Buy Me a Coffee

Sponsored by Hudson Rock Use Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are impacting your business

Logo www.stginternational.com

Group: dispossessor

Discovered by ransomware.live: 2024-04-19

Estimated attack date: 2022-11-27

Description:

More information in our telegram channel https://t.me/snatch_team Persons responsible for data leakage:Jeff Bell:COOjeff.bell@stginternational.com;Dave Gibson:VP, VP, Operationsdgibson@stginternational.com;Marcia Euwema:VP, VP, Human Resourcesmeuwema@stginternational.com+1 703-578-6030;Elham Ramirez:Director, Director, Clinical, Director, Operationseramirez@stginternational.com+1 207-475-2287;Gina Luna:Deputy Director, Directorgina.luna@stginternational.com;Bruce Hart:Director, Director, Business Developmentbruce.hart@stginternational.com;Preston Carpenter:Directorpcarpenter@stginternational.com+1 661-317-8102;Steven Custer:—steven.custer@stginternational.com+1 512-413-3449;Carlos Ventura:—+1 480-332-7127;Erica Tyler:Directorerica.tyler@stginternational.com;Jean Weightman:Director, Talent


🕵️ Infostealer activity detected by HudsonRock

Compromised Employees: 1

Compromised Users: 1

Third Party Employee Credentials: 1


External Attack Surface: 7



DNS Records:

The following DNS records were found for the victim's domain.

WHOIS Emails
  • abuse godaddy.com
MX Records
  • stginternational-com.mail.protection.outlook.com.
TXT Records
  • v=spf1 include:spf.protection.outlook.com -all
  • logmein-verification-code=668e156b-f5d3-430e-9944-f1d4385d043e
  • ms=10a10915198ac25e6b1dc295abb4499b9be19e79
Cloud / SaaS Services Detected
LogMeIn

Leak Screenshot:

Leak Screenshot