Contact us Buy Me a Coffee

Sponsored by Hudson Rock Use Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are leading to ransomware attacks

https://daricon.com/ (military US/CA/NATO)

daricon.com

Discovered 2026-02-26 21:29 UTC
Est. attack date 2026-02-25
Country US
Duplicate Entry
This victim has been identified as a duplicate of another entry in our database. However, this may not always be the case: the same organization can be targeted multiple times by the same or different ransomware groups, which may result in separate legitimate entries. Search for related entries

Description:

400 GB of data, correspondence with NATO and US Army employees, confidential documents, signatures of NATO generals, their passport addresses, shipments to various countries, photos and videos, drawings, personal data, emails of employees of various US and NATO armies, numerous files, phone numbers, personal data, contracts with the Canadian and US Army, documentation on other companies involved in oil in Iraq, Uganda, and elsewhere.

Infostealer activity detected by HudsonRock

Compromised Employees: 0

Compromised Users: 0

Third Party Employee Credentials: 2


External Attack Surface: 0


DNS Records:

The following DNS records were found for the victim's domain.

WHOIS Emails
  • abusegodaddy.com
MX Records
  • daricon-com.mail.protection.outlook.com. Microsoft 365
TXT Records
  • v=verifydomain MS=1540912
  • MS=LAP-654-YW9
  • v=spf1 include:spf.protection.outlook.com -all
  • MS=YJ3-WQ4-RU7
Cloud / SaaS Services Detected
Microsoft 365

Leak Screenshot:

Leak Screenshot