Buy Me a Coffee

Sponsored by Hudson Rock Use Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are impacting your business

Logo columbiapipe.com

Group: blackbasta

Discovered by ransomware.live: 2024-04-09

Estimated attack date: 2024-03-04

Country: US

Description:

Since 1935, Columbia Pipe & Supply Co. has consistently delivered a wide range of high quality products and SERVICE plus SOLUTIONS. Since we are an independent company, our sales teams have the flexibility to focus their expertise on our customers’ unique needs without the bureaucratic limitations of a large corporation. With more than $50 million inventory, including over 130,000 individual SKUs, stocked in close to one million square feet of warehouse, Columbia Pipe is able to connect our global supply of product with our local markets. We have 16 mutually-supporting locations in Illinois, Indiana, Michigan, Wisconsin and Minnesota, so wherever you are—we are close-by.SITE: www.columbiapipe.com Address : 1120 West Pershing Road Chicago, IL 60609 Phone: 800-368-2709 Fax: 773-927-8415ALL DATA SIZE: ~450gb 1. Payroll 2. Finance 3. Accounts, Budgets 4. Human Resources 5. User Home Directories & etc…


🕵️ Infostealer activity detected by HudsonRock

Compromised Employees: 4

Compromised Users: 5

Third Party Employee Credentials: 3


External Attack Surface: 10



DNS Records:

The following DNS records were found for the victim's domain.

WHOIS Emails
  • abuse key-systems.net
  • abusereport key-systems.net
  • info domain-contact.org
MX Records
  • us-smtp-inbound-1.mimecast.com.
  • us-smtp-inbound-2.mimecast.com.
TXT Records
  • smartsheet-site-validation=ONgalMJXPx8ZpXSN32ot_msl2go5oX14
  • 3fkrp05bkkhb2t5nzzzhp9pkxgyhv3p4
  • adobe-idp-site-verification=71410c558f12ab8c8fdad1fcc098b26508184ab897e9b29169a4717feca09d8f
  • ssn9l3vx3g3hdc44j2j088k8p1vdhnlm
  • c8t2vh5yphx2cgd086hyv2drxp59rdrq
  • _9xyehjgdsiex4vbzs8dyr5w2xh0q1gq
  • MS=ms22708705
  • o31jfhub3u9se4juo4cka3is17
  • 0lf6d2lwskzzytxk40rxb5cycyypjl58
  • 0ed1fe018acaaa73686a794aad8b7e42e67a7dfaa4
  • gGsLCofycXPRCip0QNV_yoWCxS4fh51CNAH8AUnMuWo
  • google-site-verification=gGsLCofycXPRCip0QNV_yoWCxS4fh51CNAH8AUnMuWo
  • A3tRP5+At0lMbuoxnLuUUZJdkFrPi/LR74PZ0/+OVdAby0bDvzhJBW4vtoP9jY426yWZTOH8yhb5+JGkyfPMZA==
  • atlassian-domain-verification=zpruDckV1iW7C9kArBkc4Mwnqd+UphT7At6WUmWvO/IcGMwuTp4Wi2CuzViU0eZS
  • v=spf1 include:%{i}._ip.%{h}._ehlo.%{d}._spf.vali.email ~all
  • 6gcs554k04wbyb6jhzt8f0wqqh7s15mf
  • 0ed1fe018a8ad27a94dc834804848d3ea9d6ac1bef
  • 86xjmzv9w0v6j57236xfx2p1psflxpgk
Cloud / SaaS Services Detected
Adobe Atlassian Microsoft 365

Leak Screenshot:

Leak Screenshot