Group:
Clop
Discovered by ransomware.live: 2025-11-21
Estimated attack date:
2025-11-21
Country:
Description:
[AI generated] Macy's.com is the online platform of Macy’s, Inc., one of the premier retailers in the United States. The company offers a range of products such as clothing, accessories, home goods and more from popular brands. It also provides features like online shopping, delivery, returns and customer service. Macy's.com reintroduces the convenience and ease of shopping to the customer's fingertips.
Infostealer activity detected by HudsonRock
Compromised Employees: 46
Compromised Users: 30003
Third Party Employee Credentials: 52
External Attack Surface:
105
DNS Records:
The following DNS records were found for the victim's domain.
- domain.operations@web.com
- mxa-0009cc01.gslb.pphosted.com.
- mxb-0009cc01.gslb.pphosted.com.
- google-site-verification=TYUtXtVkDiCMSc3enxnqX59CLTiDiyNbf1ju8704UA4
- facebook-domain-verification=s7fgjz2obl9y1hphphdm036q3ga6v6
- google-site-verification=k6xLD0gGGFRcQ3I4CmtsnolfXf9nWVoX15vpV35yCDc
- heroku-domain-verification=glbilejlzmvkvey7rlfla324kk/axtyvxjqy/roi
- intersight=c16f14811be1608418c466dcd90c820f49606ddf06802d9924013c9cdf1dae94
- MS=ms42514781
- adobe-idp-site-verification=4e9c2f2bb4cf3e66ef521a195b9b488e69d330fed4b5fe80ac814669d7d9a5f0
- mongodb-site-verification=NBCPowJ9SyFXv4N4PhpsHSuOEwqSrLXE
- mk-org-sso-fd012d70-ee9a-4e99-890b-2a42706d1098
- apple-domain-verification=icRQk9How8pN8hDg
- google-site-verification=59bL16t-JCtZIb-Getjc3eHeDJpeyCyZY-J2c106TZQ
- 3R3unSHIaTa+sMJdJbguCAV82k24b51KSOBavkwB4XWsoHskXgEJepsQogYJJEJIQ7/aRZ0Sfylct+06Hn5Ifw==
- google-site-verification=5db5db4h370L_xTGkZFWTt4DS37jD9MoMNfgbSv3Ht4
- canva-site-verification=B-fhSpcI_i1L4iR4NTMx0g
- onetrust-domain-verification=1eaecbc366724844b5a4c518a537ff16
- extensis-domain-verification=b6a9468c-7909-4925-8f04-d1107de68cfa
- Dynatrace-site-verification=5d4bd67e-319d-44a4-9cd8-313950577e34__e1k39uja672gp7k508hov7jlc3
- autodesk-domain-verification=H1bZGea-auZWjRKqPWeP
- google-site-verification=KvU5y4HxLBHy0Wzr5TlpJzRTjToIThYQJx42gIOY6IM
- omnissa-connect-verification-b7a6ade5-b095-4d16-a27a-ef72c59a8e38
- jamf-site-verification=pVlXCseHAsSJHN-GtFWqtw
- heroku-domain-verification=kdnrhzqtkm4r0ragrwkowsrffoka5sy0xj18q829cu
- google-site-verification=MdnAKx0GkplXggnt9YLd1TQM749yPjTYzl1h7qunc-A
- Value = cisco-ci-domain-verification=1da236168126214530fd9bbd8b4f20dede17dbc4e85d7bba104b7e232289ebbb
- box-domain-verification=98611f08b4ce3abd122895e6883fd760315d1feb5ea684d9f1f1c4da432018c0
- v=spf1 mx ip4:208.15.91.0/24 ip4:208.15.90.0/24 ip4:204.214.48.37 ip4:69.25.227.128/25 ip4:74.217.49.0/25 include:spf-0009cc01.pphosted.com include:mg-spf.greenhouse.io include:spf-a.rnmk.com include:spf.protection.outlook.com include:mailgun.org ~all
- atlassian-domain-verification=SUqM5OsJ3RepnWYwYrJ1QmUY1yFxGUBk26RtbPxvp93m4aH2M85VaX9VwUl9asgm
Cloud / SaaS Services Detected
Adobe
Apple
Atlassian
Microsoft 365
Box
Autodesk
JamF
Mailgun
Cisco
OneTrust
Proofpoint
Leak Screenshot:
Legal Disclaimer:
Ransomware.live does not engage in the acquisition, exfiltration, downloading, possession,
hosting, access, consultation, redistribution, or disclosure of unlawfully obtained data.
This platform indexes only publicly visible information posted by ransomware operators and
open web sources without accessing or obtaining the underlying stolen content.
The service is provided to support public awareness, legitimate research, and cyber-resilience.
No stolen personal or confidential data is collected or distributed via this site.