Contact us Buy Me a Coffee

Sponsored by Hudson Rock Use Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are leading to ransomware attacks

Crescent Point Energy

hkct.edu.hk/

Discovered 2024-05-10 16:29 UTC
Est. attack date 2024-04-23
Country US
Duplicate Entry
This victim has been identified as a duplicate of another entry in our database. However, this may not always be the case: the same organization can be targeted multiple times by the same or different ransomware groups, which may result in separate legitimate entries. Search for related entries

Description:

Crescent Point Energy is a leading North American oil producer focused on the development of high-return resource plays. Based in Calgary, Alberta, we aim to create value for our shareholders by advancing our asset base through exceptional operational performance centered on safety, costs and the environment.

Infostealer activity detected by HudsonRock

Compromised Employees: 4

Compromised Users: 115

Third Party Employee Credentials: 37


External Attack Surface: 25


Infostealer Distribution

DNS Records:

The following DNS records were found for the victim's domain.

WHOIS Emails
  • No emails found.
MX Records
  • mx1.hc1410-72.ap.iphmx.com. Cisco/IronPort
  • mx2.hc1410-72.ap.iphmx.com. Cisco/IronPort
TXT Records
  • atlassian-domain-verification=/HEEiNSoYdMi0D8phtWEj3jaySB6eBZMOKkLN6TndqSCYlhNFMYmA5wd7t5ZFz8D
  • MS=ms96010384
  • MS=ms52805874
  • MS=ms21404765
  • MS=F2F14D43C1C99BDF7817D34AFE565E28C0C6E722
  • KYPA27Z+7eWWFTyfhnIDGvsOSnSEKiIJ5pOxBnWlX8tx9Gy5zRr5oEM0NPAC2ECNisyoeGNt+5psiN55I94tJg==
  • 889lr9fv8qwzb7z4l251ylwyg8kxzfxz
  • 1YDT0p1vmiy+bNE7JrINYPzLdb3Dokw/oolvxVMcJcLtq2mNm5gtW4p7XrCu2iYH4TaBIOhH63ecTAr26ltBlQ==
  • v=spf1 mx a exists:%{i}.spf.hc1410-72.ap.iphmx.com include:mh.blackboard.com include:_spf.anpasia.com include:servers.mcsv.net include:spf.protection.outlook.com ip4:113.28.57.161 ip4:113.28.57.162 ip4:113.28.57.176 " "ip4:223.197.32.89 ip4:223.197.32.91 ip4:210.177.250.161 ip4:210.177.250.162 ~all
  • vPFo0VGjJ3inysbGvAwmesKKQxrkzwYOBj4TBzO93qhnS41YOo+ph1OpzMi44DGBrHhQsdcI8cUHvXHN1vkBEw==
  • google-site-verification=y1AAfQ1N71wUUMJ-RgeSGWH4WVWbM6g9iLWM0PnNCjw
  • fortinet-fortiphish-site-verification=zTXwYczh5wqsQkNzGSjZEj
Cloud / SaaS Services Detected
Atlassian Mailchimp Microsoft 365 Fortinet

Leak Screenshot:

Leak Screenshot