Group:
Coinbasecartel
Discovered by ransomware.live: 2026-03-11
Estimated attack date:
2023-12-09
Country:
Description:
[AI generated] Staples, Inc. is an American office retail company primarily involved in the sale of office supplies and related products through retail channels and business-to-business (B2B) oriented delivery operations. Its offerings include promo products, IT consulting, office furniture, printing services, and more. Its headquarters are located in Framingham, Massachusetts.
Infostealer activity detected by HudsonRock
Compromised Employees: 61
Compromised Users: 11853
Third Party Employee Credentials: 47
External Attack Surface:
134
DNS Records:
The following DNS records were found for the victim's domain.
- DomainMgmt@staples.com
- whoisrequest@markmonitor.com
- abusecomplaints@markmonitor.com
- staples-com.mail.protection.outlook.com.
- google-site-verification=A8Kpnqq1dAZ7Iap5jLigDXmHLBaGXaj4KhHqRmjKjvU
- 7p9akpclet7mc8gvbmm80n3f8n
- ms-domain-verification=b3c3e44a-3919-4d9b-9efb-dbad999431cd
- amazonses:0GCovhqsj2m1AHwLLQ5A2SsrWtwrq5oOPZsCth7jIgY=
- ms-domain-verification=e7b8e597-0905-4a4f-ad55-19f9781f6edc
- google-site-verification=5wqkn7BGLtMaVtYpCcgYLMhrWi-QHiV57H1hWaHEzFc
- google-site-verification=yZd0Szxyxd-3mMYGnURr-fe-tldKU4_860s8sgyGV0c
- adobe-idp-site-verification=fbda9ca8c5716bf94225e724e4d44e30436cd25da832155c6ab8078db9c18df8
- agjIAT4SU00krkV4IN68ZG92zZ1JzUJFVwQDzXP4r+lVW0bCjYBykdIdpCbnp8i3Bkerp6uzl9xzD+Lmo7PZGQ==
- atlassian-domain-verification=uNKqekYuTKNDQU9EESNehZ/VRecm76FwuMDyhG2NJfWz1dw4WzyA6maCFoaNId2s
- 21mJZj94RpY9ru771bo4qw7y+d+heOh8OvnqFkgY/f9alXs3dloSBfpt7N+vRKJ278b2dt3BdJFSxd1BXxXamg==
- apple-domain-verification=c5L8jJv_soGpWFBgpR7wfgLsLlBMXtWs0xU-bDkhJlo
- atlassian-domain-verification=lOCbww2AdXejcD7Fq/XLad1pD9NauUY4XpkAvalfWe/4MzIwxYKcOYsOgIRxD3/5
- zoho-verification=zb80401133.zmverify.zoho.in
- lucid-verification=NDN.ene8cug3jxw4hgz
- jetbrains-domain-verification=3e0s7c4q4rdiab2rq3b6swwjf
- twilio-domain-verification=54645d3ebf142510f132feab15fc9dc6
- cisco-ci-domain-verification=281db19da445588bf1613c9522f7b89076193f97d656c014d9b3cfee87f4fd7f
- v=spf1 include:%{i}._ip.%{h}._ehlo.%{d}._spf.vali.email include:zeptomail.net.in include:mktomail.com ~all
- jamf-site-verification=m8KReNlR83vnPxYrXFTuFA
- google-site-verification=PYm5FVOrSR1cg40mwv62oJ9wViLj1FqPZTpwx8xISL4
- 5q294ul4ut480lfvqunov4oi72
- globalsign-domain-verification=DyhW6l8hxNEE1ZG-CYKNeBEsbrEmnfu4_FuGNkRGvK
Cloud / SaaS Services Detected
Adobe
Apple
Atlassian
Amazon SES/WorkMail
Twilio
Marketo
JamF
Zoho Campaigns
Cisco
Leak Screenshot:
Legal Disclaimer:
Ransomware.live does not engage in the acquisition, exfiltration, downloading, possession,
hosting, access, consultation, redistribution, or disclosure of unlawfully obtained data.
This platform indexes only publicly visible information posted by ransomware operators and
open web sources without accessing or obtaining the underlying stolen content.
The service is provided to support public awareness, legitimate research, and cyber-resilience.
No stolen personal or confidential data is collected or distributed via this site.