Buy Me a Coffee

Sponsored by Hudson Rock Use Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are impacting your business

Logo adveo.com

Group: cactus

Discovered by ransomware.live: 2024-12-23

Estimated attack date: 2024-12-04

Country: FR

Description:

Office Products Retail &amp; Distribution. “ADVEO is one of the leading European players in the wholesale distribution of office supplies, services and solutions. Leader in France and Benelux, the ADVEO group offers with its various regional logistics centers more than 25,000 references deliverable within 24/48 hours throughout the territory.”<br><br>Website: <a href="https://www.adveo.com/">https://www.adveo.com/</a><br><br>Revenue : $740.7M<br><br>Address: Adveo France Route D'ève, Dammartin en Goële, Wallis and Futuna, 77230, France<br><br>Phone Number: +32 93810505<br><br>


🕵️ Infostealer activity detected by HudsonRock

Compromised Employees: 0

Compromised Users: 44

Third Party Employee Credentials: 2


External Attack Surface: 14



DNS Records:

The following DNS records were found for the victim's domain.

WHOIS Emails
  • abuse support.gandi.net
  • 482da57230057b1cbcb12e276e30f1de-49784230 contact.gandi.net
MX Records
  • mx02.hornetsecurity.com.
  • mx01.hornetsecurity.com.
  • mx03.hornetsecurity.com.
  • mx04.hornetsecurity.com.
TXT Records
  • MS=ms46557578
  • 8UslNbLHJy0xfmRA7kheV0KW3436+ToFSoCEYU4EykxznQL3E7QSY2Tes/bLrF+GQFvmZOjnfjdcuaQg7ul9WQ==
  • v=spf1 mx ip4:40.69.215.141 ip4:79.174.131.156 ip4:194.78.211.0/28" " ip4:77.241.86.181 ip4:217.19.238.242 ip4:178.208.52.198 ip4:79.174.131.179" " ip4:52.169.223.177 ip4:52.169.217.81 ip4:217.21.190.0/28 ip4:40.69.212.179" " ip4:204.14.234.64/28 ip4:204.14.232.64/28 ip4:182.50.78.64/28 ip4:96.43.144.64/31 ip4:96.43.148.64/31" " include:spf.adveonet.com include:spf.protection.outlook.com include:spf.flexmail.eu include:spf.hornetsecurity.com include:spf.mailjet.com include:_spf.salesforce.com ~all
Cloud / SaaS Services Detected
Microsoft 365 Salesforce Mailjet

Leak Screenshot:

Leak Screenshot