Contact us Buy Me a Coffee

Sponsored by Hudson Rock Use Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are leading to ransomware attacks

Liberty Lines

libertylines.com

Group Royal
Discovered 2023-03-15 19:15 UTC
Est. attack date 2023-03-15
Duplicate Entry
This victim has been identified as a duplicate of another entry in our database. However, this may not always be the case: the same organization can be targeted multiple times by the same or different ransomware groups, which may result in separate legitimate entries. Search for related entries

Description:

For over 60 years Liberty Lines has been privileged to develop and operate one of the most effective and efficient Transit systems in the country. Today Liberty operates over 300 vehicles on 60 routes and carries almost 30 million passenger over 10 million miles annually. We believe our 700 union and non-union employees are the best transit workers in America. Our employees are our greatest asset and earn excellent wages, health and pension benefits. The Liberty workforce is foundational to the local economy.Since its meager beginnings in 1953 as a 4 vehicle operation, Liberty Lines has grown through merger and acquisition to become one of the largest privately owned transportation companies in New York State. Today, the company, which is headquarted in Yonkers, operates out of 2 state of the art facilities, employing approximately 610 union and 140 non-union employees and operating a fleet of 350 vehicles from 25 foot passenger vans, to 60 foot articulated and hybrid buses.

DNS Records:

The following DNS records were found for the victim's domain.

WHOIS Emails
  • domain.operationsweb.com
MX Records
  • libertylines-com.mail.protection.outlook.com. Microsoft 365
TXT Records
  • v=DMARC1; p=quarantine; rua=mailto:Nnegron@libertylines.com; ruf=mailto:Nnegron@libertylines.com; sp=quarantine; aspf=s; adkim=s;
  • i3aufo3mhbuupec2e917c15v2v
  • MS=ms22763197
  • sophos-domain-verification=670530234b81c5bd9940dc049daa01eebb007d9d84f68c839fe484df4414e240
  • MS=503A07B6DD2B7DF6363FC81A8DEE851A0D13D475
  • v=spf1 include:spf.protection.outlook.com -all
Cloud / SaaS Services Detected
Microsoft 365 Sophos

Leak Screenshot:

Leak Screenshot