Discovered
2024-04-26
Est. attack date
2024-02-13
Country
Description:
VISION: We aspire to be a preferred, promising institution for tertiary and continuing education, contributing to the country and the community with its base in Hong Kong while embracing the world. Mission: To provide education and training opportunities for students with the hope to develop their potential.To offer distinguished professional courses according to social needs and international standards with a strong link to industry. To explore the advancement of education and services for sustainable corporate development. To foster and participate in diversified education and social affairs in Hong Kong on a proactive basis. To nurture competent persons for Hong Kong and the country.
Infostealer activity detected by HudsonRock
Compromised Employees: 0
Compromised Users: 85
Third Party Employee Credentials: 16
External Attack Surface:
19
DNS Records:
The following DNS records were found for the victim's domain.
- mx2.hc1410-72.ap.iphmx.com.
- mx1.hc1410-72.ap.iphmx.com.
- google-site-verification=y1AAfQ1N71wUUMJ-RgeSGWH4WVWbM6g9iLWM0PnNCjw
- 1YDT0p1vmiy+bNE7JrINYPzLdb3Dokw/oolvxVMcJcLtq2mNm5gtW4p7XrCu2iYH4TaBIOhH63ecTAr26ltBlQ==
- KYPA27Z+7eWWFTyfhnIDGvsOSnSEKiIJ5pOxBnWlX8tx9Gy5zRr5oEM0NPAC2ECNisyoeGNt+5psiN55I94tJg==
- vPFo0VGjJ3inysbGvAwmesKKQxrkzwYOBj4TBzO93qhnS41YOo+ph1OpzMi44DGBrHhQsdcI8cUHvXHN1vkBEw==
- atlassian-domain-verification=/HEEiNSoYdMi0D8phtWEj3jaySB6eBZMOKkLN6TndqSCYlhNFMYmA5wd7t5ZFz8D
- v=spf1 mx a exists:%{i}.spf.hc1410-72.ap.iphmx.com include:mh.blackboard.com include:_spf.anpasia.com include:servers.mcsv.net include:spf.protection.outlook.com ip4:113.28.57.161 ip4:113.28.57.162 ip4:113.28.57.176 " "ip4:223.197.32.89 ip4:223.197.32.91 ip4:210.177.250.161 ip4:210.177.250.162 ~all
- MS=ms21404765
- MS=ms52805874
- MS=ms96010384
- 889lr9fv8qwzb7z4l251ylwyg8kxzfxz
- MS=F2F14D43C1C99BDF7817D34AFE565E28C0C6E722
- fortinet-fortiphish-site-verification=zTXwYczh5wqsQkNzGSjZEj
Cloud / SaaS Services Detected
Atlassian
Mailchimp
Microsoft 365
Fortinet
Leak Screenshot:
Legal Disclaimer:
Ransomware.live does not engage in the acquisition, exfiltration, downloading, possession,
hosting, access, consultation, redistribution, or disclosure of unlawfully obtained data.
This platform indexes only publicly visible information posted by ransomware operators and
open web sources without accessing or obtaining the underlying stolen content.
The service is provided to support public awareness, legitimate research, and cyber-resilience.
No stolen personal or confidential data is collected or distributed via this site.