Buy Me a Coffee

Sponsored by Hudson Rock Use Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are leading to ransomware attacks

Logo pronaca.com

Group: Devman

Discovered by ransomware.live: 2026-01-12

Estimated attack date: 2026-01-12

Country: SJ

Description:

Financial, contracts HR data


🕵️ Infostealer activity detected by HudsonRock

Compromised Employees: 105

Compromised Users: 520

Third Party Employee Credentials: 85


External Attack Surface: 68


Infostealer Distribution


DNS Records:

The following DNS records were found for the victim's domain.

WHOIS Emails
  • dominios@pronaca.com
  • abuse@directnic.com
MX Records
  • pronaca-com.mail.protection.outlook.com.
TXT Records
  • 3qmna8tqrgaq2nt17ialm11338
  • vrrva0o82ne8fiqsmqc0jcivs9
  • 329f8clnhs59oqimc1ehvt6ie1
  • r717mtrenfihodkdku6u6sojbg
  • GVFTPqSg
  • MS=ms34029085
  • tediioke70eb93la5hbm652lrs
  • d8l8o5hmfdhas0j795c0ku7d47
  • smartfense-domain-verification=4xaib71AUrdSZ1hYsSs-rYiJIdWlQLJnfv77P_6PHVyI5TAF
  • stkinbb108fnv9aevmpuniatfj
  • v=spf1 mx a ip4:200.31.27.111 a:pronaca-prod-841395526.us-east-1.elb.amazonaws.com include:spf.protection.outlook.com +include:_spf.act-on.net include:bmsend.com include:spf.emailsignatures365.com include:_spf.qemailserver.com include:amazonses.com ~all
  • 7jjo8npsjno2p54qfe8ocfmqs9
Cloud / SaaS Services Detected
Amazon SES/WorkMail Microsoft 365

Leak Screenshot:

Leak Screenshot