Contact us Buy Me a Coffee

Sponsored by Hudson Rock Use Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are leading to ransomware attacks

grupocadarso.com

grupocadarso.com

Discovered 2024-05-21
Est. attack date 2024-05-04
Country PT

Description:

Grupo Cadarso is a family company founded in 1948 by Mr. Antonio Cadarso. Initially focused on distributing watches and jewelry, the company has evolved to encompass two main business sectors: Watchmaking and Hospitality. In the Watchmaking sector, Grupo Cadarso distributes a selection of prestigious international brands in Spain, Portugal, and Andorra, emphasizing quality service and modernization to lead the sector. The Hospitality sector, under the Condes Hotels brand, includes landmark hotels like Hotel Condes and Hotel España, with a notable addition being the Monument Hotel, home to the acclaimed Lasarte restaurant with 3 Michelin stars. Additionally, Grupo Cadarso owns companies like Eurochrono, specializing in fashionable watches, and Gears, a watchmaking company operating in the Spanish market.SITE: www.grupocadarso.com Address : 35 Avenida Marquês De Tomar 5º Lisbon, Lisbon, 1050 153 PortugalALL DATA SIZE: ≈570gb 1. Corporate data, Group data 2. Personal users data, personal documents, Client data 3. Financial documents, confidential data & etc…

Infostealer activity detected by HudsonRock

Compromised Employees: 0

Compromised Users: 10

Third Party Employee Credentials: 0


External Attack Surface: 0


DNS Records:

The following DNS records were found for the victim's domain.

WHOIS Emails
  • abuse@cdmon.com
MX Records
  • grupocadarso-com.mail.protection.outlook.com.
TXT Records
  • Tt7jccUCRaT4ljoNfbh7UNixtKNnVh97l2iUGdbEZ4Q
  • v=spf1 ip4:62.97.113.62 ip4:46.231.3.250 ip4:40.68.150.178 ip4:5.153.54.50 include:spf.protection.outlook.com include:spf.portalempleado.net include:spf.a3equipo.com include:email.freshservice.com ~all
  • GTdibBCOCFPFYeTqZaPqnqxNR8QkmfNN2QvJTVuw7X4
  • 5UG0hFnuvA-wBmFngcRrweiHzcykEzAdYrCpY33rrxc
  • npBmwuGZFUQWVJ86Q7oORMabNcue4jD2lWJhuFyD7hE
  • mK1CuWmZYtuLFqJJ1WlAD6SMS3ly72YEvpWLPBo3ObQ
  • u0022openaiu002Ddomainu002Dverificationu003Ddvu002D6T6qneO7QkWK9V8YFHhCNPYiu0022u007Cu007Cu0022proxyu002Dsslu002Ewebflowu002Ecomu0022u007Cu007Cu0022klaviyou002Dsiteu002Dverificationu003DVWVPLju0022u007Cu007Cu0022vu003Dspf1u0020ip4u003A62u002E97u002E113u00" "2E62u0020ip4u003A46u002E231u002E3u002E250u0020ip4u003A40u002E68u002E150u002E178u0020u0020ip4u003A5u002E153u002E54u002E50u0020ip4u003A46u002E16u002E58u002E18u0020includeu003Aspfu002Eprotectionu002Eoutlooku002Ecomu0020includeu003Aspfu002Eportalempleadou002E" "netu0020includeu003Aspfu002Ea3equipou002Ecomu0020includeu003Aemailu002Efreshserviceu002Ecomu0020includeu003Au005Fspfu002Esrvu002Ecatu0020u007Eallu0022u007Cu007Cu0022includeu003Aspfu002Duku002Eemailsignatures365u002Ecomu0022u007Cu007Cu0022i4HPoX8mbkPK4J3N8" "amnjGAJaZSyCiclY0l7VnRRpcYu0022u007Cu007Cu0022googleu002Dsiteu002Dverificationu003DTsx0dwGsQIK6Qgq8BaFL1ibuEZv9u002DYO6u002Depu002D2VKu002Du005FDYu0022u007Cu007Cu0022VVokw5F8ex0Ig3Z4NxDVXF8bjLr3VWfwJoYFE0qmScMu0022u007Cu007Cu0022RZTiHAfclXXkVJFQlwu005Fw4S" "nFlRnu005Fk7cLPNdT6u002DUru005FnUu0022u007Cu007Cu00229fpb0usteap2nqbkv5gdepre4hu0022
  • d4Ym17UUZ3etSDsv9zlRhbA6Pj33_mRwKax1Pyi4m2Y
Cloud / SaaS Services Detected
No well-known cloud or SaaS service detected.

Leak Screenshot:

Leak Screenshot