Contact us Buy Me a Coffee

Sponsored by Hudson Rock Use Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are leading to ransomware attacks

acwapower.com \ https://www.larsentoubro.com/

acwapower.com

Discovered 2026-02-24 03:33 UTC
Est. attack date 2026-02-15
Country SA

Description:

400gb

Infostealer activity detected by HudsonRock

Compromised Employees: 14

Compromised Users: 87

Third Party Employee Credentials: 33


External Attack Surface: 20


Infostealer Distribution

DNS Records:

The following DNS records were found for the victim's domain.

WHOIS Emails
  • domain.operationsweb.com
MX Records
  • alt3.us.email.fireeyecloud.com.
  • primary.us.email.fireeyecloud.com.
  • alt2.us.email.fireeyecloud.com.
  • alt1.us.email.fireeyecloud.com.
TXT Records
  • _fzt8wmmk8lnko9l24wj9g35klwgxmfw
  • threatcop-admin-central-site-verification=H0izKfvEVmPLShFHRf69vw1DhqvL2SmUiMSHBEMk
  • mb58d3jec3s7qg1lbirdh2iids
  • pomk6q5juj63o9ehlbpq0t1v1t
  • Foxit-domain-verification=bf2a20427538a7028e8be32ec01f0b53
  • MS=ms49713424
  • v=spf1 include:spf.protection.outlook.com -all
  • pexip-ms-tenant-domain-verification=1891970e-6d6e-4ef3-8826-79231f5b347c
  • google-site-verification=DlHtNebOCP3pRW8bhZCxS3vO7iIe5eEy9rsoPicRq_A
  • atlassian-domain-verification=X9tbQQfUm1h9gmtW3TNWjse/udFSA30SBe8AHGRl03mmc2FKKEKNTOIje2CHjtHR
  • 5bqr2quk0s57hbpodf70n7gu74
  • J3bojmeQIV5lf5FZA4DYY0yYUoyQPgc+UZ+90zuAUl3j0/2pqhR1kkPLvqsqGtEQgF3IGP26NOL4/vtkGWX5XA==
  • docusign=754e695c-8f1d-4aae-ae61-b8b57a5c3a62
  • google-site-verification=toFoPnVWrv3wLHo3wnTKP9L2IhSvDc62jYkh-XxJj9c
  • cisco-ci-domain-verification=4eb89b4cbaa5a3e55714fc3ad5a15b79c67d0c9394019f68c40bc9423e781ac9
Cloud / SaaS Services Detected
Atlassian Microsoft 365 Cisco DocuSign

Leak Screenshot:

Leak Screenshot