Contact us Buy Me a Coffee

Sponsored by Hudson Rock Use Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are leading to ransomware attacks

Xerox Corporation

xerox.com

Group Maze
Discovered 2020-06-25 00:00 UTC
Est. attack date 2020-06-25
Country GB
Duplicate Entry
This victim has been identified as a duplicate of another entry in our database. However, this may not always be the case: the same organization can be targeted multiple times by the same or different ransomware groups, which may result in separate legitimate entries. Search for related entries

Infostealer activity detected by HudsonRock

Compromised Employees: 507

Compromised Users: 4068

Third Party Employee Credentials: 237


External Attack Surface: 200


Infostealer Distribution

DNS Records:

The following DNS records were found for the victim's domain.

WHOIS Emails
  • abusecomplaintsmarkmonitor.com
  • whoisrequestmarkmonitor.com
MX Records
  • mx1.xerox.iphmx.com. Cisco/IronPort
  • mx2.xerox.iphmx.com. Cisco/IronPort
TXT Records
  • verification_token=U5QWH8sSeEsYDr93aMcfMPd3I
  • google-site-verification=6XsB1W-0Zx4r_yjEzo7NYJ6EbSkrsOMucak3mRPj2P4
  • v=spf1 include:_iphmx.xerox.com include:_iphmx2.xerox.com include:spf.protection.outlook.com include:spf.constantcontact.com include:_spf.salesforce.com include:nw026.com include:mail.zendesk.com include:autotask.net " "ip4:141.193.184.64/26 ip4:141.193.185.128/25 ip4:18.208.124.128/25 ip4:141.193.184.128/25 ip4:141.193.185.64/26 ip4:158.247.16.0/20 ip4:3.93.157.0/24 ip4:216.139.64.0/19 ip4:108.179.144.0/20 ip4:54.174.60.0/23 ip4:143.244.80.0/20 ip4:54.174.59.0/24 " "ip4:54.174.63.0/24 ip4:3.210.190.0/24 ip4:141.193.184.32/27 ip4:54.174.52.0/24 ip4:139.180.17.0/24 ip4:141.193.185.32/27 ip4:54.174.57.0/24 ~all
  • umacf5dltsUy81OlT14W8R76dh5dLxGs/B3p3YRVQGsuDXbu/pIu9MWmZ9TJgM9tWwYaPwl8Ndrf6Hqqed4Lew==
  • google-site-verification=bijxfKyc1IiAEC6I-Y6EfLH8zV0-iCu7oyDsbakUUcI
  • intersight=ab5bad26a3b47cb1a8858f74bb8e398f9deb26626e16e98590ee40f5952f11f3
  • 6ZpwCG3DkW/sI5iW0PrECx4iSQF1Yj2rC2USrsT7LaZ0wVbb70bfJXyLDVRZEDRwMRPij/duzfFcwX9EjJ1Ylw==
  • CKIOJONMZT._autotask.xerox.com
  • webexdomainverification.4C675B8BD27DB136E053AB06FC0A3F65=f46c9f8f-27fe-4399-a063-46798885439c
  • apple-domain-verification=yGDgIeYqDyfSbtrX
  • google-site-verification=FTZ_4d8T6qx3IXTiRaK4xnIRRe3k23DJhm802IUTlhM
  • webexdomainverification.LS2L=3821c6b9-1edb-4162-9305-cf6fac2d2d9a
  • wiz-domain-verification=50e8c15c260630d8612c9652843dd010325682cd653cf0d996bceaf517798c4a
  • google-site-verification=gIiGv288UuyOWc6MRrRJNI9ZX96wxqBbsdxIv3gAGZQ
  • pandadoc-domain-verification=GTffXF2BZ7C9TzT2TMPfVR
  • google-site-verification=AG7vu8mYz2Mjd2OxV2jMmHRT5RLlI3vfZ4Pwzx_eXyo
  • globalsign-domain-verification=91E33A0C7638872C1CF950E2A564F01F
  • google-site-verification=SqEDLxkH1C2tIoVfcgUK5IPPplF7H9Q4PDXSLBQ_mSY
  • globalsign-domain-verification=404484575de68de025ead67e61bdd594
  • google-site-verification=_TXJIUt1VESW6hNVUMWXjP6LY2Rhm3KXDqG622PjcsQ
  • globalsign-domain-verification=cce2fca7f88257f0e256f0c3ef70177f
  • h1-domain-verification=u798srhkHsguWuuKJ9jEF7jaY8rMRvo1jEGp3jAG83kBZdZN
  • cisco-ci-domain-verification=5189f93c6104ca078b704b53bbda5c79ee635e479431967841b7f1ceed59577e
  • jamf-site-verification=xUbrpqTTnKUBPaPLkO01zw
  • atlassian-domain-verification=xNjY3El5LXbHIIFbfZKQaBxidFMyigI0zC9hFFF72Bqc7gEndCemG9Tmkuv2AisI
  • jamf-site-verification=06aiArdDOtB10ORj1dSClQ
  • google-site-verification=Ggk7Rg_jFyfh5yiNssP4KvydqZZIYntXYGsDmCyHUQg
  • adobe-sign-verification=eca014782328d616b400ba2dc33ee480
  • atlassian-domain-verification=iHnC7jWGpEexY0C6pniDayOYavXl51LXTWY8Qz2GS8ZA02Y7crYUu7y8Gy2WLcWK
  • Dynatrace-site-verification=2c111e48-3773-4f10-bacd-ef1aac74947b__pqs79pq5uhf5sf2mm83lal92o6
  • webexdomainverification.4d2abde4da5011c7e053ad06fc0ab17f=1023409a-d0d8-4e32-aa93-c802970feb53
  • MS=ms69937247
  • docusign-c1f086c5-10f1-4fa7-8a6d-fca5512d732f
  • google-site-verification=i70agOHhpDybanmNYjbgvtz68pnSNAVNhCoq8sOnPDA
  • docusign=0cd50753-4abe-44e3-81df-9607b303ed1f
  • webexdomainverification.4C675B8BD27FB136E053AB06FC0A3F65=e072993c-c14a-4a6f-8942-47788297c063
  • amazonses:BbvpRIWAvvVQijs0zvbkm5hWu9pJ9sRS/R3fnguzUp4=
  • monday-com-verification=RTIiflOQpEiCwByU2cwHWjvvaCVVwNjprLV1vSDuM-U
Cloud / SaaS Services Detected
Apple Atlassian Amazon SES/WorkMail Microsoft 365 Salesforce JamF Zendesk Cisco DocuSign Cisco Webex

Leak Screenshot:

Leak Screenshot