Buy Me a Coffee

Sponsored by Hudson Rock Use Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are impacting your business

Logo finetech.de

Group: incransom

Discovered by ransomware.live: 2025-04-09

Estimated attack date: 2025-03-09

Country: DE

Description:

Copyright © 2020 Finetech GmbH & Co. KG, All rights reserved. Finetech respects your privacy. We use cookies for a variety of purposes, such as website functionality, improving your experience of our website and building integration with social media. By continuing your visit on our website, you are consenting to our use of cookies. More info With an user account you get ===> Revenue: $25.7 Million Employees: 115 Data:137gb Phone Number: +49 309366810 Managing Director +86-21-58866-1668 Senior IT-Systemadministrator +49 30 936681 592 Senior Konstrukteur DD +49351888566-23 Service Engineer +491717646694 Service Engineer +4916090734566 Service Engineer +4915785005796


🕵️ Infostealer activity detected by HudsonRock

Compromised Employees: 0

Compromised Users: 25

Third Party Employee Credentials: 0


External Attack Surface: 3


Infostealer Distribution


DNS Records:

The following DNS records were found for the victim's domain.

WHOIS Emails
  • No emails found.
MX Records
  • finetech-de.mail.protection.outlook.com.
TXT Records
  • atlassian-sending-domain-verification=d7d0a682-8f35-4c79-97bd-a9ef14867ff8
  • TXT pardot1014812=ed5f6317f967bcf4fde7ed01d0660f3785b93370d6c35234ed8f011dacbee1aa
  • TXT pardot1014812=5f64ab88c8d715718bd8a5bb37c8eac9eef741ee9c8e82ae01b9dfe8bd7832dd
  • TXT pardot1014812=8da9b6e57c0b83a6a5d1f513f0d2c348a06382349fe219e6cec2c954cf68bec2
  • pardot1014812=ad0b6a8e576242f9d7be7a67460dd4b7ab0ab86a1774618e2a445f9a04649028
  • google-site-verification=T_Dp3qvnuhUublQrotR69x0EoFY48OZ9v_ROt-0VXJ4
  • MS=ms94472921
  • v=spf1 a mx a:srv.finetech.de ip4:89.27.166.50/29 ip6:2a01:4f8:c17:eee7::1 ip4:138.201.186.109 ip4:87.140.115.186 ip4:85.13.133.62 ip4:204.14.234.64/28 ip4:204.14.232.64/28 ip4:182.50.78.64/28 ip4:96.43.144.64/31 ip4:96.43.148.64/31 a:w009a531.kasserver.c" "om include:spf.protection.outlook.com include:_spf.salesforce.com -all
  • lemlist-verif=-690c72db
  • atlassian-domain-verification=PZHzj/YrvOty0/mOh9VQJOl9pZaMwbaEjF/yYkec8HuCpYktrp2svAEcOHRMILZG
  • sending_domain1014812=e219fcb8f2ed54643e47c004ebff7d42428c9ab41c0e8340fbc38e420fdb04c1
  • MS=ms36596968
  • pardot1014812=86e7cef6eb88b7d9085f8d8c0c9d9840fbccc9874875188ec40b86bb1f631053
  • MS=D428DD25E6E05398C0BB0E0C143247E4C17B2012
Cloud / SaaS Services Detected
Atlassian Microsoft 365 Salesforce

Leak Screenshot:

Leak Screenshot