{"id":38900,"date":"2020-12-21T20:40:00","date_gmt":"2020-12-21T20:40:00","guid":{"rendered":"http:\/\/de0e6242-4f22-4b88-aae7-08de5d69aee8"},"modified":"2020-12-21T20:40:00","modified_gmt":"2020-12-21T20:40:00","slug":"partial-lists-of-organizations-infected-with-sunburst-malware-released-online","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/partial-lists-of-organizations-infected-with-sunburst-malware-released-online\/","title":{"rendered":"Partial lists of organizations infected with Sunburst malware released online"},"content":{"rendered":"<figure class=\"image image-original shortcode-image\"><span class=\"img aspect-set \"><img decoding=\"async\" src=\"https:\/\/zdnet1.cbsistatic.com\/hub\/i\/2020\/12\/21\/4c10ca9e-77d3-4bf6-92ef-c308f111c59a\/solar-flare-sunburst.jpg\" class alt=\"solar-flare-sunburst.jpg\"><\/span><figcaption><span class=\"caption\"><\/span><span class=\"credit\"> Image: NASA <\/span><\/figcaption><\/figure>\n<p>Multiple security researchers and research teams have published over the weekend lists ranging from 100 to 280 organizations that installed a trojanized version of the SolarWinds Orion platform and had their internal systems infected with the Sunburst malware. <\/p>\n<div class=\"relatedContent alignRight\" readability=\"8.03125\">\n<h3 class=\"heading\"> <span class=\"int\">ZDNet Recommends<\/span> <\/h3>\n<div class=\"thumb\"> <a href=\"https:\/\/www.zdnet.com\/article\/best-vpn-services-for-2021-safe-and-fast-dont-come-for-free\/\" data-omniture-track=\"moduleClick\" data-omniture-track-data=\"{&quot;moduleInfo&quot;: &quot;pinbox&quot;, &quot;pageType&quot;: &quot;article&quot;}\"> <span class=\"img \"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/zdnet1.cbsistatic.com\/hub\/i\/r\/2020\/11\/19\/67f3512d-b94e-479f-b05d-23ed89561c7f\/resize\/220x165\/5e5a4b7ce476bbcdd9d472b09ed7a3b4\/istock-1168629063.jpg\" class alt=\"The best VPNs for 2021\" height=\"165\" width=\"220\"><\/span> <\/a> <\/div>\n<p class=\"title\"> <a href=\"https:\/\/www.zdnet.com\/article\/best-vpn-services-for-2021-safe-and-fast-dont-come-for-free\/\" data-omniture-track=\"moduleClick\" data-omniture-track-data=\"{&quot;moduleInfo&quot;: &quot;pinbox&quot;, &quot;pageType&quot;: &quot;article&quot;}\"> The best VPNs for 2021 <\/a> <\/p>\n<p class=\"dek\">VPNs aren&#8217;t essential only for securing your unencrypted Wi-Fi connections in coffee shops and airports. Every remote worker should consider a VPN to stay safe online. Here are your top choices for best VPNs in 2020 and how to get set up.<\/p>\n<p class=\"read-more\"> <a href=\"https:\/\/www.zdnet.com\/article\/best-vpn-services-for-2021-safe-and-fast-dont-come-for-free\/\" data-omniture-track=\"moduleClick\" data-omniture-track-data=\"{&quot;moduleInfo&quot;: &quot;pinbox&quot;, &quot;pageType&quot;: &quot;article&quot;}\">Read More<\/a> <\/p>\n<\/p><\/div>\n<p>The list includes the names of tech companies, local governments, universities, hospitals, banks, and telecom providers. <\/p>\n<p>The biggest names on this list include the likes of Cisco, SAP, Intel, Cox Communications, Deloitte, Nvidia, Fujitsu, Belkin, Amerisafe, Lukoil, Rakuten, Check Point, Optimizely, Digital Reach, and Digital Sense. <\/p>\n<p>MediaTek, one of the world&#8217;s largest semiconductor companies, is also believed to have been impacted; although, security researchers aren&#8217;t 100% on its inclusion on their lists just yet. <\/p>\n<h3> Cracking the Sunburst subdomain mysteries <\/h3>\n<p>The way security researchers compiled these lists was by reverse-engineering the Sunburst (aka Solorigate) malware. <\/p>\n<p>For ZDNet readers learning of the Sunburst malware for the first time, this malware was injected inside updates for