Contact us Buy Me a Coffee

Sponsored by Hudson Rock Use Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are leading to ransomware attacks


Discovered 2023-04-15 18:51 UTC
Est. attack date 2023-04-15
Duplicate Entry
This victim has been identified as a duplicate of another entry in our database. However, this may not always be the case: the same organization can be targeted multiple times by the same or different ransomware groups, which may result in separate legitimate entries. Search for related entries

Description:

Founded in 1976, CommScope Holding provides infrastructure solutions for communications networks worldwide. We design, manufacture, install and support the hardware infrastructure and software intelligence that enable our digital society to interact and thrive.

Infostealer activity detected by HudsonRock

Compromised Employees: 123

Compromised Users: 1671

Third Party Employee Credentials: 134


External Attack Surface: 135


Infostealer Distribution

DNS Records:

The following DNS records were found for the victim's domain.

WHOIS Emails
  • infodomain-contact.org
  • abusereportkey-systems.net
  • abusekey-systems.net
MX Records
  • commscope-com.mail.protection.outlook.com. Microsoft 365
TXT Records
  • google-site-verification=PMZugafn3Q9Due8seBDm1-3tj3Ogo7_9E2mEVih1eyI
  • onetrust-domain-verification=03116978d8bc4bada899d48ff625651e
  • google-site-verification=MSB3bP7XfzcH6q15AcOtfKgt_j6lUhlB-TG0VpR3aSA
  • atlassian-domain-verification=QgwrDREPjcQSBDWyVeNZItw2gTzTjj8H/dHJ/oGhvPksi4kJHfdtug2OE1Ox5mnX
  • flexera-domain-verification-kmnujnviwqldpqvl
  • atlassian-domain-verification=vbZxSZbfL7IBKY37byDVydGBufemK3SC8CUEZZNZQ2gQTiBfqrGFZDaE83KoVuNm
  • pardot10832=01fd0f57f2dd693ea80b3bfa892e078604f306fd0e9a3fa61e0b58706ffb3241
  • ciscocidomainverification=74407ecd95ce5557166f7765cf6e97f6c05a0a6e3c1aefba188b74201275af31
  • v=spf1 exists:%{i}.spf.commscope.iphmx.com ip4:198.135.207.215 ip4:198.135.207.230 ip4:198.135.207.129 ip4:50.31.39.13 ip4:198.135.207.143 ip4:198.135.207.142 ip4:198.135.207.141 ip4:198.90.68.141 ip4:" "198.90.68.142 ip4:198.90.68.143 ip4:35.169.254.90 include:_spf-sfdc.successfactors.com include:_spf-dc4.sapsf.com include:spf.protection.outlook.com include:spf_s1.oraclecloud.com include:" "_spf.centercode.com include:_spf.salesforce.com include:mktomail.com a:mailers.dovetailnow.com -all include:everbridge.net -all
  • webexdomainverification.PIIB=20867f1c-0cbe-40a2-8010-910c5f2b5d96
  • MS=ms69617143
  • atlassian-domain-verification=/GZ0fVTUPUbCObbnsQ8JADhKwTNMbT0abfvw9t76kb7T4cKsS3KT8MWRGdPShTYe
  • cursor-domain-verification-ez8qjx=mPzwmiu3a4UFZOHeUoGcXc5wa
  • atlassian-domain-verification=8S32IcMkSKZjwpI6DyZonbBHcExVH0jo3UkBU64cHX9/yiLTtMGhSd1hh1o9bX5a
  • facebook-domain-verification=nsyxzs7mn9iew4oqpnh04yf4unkgl2
  • atlassian-domain-verification=DceYCRj5cvoThkBuS7m/C6IsNfQDBHCdJykDfy65SNxNh9XbeHVQ9pqycNRogZMc
  • 8Y4thBkF/kNfH4NSC3u5kI+RHzMLKI/kD46qebJiiidGQBK5mxpFsqcNo/mFJHQx7oK3a8opQLNbZ+l9SU7SEw==
  • apple-domain-verification=YuDCZ9G7ByFQb8Kc
  • adobe-idp-site-verification=387d4a3262da97c421718bfc5fb2f3f7c3d3523efba0183d8cfd225a626d5f05
  • amazonses:MJLjG6lyhy+nlYJ1wcskZEsOla2ylLyYsLQuVXgIx8Q="
  • h1-domain-verification=4Crpdj8epp6k6qYTLPtCgxvNMZt7NmhF5bAppCcfRgnjC6qm
  • OLDMS=ms48881096
  • successfactors-site-verification=YTcyYmE2OTBlNTAwMDY4ZTE0ZWYyNWZjOTJjMWM1N2U3NmY5YmUwMzlhYTQ0YzcyZmJiODYxMGY1ZjNlZmNjYg==
  • dtm-domain-verification=qbtEdFpHJuVXIuuYLs2NG93W_s09_kPHKjR11cCo8tc
  • quickbase-site-verification-61fd00168d6f70cad1014f8f84aa65433be2c5a1
  • successfactors-site-verification=Njk4MjY0OWYxZDQ1ZGYxZTE1YTIzNWMwM2RmN2Y0OTdhYTZhMGMyYTVkNTI2MTY5M2RjOTc5NTk1ZWRhODFlNQ==
  • onetrust-domain-verification=b3b97587ea284fc8a7ef1736bc4c5d97
  • smartsheet-site-validation=oUk9qqZ9JAS27wSSBiiN-8W0aOpYuYKw
Cloud / SaaS Services Detected
Adobe Apple Atlassian Amazon SES/WorkMail Microsoft 365 Salesforce Marketo Flexera OneTrust Cisco Webex

Leak Screenshot:

Leak Screenshot