Contact us Buy Me a Coffee

Sponsored by Hudson Rock Use Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are leading to ransomware attacks

workers.com.zm

workers.com.zm

Group Babuk2
Discovered 2025-01-27 07:55 UTC
Est. attack date 2025-01-27
Country ZM
Duplicate Entry
This victim has been identified as a duplicate of another entry in our database. However, this may not always be the case: the same organization can be targeted multiple times by the same or different ransomware groups, which may result in separate legitimate entries. Search for related entries

Description:

workers.com.zm

Infostealer activity detected by HudsonRock

Compromised Employees: 1

Compromised Users: 278

Third Party Employee Credentials: 1


External Attack Surface: 19


DNS Records:

The following DNS records were found for the victim's domain.

WHOIS Emails
  • adminzamtel.zm
MX Records
  • workers-com-zm.mail.protection.outlook.com. Microsoft 365
TXT Records
  • v=spf1 a mx ip4:165.56.129.210 ip4:165.56.129.211 ip4:165.56.128.213 ip4:41.72.115.86 ip4:41.216.74.6 a:luangwa.workers.com.zm a:chambeshi.workers.com.zm a:mail.workers.com.zm a:firewall.workers.com.zm a:sophos.workers.com.zm " " include:spf.protection.outlook.com include:spf-eu.emailsignatures365.com -all
  • MS=ms93720984
  • MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQD4lePoM201AF45dR4OnhFsMR5j kvnWDb0KW6UlFVcPxJ0wGPFlSq031Zhr+fS63n2hNCiamu9Oc+ym3ZRh0hKvKleW cRv3VOWPBeHvBI6x9GcJ5QadwpS4JhuQ4m1XobsTJENJ5SopbZaIHC2QzfYbkANf S23DZxWz94CywVdApwIDAQAB
  • MS=D6A36CABE1AF9E48D53F90052ED24A348C878A50
Cloud / SaaS Services Detected
Microsoft 365

Leak Screenshot:

Leak Screenshot