Group:
Incransom
Discovered by ransomware.live: 2025-07-12
Estimated attack date:
2025-06-10
Country:
Description:
Working together as a team, we will end the predictive value of race, class, gender, and special capacities for our childrens success through high quality teaching and learning for all. We seek to build relationships with families and communities to ensure that every student succeeds. We will know every student. Working together as a team, we will end the predictive value of race, class, gender, and special capacities for our childrens success through high quality teaching and learning for all. We seek to build relationships with families and communities to ensure that every student succeeds. We will know every student. Working together as a team, we will end the predictive value of race, class, gender, and special capacities for our childrens success through high quality teaching and learning for all. We seek to build relationships with families and communities to ensure that every student succeeds.
Employees: 1,339
Industry: Education
Downloaded: 229GB
Phone Number:(434) 972-4001
Infostealer activity detected by HudsonRock
Compromised Employees: 111
Compromised Users: 17
Third Party Employee Credentials: 100
External Attack Surface:
45
DNS Records:
The following DNS records were found for the victim's domain.
- domain.operations@web.com
- inboundmail.k12albemarle.org.
- google-site-verification=EfGg864_YybsrTSCU53gsYzlNniEoVzl0NDTeWbj3kE
- adobe-idp-site-verification=84325f50a90dd706f6719e818225a47f4d438b7913a45e340f5697cab8b4c05d
- MS=ms71927658
- v=spf1 ip4:76.7.60.50 ip4:76.7.60.14 ip4:76.7.60.208/28 ip4:76.7.60.224/27 ip4:205.237.106.3 ip4:52.191.253.141 ip4:208.64.181.100 ip4:208.64.181.102 ip4:208.64.181.103 ip4:70.36.20.116 ip4:70.36.20.119 ip4:67.23.62.36 ip4:67.23.62.38 ip4:67.23.61.36 " "ip4:67.23.61.38 ip4:50.223.178.201 ip4:50.223.178.203 ip4:50.223.178.208 ip4:76.3.238.60 ip4:76.3.238.61 include:_spf.google.com include:k12insightllc.com include:spf_target.brightarrow.com -all
- apple-domain-verification=oO5SbyNyKqi2T2AR
- google-site-verification=iCZD_AzwXsPzMtBxi1e0bmGAlMOicvDRcJ0zXyJ4278
- ZOOM_verify_mHbWUDqlRxHNAc4lK9MsGH
- v+zIprx0iakd4QSjPZ3yf6fDKioDQMI5BnfSbWiI+5f+6PCwGmF6GzO8Fgordi9JPCOwpeqNeoTF/p3PSpPoTw==
- MS=ms71927658 ttl 3600
- JGbsCa0rofFkqlrEV2aTUMypWxuDAaeVend90ussj2j4vVir7/2IuL3jbg0CjDGgxEjD/mjWaJeKosgFCOQ/Yg==
- openai-domain-verification=dv-rT76jYGsxqqovMcXKmFiHk7D
- 86bidtl7hduj0gdavtajrl98ev
Cloud / SaaS Services Detected
Adobe
Apple
Microsoft 365
Zoom
Leak Screenshot:
Legal Disclaimer:
Ransomware.live does not engage in the acquisition, exfiltration, downloading, possession,
hosting, access, consultation, redistribution, or disclosure of unlawfully obtained data.
This platform indexes only publicly visible information posted by ransomware operators and
open web sources without accessing or obtaining the underlying stolen content.
The service is provided to support public awareness, legitimate research, and cyber-resilience.
No stolen personal or confidential data is collected or distributed via this site.