Contact us Buy Me a Coffee

Sponsored by Hudson Rock Use Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are leading to ransomware attacks

csem.qc.ca

csem.qc.ca

Discovered 2024-04-19 09:48 UTC
Est. attack date 2023-08-30
Country CA
Duplicate Entry
This victim has been identified as a duplicate of another entry in our database. However, this may not always be the case: the same organization can be targeted multiple times by the same or different ransomware groups, which may result in separate legitimate entries. Search for related entries

Description:

CSEM promotes and encourages the burial of cabled networks on the Montreal territory by associating with the City of Montreal and with numerous energy and telecommunications companies and providers.

DNS Records:

The following DNS records were found for the victim's domain.

WHOIS Emails
  • monaarcinfo.qc.ca
  • ticsem.qc.ca
  • informatiquecsem.qc.ca
MX Records
  • d357546a.ess.barracudanetworks.com. Barracuda
  • d357546b.ess.barracudanetworks.com. Barracuda
TXT Records
  • v=spf1 a mx a:csem.qc.ca ip4:167.114.17.139 ip4:167.114.17.129 ip4:64.254.227.227 ip4:99.209.249.34 include:spf.protection.outlook.com include:amazonses.com include:sendgrid.net -all
  • brevo-code:e58574cf826441c5f68a3154bb3a3e40
  • BPL=1332004
  • bw=/7TBVcypi0G532G/U1rQdDg9gZeslDIfvTo0QFpLxg7x
Cloud / SaaS Services Detected
Amazon SES/WorkMail SendGrid

Leak Screenshot:

Leak Screenshot