Contact us Buy Me a Coffee

Sponsored by Hudson Rock Use Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are leading to ransomware attacks

soundtransit.org

soundtransit.org

Discovered 2025-05-05
Est. attack date 2025-05-05
Country US

Description:

[AI generated] Sound Transit, operating under the domain "soundtransit.org", is a mass transit agency serving the Seattle, Washington, USA, metropolitan area. Founded in 1996, it offers public transit services including bus, light rail, and commuter rail services throughout King, Pierce, and Snohomish counties. Its major transportation systems include Link Light Rail, Sounder Commuter Rail, and ST Express buses.

Infostealer activity detected by HudsonRock

Compromised Employees: 1

Compromised Users: 0

Third Party Employee Credentials: 0


External Attack Surface: 9


Infostealer Distribution

DNS Records:

The following DNS records were found for the victim's domain.

WHOIS Emails
  • domain.operations@web.com
MX Records
  • soundtransit-org.mail.protection.outlook.com.
  • soundtransit-org.mail.eo.outlook.com.
TXT Records
  • samsung-domain-verification=ffb4dfb2-b92a-4525-915b-27ff97197a6f
  • jamf-site-verification=Hxlpt1Heq2wo0HRRHxGn1g
  • MS=ms73236767
  • Dynatrace-site-verification=a8021de1-647c-4b34-8f7f-5b4b035f303c__tgk1v8p3vekv83ii1g1qr026fg
  • 3f8zfzd00402d9yrs91y5mh2s3jq5qbx
  • 1w200q1qktkdtq0ynq3b48srdtrjfpkx
  • quickbase-site-verification-7a98eb03d19f555eaa87c986be8832cecab1eb53
  • adobe-idp-site-verification=c469a1bedb53155d495341ce975255c15bcfd81a77ac27cc8daef6f22dd15ab2
  • dXMtd2VzdC0yX0VZV3NrOXRyZA==
  • _ztphqkqt4htxcuay71g563uoz60q37x
  • v=spf1 include:spf1.soundtransit.org include:spf2.soundtransit.org ip4:199.191.49.0/24 ip4:35.80.141.6 ip4:44.229.121.55 ip4:44.230.80.67 ip4:148.59.100.16/28 ip4:167.89.0.0/17 ip4:208.117.48.0/20 ip4:50.31.32.0/19 ip4:198.37.144.0/20 ip4:198.21.0.0/21 ip" "4:192.254.112.0/20 ip4:168.245.0.0/17 ip4:149.72.0.0/16 ip4:159.183.0.0/16 ip4:223.165.113.0/24 ip4:223.165.115.0/24 ip4:223.165.118.0/23 ip4:223.165.120.0/23 -all
  • docusign=6861943e-1cb0-44b9-a4a5-e36c2a72e478\010
  • autodesk-domain-verification=GkrXr6mjMzu5sDuTh4iA\010
  • _cscwjq29tqh3x7j8ghvn8usb1pqxu82
  • cisco-ci-domain-verification=7c66c18f1a12ff3a389330a39e133308a77d8a334c39bdb6033b7301fc5c4b02
  • apple-domain-verification=S1q0bacowcqvSFCE
  • hcp-domain-verification=4a36ee86d91e1e9059e1cc2d43fb29f9de2d17be3f6158b298e8b8e37a5562bb
  • docusign=a488127c-da8f-4817-a3f7-dee77a39582a
  • z6jz86pkcytkk9cr8kwrslvsv7bwvp38
  • _w1fensqgajh4vsy2klcg4upy5t85hly
  • canva-site-verification=EIK15QBGeABfLjYnGWZZDw
Cloud / SaaS Services Detected
Adobe Apple Microsoft 365 Autodesk JamF Cisco DocuSign

Leak Screenshot:

Leak Screenshot