrfMLt\010gNwbDeWkP99w7xpvWUPjs6uMucow8+yIN/2mZgic4XoEcNeC6NFmW7q0ggB19f2j\010obIprBlePR8lNpy4kkl8Kn2GGMTeRiwiaCoAVyboP+bG/kMASVdvjXEHF9ILj+8S\010oenxjfEeVHiFCVNcARKnj2ApYS9A3BIH0784XPJtGDQcVTZZ4h8oRpz0AshT+Qhr\010H7+bzX3GgttT6D" "vLXoc9zTOR5yTLPi+zFSXiXjnt6vhJb+D7R+lUeXlujBHQYsKH\010dd+K0HH+uBn7XWN0XbmPCNrQOOhGdALkSocKAi7nP9Q2dRHTuuhUKqBjMfDfSPs=\010-----END CERTIFICATE REQUEST-----
  • _globalsign-domain-verification=Y_sdMgd7UW-ZohY1ZjHiQoOS9eRMr1I4lQFzhbbTA8
  • v=spf1 a mx ip4:217.22.197.30 include:mail.zendesk.com include:spf.crsend.com -all
  • _globalsign-domain-verification=h84VyT959PIxIs9kePemY61egfSDwtu9K81MeeO0IC
  • MS=ms17026600
  • _globalsign-domain-verification=ACSGf6-Ed6Pp00VNnYD-jKQSzHl9lzKuqANGnwsOUc
  • swisssign-check=SdktgczvBesOSAdGHMrGifY0S7sHa4FFUZgjEPsYPX
  • swisssign-check=ts1WBypNT0UytRI54ffXbmMG2rQq6XpF8fyhlvVcMj
  • _globalsign-domain-verification=bxDbBhzROrAcPvB-ZbXo8-WxUQsZNsZJxDRPsUMnR7
Cloud / SaaS Services Detected
Atlassian Microsoft 365 Zendesk

Leak Screenshot:

Leak Screenshot