Contact us Buy Me a Coffee

Sponsored by Hudson Rock Use Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are leading to ransomware attacks

Triple Eight Transport

triple8.ca

Group Akira
Discovered 2026-01-09 15:10 UTC
Est. attack date 2026-01-09
Country CA
Duplicate Entry
This victim has been identified as a duplicate of another entry in our database. However, this may not always be the case: the same organization can be targeted multiple times by the same or different ransomware groups, which may result in separate legitimate entries. Search for related entries

Description:

Triple Eight Transport is an asset-based carrier company offering services in reefer, dry and heat van, and more. We will upload almost 30gb of corporate data soon. Detailed perso nal information of every employee (SSN, passports, visa documents , credit cards, DL, birth certificates, addresses, phones, emails and so on), financials and payment details, client information, NDA, so on.

Infostealer activity detected by HudsonRock

Compromised Employees: 1

Compromised Users: 2

Third Party Employee Credentials: 1


External Attack Surface: 8


DNS Records:

The following DNS records were found for the victim's domain.

WHOIS Emails
  • abusegodaddy.com
  • ittriple8.ca
MX Records
  • triple8-ca.mail.protection.outlook.com. Microsoft 365
TXT Records
  • ng0fmag0o6lthftu88ojnfgd1f
  • v=spf1 include:spf.em.secureserver.net ip4:132.148.232.40 include:spf.protection.outlook.com include:mail.zendesk.com -all
  • v=verifydomain MS=8251540
  • vrp0jf7uhu1rjsr8igflant6ma
  • jq1tsvo8avihf9dmusdmv2ub1g
  • atlassian-domain-verification=mbOj49x41QbAgLYRh6OrU2e45Es6B2l/fDmH3HdXTkiHGM7xJRgKblNmqGs5wqt/
  • d1aqqth7ggk81cfj6qr2sglqh1
  • declfflg59bcd95a1v0fir9i4i
  • google-site-verification=d04YPwwGYkIdtmcgIlR7UZ8mYJT5bYMzop13wY1LM-k
  • google-site-verification=FYMRhcyu1FYwCfqwYUDe-bFdG3oTFwkHrUgPZ9WOfrA
  • MS=ms12819918
Cloud / SaaS Services Detected
Atlassian Microsoft 365 Zendesk