Group:
Clop
Discovered by ransomware.live: 2024-12-24
Estimated attack date:
2024-12-24
Country:
Description:
Presumed victim name: Datacore Software - Cl0p announcement.
We have data of many companies who use cleo. Our teams are reaching and calling your company and provide your special secret chat.
DNS Records:
The following DNS records were found for the victim's domain.
- domain.operations@web.com
- mxa-0012be01.gslb.pphosted.com.
- mxb-0012be01.gslb.pphosted.com.
- apple-domain-verification=kBdU85tsG5Ecyeqa
- pardot68742=85c7adcc0b5da05245cdb6aeece90d30d5d717f521dfcd818b21aa8a86809d80
- v=spf1 ip4:64.129.59.132 ip4:20.0.145.41 include:spf.protection.outlook.com include:spf-0012be01.pphosted.com include:spf-a.rnmk.com exists:%{i}.spf.rnmk.com include:_spf.salesforce.com include:spf.smtp2go.com include:et._spf.pardot.com include:mail.zende" "sk.com include:one.zoho.com ip4:107.21.50.60 ip4:52.6.161.160 ip4:35.168.122.111 ip4:44.193.121.189 ip4:52.73.203.75 ip4:107.21.71.208 ip4:34.239.230.237 ip4:3.229.61.95 ip4:52.21.3.7 ip4:54.208.28.232 ip4:3.213.53.59 ip4:3.230.25.99 ip4:44.198.219.69 ip4" ":54.88.35.230 ip4:44.225.193.208 ip4:52.32.155.69 ip4:52.11.80.184 ip4:35.169.212.125 ip4:34.199.175.102 ip4:34.200.105.7 ip4:18.235.136.131 ip4:34.206.90.60 ip4:3.220.1.124 ~all
- bw=ehSbSaE8s1vVWrjM8Z22epsH2tVpXb4yzJGtfqnCXERZ
- MS=745B2CC13030DEF17E38975EF5D75F4F6CB6A21D
- _globalsign-domain-verification=uJqsSX1GhpaZSFMhWB8VnlSbH-6c3GbKG4zsuqlwcx
- teamviewer-sso-verification=70f74dbdb6564a0d80c72669324ca400
- pardot_68742_*=9206e9e40cec666e1b838130bc5f1b3577e96deae3ce86c732b594002367dcc8
- ZOOM_verify_lr07bbBWR8KZ3EXWf3DGKQ
- miro-verification=d2a9cbab1de12790e071efad1125fb56d9621165
- a45svr9r4q97pni82emevumjcu
- sending_domain1021543=67740aea2b49ccf1a7674bfe016ecec67a55bad0e9a4dd168fc9bc5a7554da68
- google-site-verification=zcoQDPYDpvJdllrm_bouCL8RNegGEruMD5ac0J_XZ34
- sending_domain1027833=876f289217e00ef0e92f4d184f6cc425f28289492d54599051d4260d6d9316d7
- iUJzOjaeHpeAaublrJImEIwFLCxSZ28mSC4gblIU+W/DWAFX1i3papBEF/MCdL8GUW20za8frJv2YLPhiObzrA==
- 00DU7000007nkC9=1TBU700000002g9
- MS=ms64142608
- MS=ms95099229
- rga36fsaodu4dptclcfmmmkpqo
- pardot1021543=8de1c5d87d38675a388a85d444eab2bc9f91587c4680a4f9e691b4ba9e057733
- atlassian-domain-verification=Aid6AjM2Fhsnd3KdfZjjH6sWpUiDg7XEd2JHHsuEyhk0ZfW1PKo3jmSa52QAeVQb
- MS=ms71561523
- atlassian-domain-verification=0T5Tw6RmB/1j9IfMV0KElGAwZXVuZ7hbJgA3boSYHWK6M5sritGyMDS5QFobPDqs
- atlassian-domain-verification=fLL66jNyzHQ9ezcLaMslN1vDIqE7JPSuu1Vkla2hafWieewi4XQ0a5QOk6dTHK/2
Cloud / SaaS Services Detected
Apple
Atlassian
Microsoft 365
Salesforce
Miro
Teamviewer
Proofpoint
Zoom
Leak Screenshot:
Legal Disclaimer:
Ransomware.live does not engage in the acquisition, exfiltration, downloading, possession,
hosting, access, consultation, redistribution, or disclosure of unlawfully obtained data.
This platform indexes only publicly visible information posted by ransomware operators and
open web sources without accessing or obtaining the underlying stolen content.
The service is provided to support public awareness, legitimate research, and cyber-resilience.
No stolen personal or confidential data is collected or distributed via this site.