Contact us Buy Me a Coffee

Sponsored by Hudson Rock Use Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are leading to ransomware attacks


Group Chaos
Discovered 2025-03-31 18:26 UTC
Est. attack date 2025-03-31
Country US
Duplicate Entry
This victim has been identified as a duplicate of another entry in our database. However, this may not always be the case: the same organization can be targeted multiple times by the same or different ransomware groups, which may result in separate legitimate entries. Search for related entries

Description:

Founded in 1939 and headquartered in Nashville, Tennessee, TransCore is a company that provides digital solutions and services to transportation departments and agencies around the world. The company provides solutions that aid in the development of express lanes, creating traffic systems, and managing vehicle-to-vehicle programs.

Infostealer activity detected by HudsonRock

Compromised Employees: 0

Compromised Users: 1

Third Party Employee Credentials: 8


External Attack Surface: 6


Infostealer Distribution

DNS Records:

The following DNS records were found for the victim's domain.

WHOIS Emails
  • domain.operationsweb.com
MX Records
  • transcore-com.mail.protection.outlook.com. Microsoft 365
TXT Records
  • atlassian-domain-verification=pLwLWwbHVEAgoBSIaip8UPaBToboIH1XT8HUcLefl35fDLo36uaJQSXjqlgGZze1
  • globalsign-domain-verification=28C71F4CD8F5EB5F75FC10D5AA2AA16E
  • v=spf1 include:sendgrid.net include:spf.sendinblue.com include:spf.protection.outlook.com include:ultipro.com ip4:198.176.39.81/32 ip4:185.41.28.0/22 ip4:94.143.16.0/21 ip4:185.24.144.0/22 ip4:153.92.224.0/19 ip4:213.32.128.0/18 ip4:185.107.232.0/22 ip4:7" "7.32.128.0/18 ip4:77.32.192.0/19 ip4:208.64.205.220/32 ip4:208.64.205.134/32 ip4:70.175.226.205/32 ip4:12.16.45.82/32 ip4:50.229.115.242/32 -all
  • google-site-verification=BwGkK41h438JFdIzskgQtWOOrIH-ib-wYbvflhTD81Q
  • T9leV0zltfvSVJ/aOcjmnejFeFo9tH0IJpHeiWyCOMIrtT5bFs1AaIGBomUChe0C9sF6kxRp9nguTHJgSW3OZA==
  • _jhno39dzplim9sjka0hdgyv50wzpgfq
  • google-site-verification=AUXm_pQ4OXoycjrbt8pEueF5sxr0G3fmso8tfnBQKgE
  • smartsheet-site-validation=jAS8PfRPzOjYVvT6lDwlmNcFdgwv3F6h
  • atlassian-domain-verification=6vvdKPj50j/1FvuD1I0Dd0/WOUw9AHVx25oYhEty7ASLNhmYByTMmFTQLLLNvCkE
  • Sendinblue-code:e55155b5d4857ef583c41fda5800f962
  • 5h96cqe351ciom97uc7kciklf1
  • _4la40so8eig06598xmjxkem4i72ux9h
  • anthropic-domain-verification-bjmx9h=upP6IIvconGJvUc1gMxniHmnH
  • MS=ms32461743
  • Dynatrace-site-verification=beb3ff0c-45a3-48d4-851c-0d98d3ae2581__8ogutbv06r2icjkg90j2nvogua
Cloud / SaaS Services Detected
Atlassian Microsoft 365 Anthropic SendGrid Sendinblue

Leak Screenshot:

Leak Screenshot