Buy Me a Coffee

Sponsored by Hudson Rock Use Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are impacting your business

Logo qosina.com

Group: cactus

Discovered by ransomware.live: 2024-03-27

Estimated attack date: 2024-02-27

Country: US

Description:

Download link #2Medical device manufacturer. “Qosina is a leading global provider of over 5,000 OEM single-use components, serving the medical and biopharmaceutical industries. Our unwavering commitment revolves around ensuring an exceptional customer journey. We provide complimentary component samples, minimum order quantities, just-in-time delivery, mold modifications, and new product design and development.”Website: https://www.qosina.com/Revenue : $37.9MAddress: 2002q Orville Dr N, Ronkonkoma, New York, 11779, United StatesPhone Number: (631) 242-3000Download link #1:  https://***************.onion/QOSINA/PROOF/Mirror: https://cactus5dqnqkppa5ayckiyk6dttpqwczdqphv5mxh4dkk5ct544q5aad.onion/QOSINA/PROOF/Download link #1:  https://***************.onion/QOSINA/PROOF/Mirror: https://cactus5dqnqkppa5ayckiyk6dttpqwczdqphv5mxh4dkk5ct544q5aad.onion/QOSINA/PROOF/DATA DESCRIPTIONS: Financial documents, employee and executive managers personal data, engineering documents and drawings, QA data, customer information, contracts, etc. 


🕵️ Infostealer activity detected by HudsonRock

Compromised Employees: 0

Compromised Users: 75

Third Party Employee Credentials: 0


External Attack Surface: 4



DNS Records:

The following DNS records were found for the victim's domain.

WHOIS Emails
  • domain.operations web.com
MX Records
  • qosina-com.mail.protection.outlook.com.
TXT Records
  • v=spf1 ip4:47.21.11.177 ip4:47.19.72.187 ip4:47.19.72.145 ip4:47.19.72.151 include:spf.protection.outlook.com include:customers.clickdimensions.com include:spf.emailsignatures365.com include:spf-us.emailsignatures365.com include:_spf.messagegears.net incl" "ude:sendgrid.net -all
  • MS=ms10965230
  • djk6mxlxrsngdcxnrggszv8qfk0qx89h
  • google-site-verification=a5_Q5aLjEvCYWYtURc-Zzl9HiAslO_NQFMC9BhZOLSc
  • 3vqIejfD1NGtr95xQPpPyuiJBTRir97NcDUrGQbNyzCM1pup8T1yYCgmtelHsRJD3a3d52g/8sDJGuRwN3VSQg==
Cloud / SaaS Services Detected
Microsoft 365 SendGrid

Leak Screenshot:

Leak Screenshot