Group:
Cactus
Discovered by ransomware.live: 2024-03-11
Estimated attack date:
2024-02-16
Country:
Description:
Download link #1: https://***************.onion/AMMEGA/PROOFMirror: https://cactus5dqnqkppa5ayckiyk6dttpqwczdqphv5mxh4dkk5ct544q5aad.onion/AMMEGA/PROOFDATA DESCRIPTIONS: Accounting\treasury\taxes 250GB+, HR - payrolls\personal documents\dossiers 150GB+, Customer data - projects\contracts\drawings 100GB+, Engineering\R&D\QA 250GB+, Legal documents, corporate correspondence 100GB+, employees' personal folders... Lots of corporate confidential data, employees Personal Identifying information, executive managers personal data, legal documents including lawsuits, contracts, etc. PRICE: $9MFILE TREE PRICE: $90K
Infostealer activity detected by HudsonRock
Compromised Employees: 22
Compromised Users: 5
Third Party Employee Credentials: 26
External Attack Surface:
5
DNS Records:
The following DNS records were found for the victim's domain.
- ammega-com.mail.protection.outlook.com.
- pardot854583=8835b7f7c13ca7461956ac46871cd3650888fa74c5f567206658d8362b5f7bda
- ciscocidomainverification=46668d019bd38a78b6cb40a62a536d1c71f82d99d86ecbb315172aa6fbbd1825
- v=spf1 mx a include:spf.protection.outlook.com include:et._spf.pardot.com include:spf1.ammega.info include:spf2.ammega.info include:spforacle.ammega.info include:one.zoho.eu include:_spf.salesforce.com ip4:207.211.63.183 ip4:208.116.180.100 ip4:208.116.18" "0.104 ip4:162.218.1.205 ip4:162.218.1.206 ip4:162.218.1.150 ip4:162.218.0.230 ip4:54.240.57.47 ip4:54.240.57.46 ip4:68.179.109.125 ip4:40.107.6.49 ip4:80.197.60.32/29 ip4:154.14.55.140 ip4:69.174.127.2 ip4:14.201.108.59 ip4:123.243.157.179 ip4:123.243.64." "43 ip4:27.33.174.170 ip4:60.240.234.251 ip4:14.200.111.59 ip4:192.200.190.165/30 ip4:104.195.80.16/28 ip4:192.200.181.144/28 ip4:174.37.85.64/28 ip4:75.126.150.248/30 ip4:63.141.144.128/28 ip4:104.195.127.0/28 -all
- MS=ms69889785
- apple-domain-verification=5sVTvY2c9TlfCbvR
- MS=270A4BBB505A6984F69DD2BA7B1A14203AA9D367
- Vkl-JX2-zlb
- ms-domain-verification=9cb415ce-0266-4e65-8b69-25be7ea3020f
- _globalsign-domain-verification=AufPn5mHfWR0GpyUOLa80nTVmOkUPleorEckvEf3WM
- da2c3b371f25366ad847dd0d78a0e67f6e70ce64e6e759514b
Cloud / SaaS Services Detected
Apple
Microsoft 365
Salesforce
Leak Screenshot:
Legal Disclaimer:
Ransomware.live does not engage in the acquisition, exfiltration, downloading, possession,
hosting, access, consultation, redistribution, or disclosure of unlawfully obtained data.
This platform indexes only publicly visible information posted by ransomware operators and
open web sources without accessing or obtaining the underlying stolen content.
The service is provided to support public awareness, legitimate research, and cyber-resilience.
No stolen personal or confidential data is collected or distributed via this site.