Contact us Buy Me a Coffee

Sponsored by Hudson Rock Use Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are leading to ransomware attacks


Group Royal
Discovered 2023-01-17 23:18 UTC
Est. attack date 2023-01-17
Duplicate Entry
This victim has been identified as a duplicate of another entry in our database. However, this may not always be the case: the same organization can be targeted multiple times by the same or different ransomware groups, which may result in separate legitimate entries. Search for related entries

Description:

PROOFPACK - Employee documents \ Finance \ Network structure

Infostealer activity detected by HudsonRock

Compromised Employees: 19

Compromised Users: 30

Third Party Employee Credentials: 21


External Attack Surface: 42


Infostealer Distribution

DNS Records:

The following DNS records were found for the victim's domain.

WHOIS Emails
  • 80143ea59fb9ad69c770a46d8e0a4f2c0dc542585bebb8874d2a2eef226b77d0livingstonintl.com.whoisproxy.org
  • 80143ea59fb9ad69c770a46d8e0a4f2c02d30e8c1f31f5add22315fa542ae2aalivingstonintl.com.whoisproxy.org
  • 80143ea59fb9ad69c770a46d8e0a4f2c7f8c1b0dc07f8a1029ac521be5573356livingstonintl.com.whoisproxy.org
  • trustandsafetysupport.aws.com
  • 80143ea59fb9ad69c770a46d8e0a4f2c479f5439106e05d2529282c6d49d9ba1livingstonintl.com.whoisproxy.org
MX Records
  • us-smtp-inbound-2.mimecast.com. Mimecast
  • us-smtp-inbound-1.mimecast.com. Mimecast
TXT Records
  • amazonses:z7374mLfHky2AtjyCjflswSGmW1ZYewgb5Ri0Q16aEw=
  • amazonses:iOvBGSSLDHR+AJLqU5VSy62Tgan6eSv/IP1JEaFxhrs=
  • v=spf1 mx include:spfip.livingstonintl.com include:spfip2.livingstonintl.com include:eu._netblocks.mimecast.com include:us._netblocks.mimecast.com include:_spf-dc4.sapsf.com include:aspmx.pardot.com -all
  • pardot_38122_*=893ab635ac391f66d216f38b6cd164502b9d25766b0978c3830e5a2d78ca6504
  • sending_domain38122=1904465bc24958eb73f9a65e13d52f991cbf15a073614fcc7e80092293b80a94
  • amazonses:5wl/EG+h1B49GJvAqlDf2nhMF5t1MlYnqzHuz9LpJgs=
  • pardot_38122_*=7a5d63d3bbecc6d6f324c45d74d91a0d089c29bb0c96f58833eab0c6d09a716c
  • google-site-verification=odrJF-15qDfwlwVwsVOsDJwv_lxtW_gQnkrZn3cpBWg
  • amazonses:ELksp7B/sIZGAYdd84uDAbDlKP2+zvfNlWoU45ObfYs=
  • amazonses:TGKj55vi9oS0n0iI24aVMg4FOMyNE1j4cy5KfBPJtoM=
  • google-site-verification=ijMUtfLm0pRSGgU-xLCOZqrGy2LfQt_o6sW206dpJRU
  • amazonses:n6EV3y4MLlcl/3V7hG8bp6f6XuTf+Pe9NvbQt8DFHto=
  • _globalsign-domain-verification=WiQJNhzMYfSN3aBc_rPXDHwsMxXs7wXTDrCSqD2oH1
  • amazonses:A1YTFyy26l1Z7wWEcKKJQQs9U+vG5CCPyLA8csaJLDw=
  • 8vgh839jd4anb8d0v739hhkkq5
  • qpens4v9i3msl8mqrcafscontb
  • miro-verification=2e90076773bb734c8f2a6367a3b56d2a2b98023d
  • cAfad/kH/O+W2ryitTpkgCQjQHxDC9QaJDiozEnkNSz0aimaT1CAlnTa80m1npE+9ib/xOLTHp4zZdRiKYoFJQ==
  • cisco-ci-domain-verification=31a85ab1a0a933f58663e31304613a0b8d88e66dddd91a6f393c56a4c07d91cd
Cloud / SaaS Services Detected
Amazon SES/WorkMail Global Sign Miro Cisco Mimecast