Group:
Clop
Discovered by ransomware.live: 2025-02-10
Estimated attack date:
2025-02-10
Country:
Description:
[AI generated] DXC Technology is a leading global IT services company that specializes in helping businesses drive digital transformation. Originally formed as a result of the merger between CSC and the Enterprise Services business of Hewlett Packard Enterprise (HPE) in 2017, DXC provides end-to-end IT services in over 70 countries, catering to various industries and sectors. It offers a broad range of services including analytics, consulting, application development, and security.
DNS Records:
The following DNS records were found for the victim's domain.
- abusecomplaints@markmonitor.com
- webmaster@dxc.com
- whoisrequest@markmonitor.com
- mx1.hc5997-4.iphmx.com.
- mx2.hc5997-4.iphmx.com.
- amazonses:JttMz9o6Co9jJ9aa8YgjK0elZjzrjhFmTmdAdA4Bclk=
- MS=00B5CDC83231B3212DDAE98FDBA48262C3DD3216
- google-site-verification=19s2seiWoiCsDQi2n4TnuMjGJqpU2kWzXHAF_oFWeqY
- cursor-domain-verification-wf0peh=vzgDhIWSSOgivBvR4skgS8nPx
- google-site-verification=_tJxCViaCvc-ZsV3-bAa7p28IWWqI38B1XO71Vd9Ymw
- _w6sh3cpwpy1jm65p3t0bsnx2pau5vyl
- atlassian-sending-domain-verification=772a68cd-6854-4caf-a0b9-4207b405c573
- adobe-sign-verification=fc045ed3b5fc3e9bf8b0ab73891f437c
- ms-domain-verification=9b2e9508-b55a-4270-b45d-3b0967a1220d
- dadfeca0c04becf206925c0b644804da08e88dcf961a243914739005e6896516
- amazonses:EYD9ujXV4OfMGVUVslxMDT44L4ffnN5gLWNbnJPjNLk=
- anthropic-domain-verification-3hdzr6=0E4IFPL5VlZzbAQUgC1jKZpUm
- 893sri0cadmmgka23dsdu1kfdg
- dell-technologies-domain-verification=dxc.com_abc11c10-a2b4-4c29-a927-57de21c29808_1699427202
- v=spf1 redirect=dxc.com.on.autospf.email
- adobe-idp-site-verification=4b7d8bd648e04362864a55d09e88d1e35260b8d749bb924e8d6d6792b570ff33
- facebook-domain-verification=76atf9jnxjtkq05emv8r35vtpazqy8
- _bk1mes98k1p5yy8qrc1qbijko32fcth
- apple-domain-verification=UceLuLtN88S8TQmp
- atlassian-domain-verification=hy98FQoX/71DJZ9fF92XWhAibjwLkCpav9eRmreymlN+/ahmzPIRZA0Bcdj3jMdy
- atlassian-domain-verification=HbayxDPyHPpUoAE9CZ2gEaBWytXbSf15JPko28jULWFnjrCOv1PmzOXnNXIxpoCE
- ms-domain-verification=d2ac4665-67f9-427b-806c-8a4515353e16
- atlassian-domain-verification=uBaQ/C0/QZJXJEQqkzRmFrPfb8s7iLbbGZ75ioz0EhZdRbzjgJMj7mKakeWkMl10
- msfpkey=73e1pt8ikk3jewahlaf7uwm3i
- cisco-ci-domain-verification=1f4ec131e2795ef817d1a9c6df2949efee5c0c5bf71c55b8eaba3d6a58647d2c
- r6e2hrgf1fjuki44hh6n5e6nre
- atlassian-domain-verification=QdDibdT7IfevLans/Eb33umyczJvPZrIEWI1JKeDKbYXDCZsibh6h6ADCHIaTOsa
- _7uasfbxe3bxcbm4645ez13oobl032pe
- atlassian-domain-verification=piUwsMNHcYsQZvlU40kW5Lav94S8nCRQmWez2PbpCbybGaKmxlst8akyUVpIX4jr
- airtable-verification=0a91657eb81560dfd29bda99888cfd5c
- Dynatrace-site-verification=fa11457a-1d3c-48cd-9819-301f35a41f96__hcqgdqsmth1hm0pavrkks8noma
- flexera-domain-verification-fphfwwnfnfieenqe
- cisco-ci-domain-verification=701218acb414c359d811fd10298dbefaed5d31042a5a2bafb90e13e5bf345c25
- asv=0340b08018ca13b7bc615e59222269c9
- _s5eefks06o4jjvw5y6ohpe6umikk2x8
- google-gws-recovery-domain-verification=51673348
- C0O0M19623
- _ut1re5q4nl1br6kprhtki3o9x1peaaz
- 0102f3dfff137c1b12900ff88cfb3960d7841d038e119cfc2a80e8bb25a5317f
- ms-domain-verification=d6d2f10b-e8ee-4280-83e6-97869dcb1cc4
- _urao9fhbhe3365pu21g4mgrj93ds3yb
- atlassian-domain-verification=fNRFSnWKOzZ4KHZ5aDG7aYz3ESyEypaYt3S4cGgLRusCa4pwhnmE2t0xKySjLbsF
- amazonses:o6jtl7HdBiAEGtcX/8azOAqvUnT5HcnHntcCx4T4ZtQ=
- google-site-verification=focanWTGxr06IZqzKbx6WkoBmydZc5-UpDBxaHD9tx0
- flexera-domain-verification-tktwoydpcbkgdfpg
- _globalsign-domain-verification=SJIHJup0gQ6p7h98x0T94akmlL3JPeAkNyqTdifCTe
- adobe-idp-site-verification=b71a9e3699caefdfdbd358bf84400d54093e55bc297216746b6729647e5caaa7
- 2o3g7uaugkjfr23n4beq8lsj5i
- box-domain-verification=c8eb7d6e78247c53c7801eecdd9db518f3fa52d2ac9bee3081c2ac4251e40538
Cloud / SaaS Services Detected
Adobe
Apple
Atlassian
Amazon SES/WorkMail
Box
Flexera
Cisco
Legal Disclaimer:
Ransomware.live does not engage in the acquisition, exfiltration, downloading, possession,
hosting, access, consultation, redistribution, or disclosure of unlawfully obtained data.
This platform indexes only publicly visible information posted by ransomware operators and
open web sources without accessing or obtaining the underlying stolen content.
The service is provided to support public awareness, legitimate research, and cyber-resilience.
No stolen personal or confidential data is collected or distributed via this site.