Buy Me a Coffee

Sponsored by Hudson Rock Use Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are impacting your business

Logo concordegroup.ca

Group: cactus

Discovered by ransomware.live: 2024-04-22

Estimated attack date: 2023-12-04

Country: CA

Description:

Download link #1Concorde Group has celebrated over three decades of unprecedented success while becoming one of city’s most influential hospitality brands. Since the opening of their first venue, Republik nightclub in 1987, these industry leaders have played an instrumental role in shaping Calgary’s food and drink culture and have set new standards for local hospitality.Website: https://www.concordegroup.ca/Revenue : $150MAddress: 2507 16 St SE, Calgary, Alberta, T2G 3R4, CanadaPhone Number: (403) 777-1050Download link #1: https://***************.onion/CONCORDE/fullMirror: https://cactus5dqnqkppa5ayckiyk6dttpqwczdqphv5mxh4dkk5ct544q5aad.onion/CONCORDE/full


🕵️ Infostealer activity detected by HudsonRock

Compromised Employees: 2

Compromised Users: 0

Third Party Employee Credentials: 0


External Attack Surface: 2



DNS Records:

The following DNS records were found for the victim's domain.

WHOIS Emails
  • compliance tucows.com
  • Please ask the Registrar of Record identified in this output for information on how to contact the Registrant, Admin, or Other contacts of the queried domain name
MX Records
  • concordegroup-ca.mail.protection.outlook.com.
TXT Records
  • 7r6psmel7pi659b7ovg17mibgq
  • 74ps6nvobuuksg2um3pqgvcae6
  • v=spf1 include:spf.protection.outlook.com include:_spf.ultipro.com include:spf-ca.emailsignatures365.com ~all
  • 94t82pb673m99k0td7o7va19g7
  • workplace-domain-verification=anbZbz9LTSCe7RL9xhoMSpNncAOIl2
  • google-site-verification=Mzc0nKkj4SHJvBOZjPBqIFG9zkBmKithxa1xzTTkTTs
  • apple-domain-verification=AX7FE64IzBIjLNvj
  • je1qf1hvcif8f8n9im4ojqrccg
  • 4hpvuml4v655khskfg3l835a88
  • 9stuupjebkus103gp1spa9a8if
  • MS=ms51285933
Cloud / SaaS Services Detected
Apple Microsoft 365

Leak Screenshot:

Leak Screenshot