Discovered
2023-07-26
Est. attack date
2022-10-31
Description:
More than 900 gigabytes of sensitive data on your network were DOWNLOADED. Data includes: - Employees personal data, CVs, DL, SSN. - Complete network map including credentials for local and remote services. - Private financial information including: client's data, bills, budgets, annual reports, bank statements. - Manufacturing documents including: datagrams, schemas, drawings in solid works format - And more...
DNS Records:
The following DNS records were found for the victim's domain.
- bosselmanenergy-com.mail.protection.outlook.com.
- sophos-domain-verification=0fd53cec174309fe07fddad7bec3200464271e66
- sophos-domain-verification=3ca25c6966584938b744200155fb58aa3f1c71bc4156358c51ec01af22aba60f
- google-site-verification=Fs2PwGEpkCIE8D-68W60qnQzFg7b_z-OLZ8qBEB9UJ0
- MS=890EAD17E14A061395AAB60B0E7FACCF1B9F1083
- v=spf1 ip4:71.8.249.52 ip4:72.46.54.18 include:spf.protection.outlook.com include:_spf.prod.hydra.sophos.com include:_spf.hosting.cdkglobal.com ~all
Cloud / SaaS Services Detected
Sophos
Leak Screenshot:
Legal Disclaimer:
Ransomware.live does not engage in the acquisition, exfiltration, downloading, possession,
hosting, access, consultation, redistribution, or disclosure of unlawfully obtained data.
This platform indexes only publicly visible information posted by ransomware operators and
open web sources without accessing or obtaining the underlying stolen content.
The service is provided to support public awareness, legitimate research, and cyber-resilience.
No stolen personal or confidential data is collected or distributed via this site.