Contact us Buy Me a Coffee

Sponsored by Hudson Rock Use Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are leading to ransomware attacks

www.campbell.edu

www.campbell.edu

Group: Incransom

Discovered by ransomware.live: 2026-04-11

Estimated attack date: 2026-04-11

Country: US

Description:

In the university data leak, there will be incidents related to teachers' pedophilia, sexual abuse of students by other students, drug use, personal data, military recruitment of students, and other things 500gb

Infostealer activity detected by HudsonRock

Compromised Employees: 1

Compromised Users: 55

Third Party Employee Credentials: 50


External Attack Surface: 40


Infostealer Distribution


DNS Records:

The following DNS records were found for the victim's domain.

WHOIS Emails
  • No emails found.
MX Records
  • my-mx.email-protect.gosecure.net.
TXT Records
  • 20230622-2903._domainkey.campbell.edu
  • google-site-verification=ycswJvkQn_D23jln0vPGjgfVzwd9AQArPv-oPCB1Dvc
  • apple-domain-verification=4S5hNiQQioRGUYeZ
  • d365mktkey=3bPhzelmM3MCdfv7XbxJNTyrJ3Xtx49NkIxsQoDKuGQx
  • v=spf1 mx ip4:52.45.50.190 ip4:54.146.129.215 ip4:152.38.30.0/24 ip4:152.38.17.1 ip4:152.38.16.3 ip4:152.38.11.6 ip4:152.38.26.0/26 ip4:152.46.13.192/27 ip4:165.193.85.0/24 ip4:165.193.255.0/24 ip4:52.151.81.28" " ip4:52.151.82.179 ip4:54.79.48.180 ip4:199.255.192.0/22 ip4:199.127.232.0/22" " ip4:54.240.0.0/18 ip4:69.169.224.0/20 ip4:168.245.0.0/17 ip4:149.72.0.0/16 ip4:167.89.94.133 ip4:69.196.241.0/28 ip4:69.196.242.128/28" " ip4:46.183.242.192/28 ip4:202.38.144.192/28 ip4:69.196.236.208/28 ip4:46.183.247.0/28 ip4:103.225.232.128/28 include:spf.protection.outlook.com ~all
  • +RUjNiqgTO7WBpqzcknN21BJoPntXivQ8qO5h629VhYd9/1OJfWgSfDQl2WP6B6O4iup39UajMNaPLoCb03m4A==
  • d365mktkey=mOrhxGMfUVxwZioa407kpWNCfoGp7MGNkjypOuMcudMx
  • Foxit-domain-verification=e4c191db93b19f9ce0037c82cf73576a
  • e2ma-verification=1ssgb
  • d365mktkey=1qng6ivecycs58uck5az0i9kw
  • cisco-ci-domain-verification=54cd198d9d13a19bf89ea779787c6568a3d38c9dd7b6f469092eafbd22127e11
  • +z0cUq0qsWwktR6wNKVTPOEop3yzQq1Xo874YAFIvFoCaW3K8ufQOTTe2zH8Ysq0Qj1su9Xey5BBWfHtYDlqlOw==
  • d365mktkey=3ue8ef40pfbll2md5l7d8nvb4
  • webexdomainverification.J8X7=ca48e9ae-deba-46cc-9db5-44b7dcf6af28
  • z0cUq0qsWwktR6wNKVTPOEop3yzQq1Xo874YAFIvFoCaW3K8ufQOTTe2zH8Ysq0Qj1su9Xey5BBWfHtYDlqlOw==
  • MS=F183A53B97A703C01DCCFC6D0274F5A861BC4AFC
  • ARSWVW2w4AD5RTnNvlGsMOLmUnwYuJQKAnS3kTi6bEwLRc8wwYjfv5Ddr1ZfeDXLj/XhRwByY2eq7fYP7MZvRH7FFZxirGKDA0+
Cloud / SaaS Services Detected
Apple Cisco Cisco Webex

Leak Screenshot:

Leak Screenshot