Contact us Buy Me a Coffee

Sponsored by Hudson Rock Use Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are leading to ransomware attacks

inseinc.com

inseinc.com

Discovered 2023-12-02 11:29 UTC
Est. attack date 2023-11-08
Country GB

Description:

Inspired offers an expanding portfolio of content, technology, hardware and services for regulated gaming, betting, lottery, social and leisure operators across land-based and mobile channels around the world. Inspired’s gaming, virtual sports, interactive and leisure products appeal to a wide variety of players, creating new opportunities for operators to grow their revenue. Inspired operates in approximately 35 jurisdictions worldwide, supplying gaming systems with associated terminals and content for approximately 50,000 gaming machines located in betting shops, pubs, gaming halls and other route operations; virtual sports products through more than 32,000 retail venues and various online websites; digital games for 170+ websites; and a variety of amusement entertainment solutions with a total installed base of more than 16,000 gaming terminals.SITE: www.inseinc.com Address 107 Station Street Burton Upon Trent, Staffordshire, DE14 1SZ United KingdomFULL DATA SIZE: 1.1tb 1. HR 2. Finance 3. Development 4. Confidentiality 5. Users data

Infostealer activity detected by HudsonRock

Compromised Employees: 0

Compromised Users: 2

Third Party Employee Credentials: 6


External Attack Surface: 3


Infostealer Distribution

DNS Records:

The following DNS records were found for the victim's domain.

WHOIS Emails
  • domainabusecscglobal.com
MX Records
  • inseinc-com.mail.protection.outlook.com. Microsoft 365
TXT Records
  • _qpjilea3p5i5vgqi52y810ufxoa93v5
  • JjGfeSJAnz+Q5bV2nmM2eZVrmO2azDP0nW2wMe4UfQ4N6nYIc0aQOPww4IjfGy5paF7c4cFpchpMi8OthlwcpA==
  • _p3m79in6l0sev3g6red971kuknur0l7
  • MS=ms58849837
  • V+CmL8lZmMHUKbSI9xzJQlD7kVkXOJaLmZTz/OfiBBeefYDlB4vO8olZriRS9HmpjKl+9uCgf/4bGQZ5V99xWQ==
  • google-site-verification=z5vYUtqrQeiZyg8EaUpw6SKEyIyyg1dKGTG0HrFUdWA
  • 9d049d34-0559-44b8-95dd-769d9726f70b
  • _acme-challenge.bfg.inseinc.com TXT rsI8qUKfPkmfUzE03wbvRbTSJf51dNI44cPxE4bUP9Q
  • atlassian-domain-verification=A8d7xdrhEZA7yQSeIB40HTvh1e7KvwwFV7Zqgwys9kf6WX4ZWpVn/4UEj3aaqFsk
  • GYSpJzMqTk4p4TA0NapK5lxan5RWnS2vsoRdiKg+ziMSffQ6CLy/yw25AHhdUZKSSF2iZV3pSmWnIfhbEQibDw==
  • v=spf1 mx a ip4:195.78.81.29/32 ip4:185.61.167.51/32 ip4:185.61.167.46/32 ip4:185.61.167.30/32 ip4:185.61.167.43/32 ip4:195.200.129.210/32 ip4:195.12.26.51/32 ip4:80.6.88.249/32 ip4:195.171.180.51/32 ip4:195.78.81.115 ip4:80.6.88.252/32 include:af795d.wor" "kshop-spf.net include:spf.zohomail360.uk include:spf.protection.outlook.com ~all
  • 57zzq7fazKtRsiKt1c7xsWydCDufLK63jyMYRrPaCRngszc9P9RNGNW7fBmLVa5SA8H8qB88NF3IrelgsAhFDQ==
Cloud / SaaS Services Detected
Atlassian Microsoft 365

Leak Screenshot:

Leak Screenshot