Contact us Buy Me a Coffee

Sponsored by Hudson Rock Use Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are leading to ransomware attacks

Massachusetts Bay Community College

www.massbay.edu

Group Qilin
Discovered 2025-10-07
Est. attack date 2025-10-07
Country US

Description:

Massachusetts Bay Community College is a comprehensive, open-access community college, offering associate degrees and certificate programs. We gave MassBay every opportunity to prevent this publication. We engaged their leadership. Their re ...

Infostealer activity detected by HudsonRock

Compromised Employees: 18

Compromised Users: 74

Third Party Employee Credentials: 43


External Attack Surface: 33


Infostealer Distribution

DNS Records:

The following DNS records were found for the victim's domain.

WHOIS Emails
  • No emails found.
MX Records
  • massbay-edu.mail.eo.outlook.com.
TXT Records
  • c4c16ga8gafv3401cack9s1ael
  • d2vnw87ttft13q6f0n2c842f0pb5hk4z
  • MS=19C824309138B867743B38C04189E33A121D78E7
  • google-site-verification=qz84D0UCR6inRIkIaRVXX7jAu3t5LNdpbtEacFupDSM
  • v=spf1 a:massbay-edu.mail.eo.outlook.com ip4:23.185.0.2 ip4:134.241.90.237 mx:mx.collegenet.com include:spf.protection.outlook.com include:mh.blackboard.com include:outboundmail.blackbaud.net ip4:3.128.236.80" " ip4:3.139.232.78 ip4:3.223.100.88 ip4:34.200.182.36 ip4:54.151.112.86 ip4:50.18.89.44 ip4:54.214.32.131 ip4:129.33.243.30" " ip4:52.35.81.117 ip4:167.89.101.146 ip4:167.89.101.149 ip4:167.89.60.152 ip4:167.89.89.156 ip4:198.21.5.85 include:_spf.explore-blue.com ip4:52.210.155.131 ip4:34.194.230.233 ip4:34.230.107.215 ip4:34.250.203.24 ip4:34.250.117.27" " ip4:52.62.198.211 ip4:52.60.116.9 ip4:52.60.157.49 ip4:150.230.240.226 ip4:52.70.104.58 ip4:35.174.117.211 ip4:51.112.32.123 ip4:3.28.77.232 ip4:52.86.177.169 ip4:168.245.29.173" " ip4:23.21.109.197 ip4:23.21.109.212 ip4:147.160.167.0/26 ip4:69.43.75.0/24 ip4:208.185.229.0/24 ip4:208.185.235.0/24 ip4:148.59.108.0/23 ip4:148.59.106.0/23 ip4:148.59.100.16/28 include:sendgrid.net ~all
  • wh58kjznkjkg78sdgls2r11hktzdmdzq
  • cogi1namr53q9qrakkp87nm4ak
  • MS=ms75412962
  • lp5l4o9mk7c97rrksr2r3nmtv2
  • apple-domain-verification=iqHcVVv7Ve1XXXdg
  • b849flnqe4qpsgmlcc5obf29d5
  • google-site-verification=QAXQhEAkPXr7_OI5eiKX7aXPrFpFjXZgToupJ8o7b1c
  • 4ke86acekeohebrho6m2b8893t
  • ophu735jtdt259s2a60tmncenf
  • icm4n6k48rchfiobt652dscuor
  • 5l4o9mk7c97rrksr2r3nmtv2
  • bo82d4o7u2jesdiag32b6q8t99
  • ly8km3z15sbg0ms7gclv6sns228kcr37
  • rs9OAxGRKziHxtiNQD7S20gnfEvDhLVbLK06VrEGyL5jZUTUpLQby12zLLObCMElfLsHh2s9KcSpIRjRQxbtJQ==
  • facebook-domain-verification=1hhjnjy6l3gm0dbn31914w9yszg0ml
  • oaop09mdchh55grs814ssl0d47
  • google-site-verification=ptY3dFXKwrTy25iSJhpVL7yD__vgeSmtdkBC-KRwqBI
  • cisco-ci-domain-verification=7da6a75ab00b896a8b650295f386f58d72449f05710c282802b52aaaec8ef4e0
Cloud / SaaS Services Detected
Apple Microsoft 365 Cisco SendGrid

Leak Screenshot:

Leak Screenshot