Discovered
2024-02-02
Est. attack date
2024-02-02
Country
Description:
Manitou Group, headquartered in France, is a heavy equipment manufacturer specializing in forklifts, telehandlers, aerial work platforms, and warehousing equipment.400GBSpecification, drawings of equipment elements and parts, developments, source...
Infostealer activity detected by HudsonRock
Compromised Employees: 24
Compromised Users: 103
Third Party Employee Credentials: 101
External Attack Surface:
27
DNS Records:
The following DNS records were found for the victim's domain.
- domain.operations@web.com
- alt1.aspmx.l.google.com.
- alt2.aspmx.l.google.com.
- aspmx.l.google.com.
- aspmx3.googlemail.com.
- aspmx2.googlemail.com.
- globalsign-domain-verification=80A9469A4BD3A4FD15543B64A06C3CD7
- globalsign-domain-verification=95F3DF8F19F516BE98CAAC6758368863
- MS=ms69545167
- 5uah5jc.impervadns.net
- google-site-verification=UqUzZGY_S_lTARlr5RUFC93x_tdy8iYTpHf6QuAULW0
- 00D7F000004cMlw=1TBRF00000000Kz
- aEEOKShTj6x7NxIJqXCg7IN/0jvKFnzKUpXdyP/HjojcD4mVr7SBMF+2M7ldMoH0sPgrRL6ITln/SvuzkF3Wkg==
- globalsign-domain-verification=a966972b243b14958a3a70926eae171b
- wrike-verification=NjE1NTYzNTo2NTc1ZGEzZTBkNDJiYmRmYzg3NzNlYTQxOTE0OGU4NmQ0OWIwMzZjZTQxZDIwMzdkZGUzODhmZDgzNGNkMWM5
- _g74fwhqts2ez1sb7ibgirs3cgk3z2pw
- tiq2o2o.impervadns.net
- google-site-verification=3FPQzPN7Wd3S60irAZYfN0o4iukn6oLy-qMOjgVTBiE
- E70C7C19F7088AC6BEE204653DE52EBEB11DA9BCD45D06A8C8E509E53F138522
- manitou-group.com
- bw=CgJ0IUezyCjcElyMQL5v/i+xGlW+IApA5VSG+urwUgTQ
- vwxzwd2l5h52sfhhwj9jhw8tn1v26hwq
- v=spf1 ip4:31.222.193.4 ip4:31.222.193.34 ip4:37.72.137.233 ip4:40.127.176.0 ip4:137.116.232.77 ip4:89.107.170.145 ip4:81.117.58.134 ip4:62.28.72.155 ip4:46.19.120.131 ip4:198.99.255.17 ip4:84.45.33.226 ip4:54.204.38.97/24 ip4:35.181.25.130 ip4:23.21.109." "197 ip4:23.21.109.212 ip4:147.160.167.0/26 include:_spf.google.com include:spf.mandrillapp.com ip4:149.72.30.36 include:servers.mcsv.net include:amazonses.com include:_spf.salesforce.com include:21171537.spf07.hubspotemail.net ip4:5.135.98.231 ip4:5.135.9" "8.232 ip4:5.135.98.233 ip4:5.135.98.234 ip4:5.135.98.235 -all
- globalsign-domain-verification=E8F26AB89FCD654EEA69892960451CD4
- MS=ms32807761
- MS=ms29417346
- 00D7F000004cMlw=1TBRF00000000JN
- _9sqnd6eiasjlw16xespue1t7hjug4av
- 5mc4hyo.impervadns.net
- 962FE8236FF4E3C72E1273634B71F9F1BCDBAF8D
- p6tm9mu.impervadns.net
- qwpb6x5.impervadns.net
- globalsign-domain-verification=1D80EA49B72E3FFF5392BC3688D4AA65
- globalsign-domain-verification=20B2A9000DCAD994C530B5AD1EE8A28B
- MS=ms27862838
- globalsign-domain-verification=6934BB50C3683EF98210BBB9C51FAC3C
- MS=ms59849463
Cloud / SaaS Services Detected
Amazon SES/WorkMail
HubSpot
Mailchimp
Microsoft 365
Salesforce
Mandrill
Leak Screenshot:
Legal Disclaimer:
Ransomware.live does not engage in the acquisition, exfiltration, downloading, possession,
hosting, access, consultation, redistribution, or disclosure of unlawfully obtained data.
This platform indexes only publicly visible information posted by ransomware operators and
open web sources without accessing or obtaining the underlying stolen content.
The service is provided to support public awareness, legitimate research, and cyber-resilience.
No stolen personal or confidential data is collected or distributed via this site.