the SolarWinds Orion app released between March and June 2020. <\/p>\n<p>The boobytrapped updates planted the Sunburst malware deep inside the internal networks of many companies and government organizations which relied on the Orion app to monitor and keep inventories of internal IT systems. <\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_zd_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\"> <\/section>\n<p>According to deep-dive reports published last week by&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\/blog\/2020\/12\/18\/analyzing-solorigate-the-compromised-dll-file-that-started-a-sophisticated-cyberattack-and-how-microsoft-defender-helps-protect\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">Microsoft<\/a>,&nbsp;<a href=\"https:\/\/www.fireeye.com\/blog\/threat-research\/2020\/12\/evasive-attacker-leverages-solarwinds-supply-chain-compromises-with-sunburst-backdoor.html\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">FireEye<\/a>,&nbsp;<a href=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/additional-analysis-into-the-sunburst-backdoor\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">McAfee<\/a>,&nbsp;<a href=\"https:\/\/symantec-enterprise-blogs.security.com\/blogs\/threat-intelligence\/sunburst-supply-chain-attack-solarwinds\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">Symantec<\/a>,&nbsp;<a href=\"https:\/\/securelist.com\/sunburst-connecting-the-dots-in-the-dns-requests\/99862\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">Kaspersky<\/a>, and US Cybersecurity and Infrastructure Security Agency (<a href=\"https:\/\/cyber.dhs.gov\/ed\/21-01\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">CISA<\/a>), on infected systems, the malware would gather information about the victim company&#8217;s network, wait 12 to 14 days, and then send the data to a remote command and control server (C&amp;C). <\/p>\n<p>The hackers \u2014 believed to be a Russian state-sponsored group \u2014 would then analyze the data they received and escalated attacks only on networks that were of interest to their intelligence gathering goals. <\/p>\n<figure class=\"image image-original shortcode-image\"><span class=\"img aspect-set \"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/article\/partial-lists-of-organizations-infected-with-sunburst-malware-released-online\/\" class=\"lazy\" alt=\"solorigate-attack-chain.png\" height=\"auto\" width=\"1200\" data-original=\"https:\/\/zdnet3.cbsistatic.com\/hub\/i\/r\/2020\/12\/21\/b96dbe43-31ff-4030-a4ab-091cfd0db9be\/resize\/1200xauto\/5fe5a4052bf084ae91667c45a7ecee7d\/solorigate-attack-chain.png\"><\/span><noscript><span class=\"img aspect-set \"><img decoding=\"async\" src=\"https:\/\/zdnet3.cbsistatic.com\/hub\/i\/r\/2020\/12\/21\/b96dbe43-31ff-4030-a4ab-091cfd0db9be\/resize\/1200xauto\/5fe5a4052bf084ae91667c45a7ecee7d\/solorigate-attack-chain.png\" class alt=\"solorigate-attack-chain.png\" height=\"auto\" width=\"1200\"><\/span><\/noscript><figcaption><span class=\"caption\"><\/span><span class=\"credit\"> Image: Microsoft <\/span><\/figcaption><\/figure>\n<p>Last week, SolarWinds admitted to the hack and said that based on internal telemetry, almost&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/sec-filings-solarwinds-says-18000-customers-are-impacted-by-recent-hack\/\" target=\"_blank\" rel=\"noopener noreferrer\">18,000 of its 300,000 customers<\/a>&nbsp;downloaded versions of the Orion platform that contained the Sunburst malware. <\/p>\n<p>Initially, it was thought that only SolarWinds would be able to identify and notify all the impacted organizations. However, as security researchers kept analyzing Sunburst&#8217;s inner-workings, they also discovered some quirks in the