Contact us Buy Me a Coffee

Sponsored by Hudson Rock Use Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are leading to ransomware attacks

proton-system_Serbia

proton.rs

Discovered 2026-01-03 14:01 UTC
Est. attack date 2026-01-03
Country RS

Description:

Website - www.proton.rs https://www.zoominfo.com/c/proton-system/450181945 Despite repeated attempts to convince the organization's management to prevent the leak, we were completely ignored. People who have been affected by the publication of their personal data should understand that www.proton.rs is only interested in making money off you; they do not ensure the safety of their customers and employees. Proton System has two days to continue negotiations, otherwise more than 130 GB of personal data will be made public. ----- About Proton System Proton System is a leading company in the region that specializes in the representation, evaluation, export, and distribution of unique pharmaceutical products across Europe, the Middle East, and North Africa. Founded in 1999, it focuses on providing top-notch services in the distribution, logistics, and marketing of dietary products, medical devices, and medications for family health. The company guarantees efficiency and effectiveness through innovative marketing and a commitment to high-quality standards. Proton System's products feature a unique combination of natural, safe, and effective ingredients, ensuring their effectiveness and safety in the market.

Infostealer activity detected by HudsonRock

Compromised Employees: 0

Compromised Users: 0

Third Party Employee Credentials: 5


External Attack Surface: 0


DNS Records:

The following DNS records were found for the victim's domain.

WHOIS Emails
  • No emails found.
MX Records
  • proton-rs.mail.protection.outlook.com. Microsoft 365
TXT Records
  • google-site-verification=XH2AOBkNrGHOstXwdf83VXyqiXIvOvDHXDBSpRyGeUY
  • i7l6ovaedq94hinm3ukf335ebk
  • v=spf1 ip4:136.243.15.109 include:spf.myservers.email include:secureserver.net include:spf.protection.outlook.com include:amazonses.com ~all
Cloud / SaaS Services Detected
Amazon SES/WorkMail

Leak Screenshot:

Leak Screenshot