Group:
Blackbasta
Discovered by ransomware.live: 2024-06-25
Estimated attack date:
2024-06-08
Country:
Description:
Scrubs & Beyond was founded in 2000 with the thinking that the healthcare retail experience could be completely transformed. The result was a retail experience that elevated medical professional essentials beyond the practical — and added a much-needed sense of humanity that was otherwise missing in the industry.SITE: www.scrubsandbeyond.com Address : 12969 Manchester Rd Saint Louis MO, 63131-1805 United StatesALL DATA SIZE: ≈600gb 1. Human Resources data 2. Users folders, Employees confidential data 3. Personal documents 4. Departments data: Accounting, Management… & etc…
Infostealer activity detected by HudsonRock
Compromised Employees: 2
Compromised Users: 181
Third Party Employee Credentials: 3
External Attack Surface:
3
DNS Records:
The following DNS records were found for the victim's domain.
- domain.operations@web.com
- scrubsandbeyond-com.mail.protection.outlook.com.
- google-site-verification=piKZVMf-1cy3Opr12m2dXd0nR35HfM9JJCO2Wa-Hw3c
- sophos-domain-verification=8e8676801d43ef9dd12cbedf9875d134633ef428
- 9qgx22nqnk5gmbf2j6665hkfvfh7fqk3
- knowbe4-site-verification=feda377c2fe882e0791310c90b95137a
- 9dkb7gt00d1q96cxznt547rdpkzlxdxp
- facebook-domain-verification=ovjzouz8gts8a2ytyzy5toori7fm3a
- apple-domain-verification=LqA8CgzjJwN01aa4
- 3hxg410b6w37vhbczp99my5pttcw4lbg
- MS=ms38116848
- MS=ms2ea81df4
- google-site-verification=WtzA_Dy6ChweZv0QykPjkvifL3rW5wLer3wlP2aic2Q
- 8jbg232oh5ofg4veo3iktol1tf
- spf2.0/pra ip4:206.18.101.128/26 ip4:206.18.106.240/27 ip4:206.18.123.0/26 mx ~all
- twilio-domain-verification=09bf8959a84d563c7a6dc6f817b5d9d1
- _vzg78r2lotvx9vgxltytw5v1fik0eoj
- globalsign-domain-verification=DyhW6l8hxNEE1ZG-CYKNeBEsbrEmnfu4_FuGNkRGvK
- v=spf1 include:zeptomail.net ip4:18.217.198.157 ip4:18.188.66.80 ip4:3.130.8.24 ip4:3.16.168.137 ip4:18.217.252.34 ip4:3.21.145.66 ip4:3.143.64.87 ip4:18.190.103.24 ip4:18.225.14.176 include:spf.protection.outlook.com include:spf-ipw.inkyphishfence.com in" "clude:spf-obx.inkyphishfence.com include:sendgrid.net include:spf.mandrillapp.com include:amazonses.com include:mail.zendesk.com include:21945971.spf04.hubspotemail.net ~all
- globalsign-domain-verification=c0eiOxKpXUEwBFE6rCeP6G3NG3gdGmg2orYY47EARz
- _v8eoevqbzxklzqrsojqha4loiodo1b1
- rippling-domain-verification=c4aa8d374288dd75
Cloud / SaaS Services Detected
Apple
Amazon SES/WorkMail
HubSpot
Microsoft 365
Twilio
Zendesk
KnowBe4
Mandrill
SendGrid
Rippling
Sophos
Leak Screenshot:
Legal Disclaimer:
Ransomware.live does not engage in the acquisition, exfiltration, downloading, possession,
hosting, access, consultation, redistribution, or disclosure of unlawfully obtained data.
This platform indexes only publicly visible information posted by ransomware operators and
open web sources without accessing or obtaining the underlying stolen content.
The service is provided to support public awareness, legitimate research, and cyber-resilience.
No stolen personal or confidential data is collected or distributed via this site.