Contact us Buy Me a Coffee

Sponsored by Hudson Rock Use Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are leading to ransomware attacks

Cardinal Services

cardinalservices.org

Group Akira
Discovered 2025-11-19 11:49 UTC
Est. attack date 2025-11-19
Country US
Duplicate Entry
This victim has been identified as a duplicate of another entry in our database. However, this may not always be the case: the same organization can be targeted multiple times by the same or different ransomware groups, which may result in separate legitimate entries. Search for related entries

Description:

Cardinal Services, based in New Iberia, LA, is a leading oilfield service company specializing in land and offshore services. We will upload 90gb of corporate documents soon. Personal employe e files (driver licenses, phones, addresses, emails, credit card details), financials and accounting, contracts and agreements, cl ients' information, incident reports, NDA, etc.

Infostealer activity detected by HudsonRock

Compromised Employees: 0

Compromised Users: 1

Third Party Employee Credentials: 1


External Attack Surface: 1


Infostealer Distribution

DNS Records:

The following DNS records were found for the victim's domain.

WHOIS Emails
  • abusegodaddy.com
MX Records
  • cardinalservices-org.mail.protection.outlook.com. Microsoft 365
TXT Records
  • v=spf1 include:spf.protection.outlook.com ip4:72.11.31.99 ip4:208.64.43.193 include:mainsl-com.spf.smtp25.com Include:spf.constantcontact.com ~all
  • cardinalservices.org. 18000 IN TXT \"v=spf1 include:autotask.net ~all\
  • GC6DK7IIOL._autotask.cardinalservices.org
  • MS=ms14489858
  • knowbe4-site-verification=b2060af81a02c87e8a0ed05fa1310e45
  • apple-domain-verification=To51nDo4zquhzqyt
  • MS=ms52107863
Cloud / SaaS Services Detected
Apple Microsoft 365 KnowBe4