Contact us Buy Me a Coffee

Sponsored by Hudson Rock Use Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are leading to ransomware attacks

BilgeAdam Software

bilgeadam.com

Group Medusa
Discovered 2023-05-29 05:57 UTC
Est. attack date 2023-05-29

Description:

BilgeAdam operates as one of the subsidiaries of BilgeAdam IT Group, founded in 1997. The headquarters of the company, which includes the sts Research Center, subordinate to the Ministry of Industry and Technology, is located at 4 b3 Sarıyer, Istanbul, 34396, Turkey. The main areas of activity are IOT management, automation, communications, network and security. Leak includes their internal source codes and recent live screenshots of their works.

Infostealer activity detected by HudsonRock

Compromised Employees: 121

Compromised Users: 315

Third Party Employee Credentials: 65


External Attack Surface: 145


Infostealer Distribution

DNS Records:

The following DNS records were found for the victim's domain.

WHOIS Emails
  • domain.operationsweb.com
  • dataprotectedmaskeddetails.com
MX Records
  • bilgeadam-com.mail.protection.outlook.com. Microsoft 365
  • backup-mx01.sadecehosting.com.
  • mx.bilgeadam.com.
TXT Records
  • pxkjhluaSIUhrfDe00bZzRSvGaz91C9WNi+sbN6ohJU+SkgTaKtSDX4hG55lLuk8z70BDWr+FCZY3JyBzHKKrQ==
  • v=spf1 ip4:31.145.176.144 a:bilgeadam.com a:opthema.com a:opthemateknoloji.com a:egitimtakvimi.com a:bilgeadamcloud.com a:bgts.com include:spf.protection.outlook.com include:eu.transmail.net include:sendgrid.net -all
  • MS=ms63043525
  • G/fCUXIznRRLJ6ybUMOghJy3sUsG21LKR5NVNtOSsBfpx5J1m3QWV7cJQfjfh24NHkIwc5b2igZza8CyzKimaw==
  • 9t40QsGswVdC7lmKma0wjZdcuEnKqa/HPnZh3WJusuA2F+gEGDQWY+VOO4jBxxUVHcdCgLQ4xQlL5PJSnHR76g==
  • apple-domain-verification=kE4mJcLp8BQ9cZjj
  • google-site-verification=zGdEgnLeNRlCf10Ls4irb8mnXhVz3CjV9Cvjdqu7rPA
  • facebook-domain-verification=lvc8y2akuo5rc5q9bzxjlw8zehqn3k
Cloud / SaaS Services Detected
Apple Microsoft 365 SendGrid

Leak Screenshot:

Leak Screenshot