Contact us Buy Me a Coffee

Sponsored by Hudson Rock Use Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are leading to ransomware attacks


Discovered 2026-02-06 18:36 UTC
Est. attack date 2026-01-30
Country FR
Duplicate Entry
This victim has been identified as a duplicate of another entry in our database. However, this may not always be the case: the same organization can be targeted multiple times by the same or different ransomware groups, which may result in separate legitimate entries. Search for related entries

Description:

trace.tv zoominfo.com/c/trace/138903628 TRACE FR is a leading platform for news related to people, music, lifestyle, entertainment, and urban and Afro-urban cultures. The company offers a variety of services including TV channels, radio stations, and mobile applications that cater to diverse audiences. TRACE FR targets clients interested in contemporary culture, music, and lifestyle trends, particularly within the African and urban communities.

Infostealer activity detected by HudsonRock

Compromised Employees: 0

Compromised Users: 919

Third Party Employee Credentials: 18


External Attack Surface: 24


Infostealer Distribution

DNS Records:

The following DNS records were found for the victim's domain.

WHOIS Emails
  • abusesupport.gandi.net
MX Records
  • ALT2.ASPMX.L.GOOGLE.com. Google Workspace
  • vade-mx-eu-fallback02.hornetsecurity.com.
  • vade-mx-fr01.hornetsecurity.com.
  • vade-mx-eu-fallback01.hornetsecurity.com.
  • vade-mx-fr02.hornetsecurity.com.
TXT Records
  • v=DMARC1; p=quarantine; rua=mailto:dmarc-reports@trace.tv
  • google-site-verification=aSRimmo1YMAbuMwJiWaahteJ6_q0fMPNt1abwFF2aDc
  • k=rsa; p=MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDGoQCNwAQdJBy23MrShs1EuHqK/dtDC33QrTqgWd9CJmtM3CK2ZiTYugkhcxnkEtGbzg+IJqcDRNkZHyoRezTf6QbinBB2dbyANEuwKI5DVRBFowQOj9zvM3IvxAEboMlb0szUjAoML94HOkKuGuCkdZ1gbVEi3GcVwrIQphal1QIDAQAB;
  • t=y; o=~;
  • google-site-verification=9ArjxZPY6qKXzhtag8fO6mG3adXWBXB9SkcSkbZ5_R4
  • proxy-ssl.webflow.com
  • google-site-verification=-1MXatRXl33uDP1CkdyHWSf1SqaMvjmU_HsR87mQpKs
  • pardot927493=9cf144e741b0df3366d2c49fd1caf58b1dc162157ea0bc670a4286d8dacf934b
  • google-site-verification=TJ-r50DvgpLyt8E3Umx9IbDwDT6I-QCmD3zH07uwKlA
  • MS=ms15204693
  • v=spf1 ip4:62.23.114.150 include:_spf.google.com include:spf.hornetsecurity.com include:spf.mandrillapp.com include:aspmx.pardot.com include:servers.mcsv.net include:mail.zendesk.com include:spf.sendinblue.com include:sendgrid.net ~all
  • sendinblue-code:4e944c83928ff86ee55f8633e1347157
  • google-site-verification=CdTMiX3qWAFhEhdpgnOVUaL7786akGeLqjQLGGpItiI
  • wrike-verification=MTk2MzgyMzpkYTM5NGU5OGJhNzhiNjVhNmRlMTE0YjVlZmYzYTg0NjBiM2EzYmEzN2MzZDMwMzZlZmY1Mjk0YjUxZDRkYjg1
Cloud / SaaS Services Detected
Mailchimp Microsoft 365 Salesforce Hornetsecurity Zendesk Mandrill SendGrid Sendinblue

Leak Screenshot:

Leak Screenshot