Contact us Buy Me a Coffee

Sponsored by Hudson Rock Use Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are leading to ransomware attacks


Group Kazu
Discovered 2025-12-29
Est. attack date 2025-12-29
Country SA
Data exfiltrated 4.15 TB
Ransom $400 000

Description:

Saudi Icon specializes in design and build solutions, offering a holistic approach to construction and turn-key services. The company caters to a diverse clientele, including hotels, workspaces, restaurants, gyms, and healthcare facilities across Saudi Arabia. With a focus on creativity, functionality, and quality construction, Saudi Icon aims to redefine modern living through thoughtful design and tailored services. Their extensive portfolio showcases significant projects, along with a reputation for delivering high-end fit-out solutions and innovative constructions

Infostealer activity detected by HudsonRock

Compromised Employees: 5

Compromised Users: 0

Third Party Employee Credentials: 27


External Attack Surface: 2


Infostealer Distribution

DNS Records:

The following DNS records were found for the victim's domain.

WHOIS Emails
  • abuse@enom.com
MX Records
  • alt4.aspmx.l.google.com.
  • alt1.aspmx.l.google.com.
  • alt2.aspmx.l.google.com.
  • aspmx.l.google.com.
  • alt3.aspmx.l.google.com.
TXT Records
  • v=spf1 mx a ip4:184.168.115.221 include:_spf.google.com ~all
  • MS=ms88577010
Cloud / SaaS Services Detected
Microsoft 365