Group:
Qilin
Discovered by ransomware.live: 2025-10-07
Estimated attack date:
2025-10-07
Country:
Description:
Massachusetts Bay Community College is a comprehensive, open-access community college, offering associate degrees and certificate programs.
We gave MassBay every opportunity to prevent this publication. We engaged their leadership. Their re ...
Infostealer activity detected by HudsonRock
Compromised Employees: 18
Compromised Users: 74
Third Party Employee Credentials: 43
External Attack Surface:
33
DNS Records:
The following DNS records were found for the victim's domain.
- massbay-edu.mail.eo.outlook.com.
- cogi1namr53q9qrakkp87nm4ak
- cisco-ci-domain-verification=7da6a75ab00b896a8b650295f386f58d72449f05710c282802b52aaaec8ef4e0
- bo82d4o7u2jesdiag32b6q8t99
- ly8km3z15sbg0ms7gclv6sns228kcr37
- 5l4o9mk7c97rrksr2r3nmtv2
- icm4n6k48rchfiobt652dscuor
- google-site-verification=ptY3dFXKwrTy25iSJhpVL7yD__vgeSmtdkBC-KRwqBI
- ophu735jtdt259s2a60tmncenf
- 4ke86acekeohebrho6m2b8893t
- MS=ms75412962
- MS=19C824309138B867743B38C04189E33A121D78E7
- apple-domain-verification=iqHcVVv7Ve1XXXdg
- wh58kjznkjkg78sdgls2r11hktzdmdzq
- b849flnqe4qpsgmlcc5obf29d5
- google-site-verification=QAXQhEAkPXr7_OI5eiKX7aXPrFpFjXZgToupJ8o7b1c
- d2vnw87ttft13q6f0n2c842f0pb5hk4z
- v=spf1 a:massbay-edu.mail.eo.outlook.com ip4:23.185.0.2 ip4:134.241.90.237 mx:mx.collegenet.com include:spf.protection.outlook.com include:mh.blackboard.com include:outboundmail.blackbaud.net ip4:3.128.236.80" " ip4:3.139.232.78 ip4:3.223.100.88 ip4:34.200.182.36 ip4:54.151.112.86 ip4:50.18.89.44 ip4:54.214.32.131 ip4:129.33.243.30" " ip4:52.35.81.117 ip4:167.89.101.146 ip4:167.89.101.149 ip4:167.89.60.152 ip4:167.89.89.156 ip4:198.21.5.85 include:_spf.explore-blue.com ip4:52.210.155.131 ip4:34.194.230.233 ip4:34.230.107.215 ip4:34.250.203.24 ip4:34.250.117.27" " ip4:52.62.198.211 ip4:52.60.116.9 ip4:52.60.157.49 ip4:150.230.240.226 ip4:52.70.104.58 ip4:35.174.117.211 ip4:51.112.32.123 ip4:3.28.77.232 ip4:52.86.177.169 ip4:168.245.29.173" " ip4:23.21.109.197 ip4:23.21.109.212 ip4:147.160.167.0/26 ip4:69.43.75.0/24 ip4:208.185.229.0/24 ip4:208.185.235.0/24 ip4:148.59.108.0/23 ip4:148.59.106.0/23 ip4:148.59.100.16/28 include:sendgrid.net ~all
- rs9OAxGRKziHxtiNQD7S20gnfEvDhLVbLK06VrEGyL5jZUTUpLQby12zLLObCMElfLsHh2s9KcSpIRjRQxbtJQ==
- facebook-domain-verification=1hhjnjy6l3gm0dbn31914w9yszg0ml
- lp5l4o9mk7c97rrksr2r3nmtv2
- google-site-verification=qz84D0UCR6inRIkIaRVXX7jAu3t5LNdpbtEacFupDSM
- oaop09mdchh55grs814ssl0d47
- c4c16ga8gafv3401cack9s1ael
Cloud / SaaS Services Detected
Apple
Microsoft 365
Cisco
SendGrid
Leak Screenshot:
Legal Disclaimer:
Ransomware.live does not engage in the acquisition, exfiltration, downloading, possession,
hosting, access, consultation, redistribution, or disclosure of unlawfully obtained data.
This platform indexes only publicly visible information posted by ransomware operators and
open web sources without accessing or obtaining the underlying stolen content.
The service is provided to support public awareness, legitimate research, and cyber-resilience.
No stolen personal or confidential data is collected or distributed via this site.