Buy Me a Coffee

Sponsored by Hudson Rock Use Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are impacting your business

Logo colonialsd.org

Group: lockbit3

Discovered by ransomware.live: 2024-05-10

Estimated attack date: 2024-04-26

Country: US

Description:

https://mega.nz/folder/l60i2aLR#1pTmoxhVwJrSvVhJ1V3F5g We are publishing sample partial (~50GB) from the data of Colonial School District. We have more 500GB available to sell. Contact us for a deal before 26th May with offers. If we do not receiv...


🕵️ Infostealer activity detected by HudsonRock

Compromised Employees: 0

Compromised Users: 42

Third Party Employee Credentials: 14


External Attack Surface: 1



DNS Records:

The following DNS records were found for the victim's domain.

WHOIS Emails
  • domain.operations web.com
MX Records
  • d259609b.ess.barracudanetworks.com.
  • d259609a.ess.barracudanetworks.com.
TXT Records
  • MAOoj0HYJ/5m/lCSxeOYANL/ClSXNoxJHWUYLXGRxoFEThlppq3+YcD+aI9FzjObAvjIFHYgAgLA5l/5OMfCmw==
  • v=spf1 mx ip4:8.12.72.20 ip4:66.195.143.26 ip4:216.162.88.0/26 ip4:23.103.224.0/19 ip4:206.191.224.0/19 ip4:40.103.0.0/16 include:swiftreach.com include:spf.protection.outlook.com include:_spf.bbnotify.net -all
  • MS=ms60484524
  • MS=ms71172098
  • duo_sso_verification=uFMknOt2EZAHii3BnqOblPa8ocC7VfvJKwEbsjLuzWNGbZlN9CpE9mUupbBCA3Zg
Cloud / SaaS Services Detected
Microsoft 365 Cisco Duo

Leak Screenshot:

Leak Screenshot