Group:
Cicada3301
Discovered by ransomware.live: 2024-06-20
Estimated attack date:
2024-06-04
Country:
Description:
The ASST Rhodense, belonging to the ATS of the Metropolitan City of Milan, encompasses the territory and healthcare and social-health facilities of the former ASL Districts of Rho, Garbagnate, and Corsico, as well as the hospital facilities of the former "Guido Salvini" Hospital. Downloads: http://cicadacnft7gcgnveb7wjm6pjpjcjcsugogmlrat7u7pcel3iwb7bhyd.onion/ASST-Rhodense-dataleak1 http://cicadacnft7gcgnveb7wjm6pjpjcjcsugogmlrat7u7pcel3iwb7bhyd.onion/ASST-Rhodense-dataleak2 http://cicadacnft7gcgnveb7wjm6pjpjcjcsugogmlrat7u7pcel3iwb7bhyd.onion/ASST-Rhodense-dataleak3 http://cicadacnft7gcgnveb7wjm6pjpjcjcsugogmlrat7u7pcel3iwb7bhyd.onion/ASST-Rhodense-dataleak4 http://cicadacnft7gcgnveb7wjm6pjpjcjcsugogmlrat7u7pcel3iwb7bhyd.onion/ASST-Rhodense-dataleak5 http://cicadacnft7gcgnveb7wjm6pjpjcjcsugogmlrat7u7pcel3iwb7bhyd.onion/ASST-Rhodense-dataleak6 http://cicadacnft7gcgnveb7wjm6pjpjcjcsugogmlrat7u7pcel3iwb7bhyd.onion/ASST-Rhodense-dataleak7 http://cicadacnft7gcgnveb7wjm6pjpjcjcsugogmlrat7u7pcel3iwb7bhyd.onion/ASST-Rhodense-dataleak8 http://cicadacnft7gcgnveb7wjm6pjpjcjcsugogmlrat7u7pcel3iwb7bhyd.onion/ASST-Rhodense-dataleak9 http://cicadacnft7gcgnveb7wjm6pjpjcjcsugogmlrat7u7pcel3iwb7bhyd.onion/ASST-Rhodense-dataleak10 http://cicadacnft7gcgnveb7wjm6pjpjcjcsugogmlrat7u7pcel3iwb7bhyd.onion/ASST-Rhodense-dataleak12 http://cicadacnft7gcgnveb7wjm6pjpjcjcsugogmlrat7u7pcel3iwb7bhyd.onion/ASST-Rhodense-dataleak13 http://cicadacnft7gcgnveb7wjm6pjpjcjcsugogmlrat7u7pcel3iwb7bhyd.onion/ASST-Rhodense-dataleak14 http://cicadacnft7gcgnveb7wjm6pjpjcjcsugogmlrat7u7pcel3iwb7bhyd.onion/ASST-Rhodense-dataleak15
Infostealer activity detected by HudsonRock
Compromised Employees: 17
Compromised Users: 22
Third Party Employee Credentials: 0
External Attack Surface:
3
DNS Records:
The following DNS records were found for the victim's domain.
- relay02.asst-rhodense.it.
- globalsign-domain-verification=okMtTualtVpow8T6KT8448W6v7iYG1GYEV0PHEVgiF
- v=spf1 ip4:89.96.212.130 ip4:89.96.212.139 ip4:82.149.40.76 ip4:82.149.40.77 ip4:82.149.40.227 ip4:82.149.40.226 include:spf.protection.outlook.com include:_spf.zucchetti.com include:_spf.zucchetti.it -all
- MS=786231A3B97235BD5731285CA176C5FFA56A3A74
- 1EBnQ5TPA4GNYakg+hVhP8oZy3uj+OGk0HRd2+VUmOw=
- google-site-verification=yRvIj1S40IqOeAl8ax-Ggf2kHS2r-OHstGfQjI5XrHU
- hibp-verify=dweb_hfbsfkuthc9zh98qov9ze8iz
- GgUcLgE2i/mdXH7bvbPdYuDYnexCSKVGjyg+BfN/1ttiDBAHmjGtkQOjNXnxUsEx
Cloud / SaaS Services Detected
No well-known cloud or SaaS service detected.
Leak Screenshot:
Legal Disclaimer:
Ransomware.live does not engage in the acquisition, exfiltration, downloading, possession,
hosting, access, consultation, redistribution, or disclosure of unlawfully obtained data.
This platform indexes only publicly visible information posted by ransomware operators and
open web sources without accessing or obtaining the underlying stolen content.
The service is provided to support public awareness, legitimate research, and cyber-resilience.
No stolen personal or confidential data is collected or distributed via this site.