Contact us Buy Me a Coffee

Sponsored by Hudson Rock Use Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are leading to ransomware attacks

www.sicoob.com.br

sicoob.com.br

Discovered 2024-06-24 15:34 UTC
Est. attack date 2024-06-01
Country BR
Duplicate Entry
This victim has been identified as a duplicate of another entry in our database. However, this may not always be the case: the same organization can be targeted multiple times by the same or different ransomware groups, which may result in separate legitimate entries. Search for related entries

Infostealer activity detected by HudsonRock

Compromised Employees: 18

Compromised Users: 775

Third Party Employee Credentials: 112


External Attack Surface: 6


DNS Records:

The following DNS records were found for the victim's domain.

WHOIS Emails
  • No emails found.
MX Records
  • sicoob-com-br.mail.protection.outlook.com. Microsoft 365
TXT Records
  • v=spf1 mx ip4:191.242.202.203 ip4:187.72.5.131 ip4:201.24.25.212 ip4:191.242.203.78 ip4:191.242.202.105" " ip4:216.218.133.192/26 ip4:189.74.157.205/31 ip4:187.72.5.209 ip4:187.72.5.210 ip4:187.72.5.196" " ip4:177.53.253.176/30 ip4:177.53.249.177 ip4:189.74.157.224/28 ip4:177.53.251.179" " ip4:177.53.249.179 ip4:177.53.249.110 ip4:177.53.251.110 ip4:177.53.253.110" " include:spf.protection.outlook.com include:cust-spf.exacttarget.com" " include:email-messaging.com include:_spf.elasticemail.com -all
  • ms-domain-verification=87ad4315-9315-41c5-86e2-82abfe0b6055
  • mn+m+q6qpOeaEz4CsrC+50elokYASlyu2EAQrDmlgeKiLpPB4zP10NHpPw5r+qPmBv3bKbwxxCSe6sXbK2SrCQ==
  • google-site-verification=T3a4aWHruWgaq-tS_J-HMkzLM3nytPMiypBbRx9ruA0
  • Dynatrace-site-verification=cff0b246-330d-4d57-9124-4f658faf5f60__hlgkt01j8vm5u3kqr3h1tvkr86
  • samsung-domain-verification=20750886-6383-4281-9b46-972236023295
  • JV1UMHYN6WXMOFQD44226KKLWHGIKOWXE0S6LJN9
  • figma-domain-verification=6fe0ca4d6e7e0a48dde5ffd04a20a7f5e034725fda6d1ef3c20e84f5d9b4a3e9-1775134976
  • cloudflare_dashboard_sso=86bf4b4494998bc1439bd990e92cbf8f
  • 6s3XyDQICQKLd3vtChu9BSEXti9pry5LcrEvrfiG/jpwWAUNqhL6+znyofmZXKJaqrqb0E6LtvloivebREXnRg==
  • atlassian-domain-verification=qY4UaYIxKFc5yWXa1MjnblNcEwM6CnZMqjN/uNi0MGVlbfbKQSWRKq3cp12jgjj5
  • sophos-domain-verification=316373c8524a14a50c06f4d48a9332e6e22d2882ee23b0aa1a753e95db32ed56
  • apple-domain-verification=heio56kpp4GMRkYZ
  • KVukGvAu/j2FEFvkLV6O2bhk3598YEWJljun291TDcwR6OsnIHxaC3vnhx4ZL5S15ptSdd+yGMmtX42UEU7osw==
  • google-gws-recovery-domain-verification=65335563
  • figma-domain-verification=6564afffede7c5b02328cebf1eeb40b3a759f1f9a274d1ed47bbbe1388b00651-1774636356
  • knowbe4-site-verification=9349897150601012306677e2407b9dec
  • google-site-verification=PoeafmsOmPkcCyChYDjlMbiWnmdhoLWz4_OQnyuuCk8
Cloud / SaaS Services Detected
Apple Atlassian KnowBe4 Sophos

Leak Screenshot:

Leak Screenshot