malware&#8217;s operations, namely in the way the malware pinged its C&amp;C server. <\/p>\n<p>According to research published last week, Sunburst would send the data it collected from an infected network to a C&amp;C server URL that was unique per victim. <\/p>\n<p>This unique URL was a subdomain for avsvmcloud[.]com and contained four parts, where the first part was a random-looking string. But security researchers said that this string wasn&#8217;t actually unique but contained the encoded name of the victim&#8217;s local network domain. <\/p>\n<figure class=\"image image-original shortcode-image\"><span class=\"img aspect-set \"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/article\/partial-lists-of-organizations-infected-with-sunburst-malware-released-online\/\" class=\"lazy\" alt=\"solorigate-c2.png\" data-original=\"https:\/\/zdnet3.cbsistatic.com\/hub\/i\/2020\/12\/21\/aaadfe90-6bb7-4cf1-a4bf-71591719901f\/solorigate-c2.png\"><\/span><noscript><span class=\"img aspect-set \"><img decoding=\"async\" src=\"https:\/\/zdnet3.cbsistatic.com\/hub\/i\/2020\/12\/21\/aaadfe90-6bb7-4cf1-a4bf-71591719901f\/solorigate-c2.png\" class alt=\"solorigate-c2.png\"><\/span><\/noscript><figcaption><span class=\"caption\"><\/span><span class=\"credit\"> Image: Microsoft <\/span><\/figcaption><\/figure>\n<p>Since last week, several security firms and independent researchers have been sifting through historical web traffic and passive DNS data to collect information on traffic going to the avsvmcloud[.]com domain, crack the subdomains and then track down companies that installed a trojanized SolarWinds Orion app \u2014 and had the Sunburst malware beaconing from inside their networks back to the attackers&#8217; server (<a href=\"https:\/\/www.zdnet.com\/article\/microsoft-and-industry-partners-seize-key-domain-used-in-solarwinds-hack\/\" target=\"_blank\" rel=\"noopener noreferrer\">now sinkholed thanks to Microsoft and FireEye<\/a>). <\/p>\n<h3> A growing list of first-stage and second-stage victims <\/h3>\n<p>Cybersecurity firms <a href=\"https:\/\/blog.truesec.com\/2020\/12\/17\/the-solarwinds-orion-sunburst-supply-chain-attack\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">TrueSec<\/a> and <a href=\"https:\/\/blog.prevasio.com\/2020\/12\/sunburst-backdoor-part-ii-dga-list-of.html\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">Prevasio<\/a>, security researcher&nbsp;<a href=\"https:\/\/pastebin.com\/f05i8B1Q\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">Dewan Chowdhury<\/a>, and Chinese security firm&nbsp;<a href=\"https:\/\/ti.qianxin.com\/blog\/articles\/First-Disclosure-of-Target:Domain-Name-Generation-Algorithm-of-SolarWinds-Supply-Chain-Attack-can-be-Cracked\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">QiAnXin<\/a>&nbsp;are among the several who have now published lists of Sunburst-infected organizations or tools to decode the avsvmcloud[.]com subdomains. <\/p>\n<figure class=\"media-source\"> <\/figure>\n<figure class=\"media-source\"> <\/figure>\n<p>Companies like Cisco and Intel have formally confirmed they got infected in interviews with reporters over the weekend. Both companies have said they found no evidence that the hackers escalated access to deliver second-stage payloads on their systems. <\/p>\n<p><a href=\"https:\/\/www.vmware.com\/company\/news\/updates\/2020\/vmware-statement-solarwinds-supply-chain-compromise.html\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">VMWare<\/a>&nbsp;and&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/microsoft-was-also-breached-in-recent-solarwinds-supply-chain-hack-report\/\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft<\/a>, whose names were not on these public lists, also confirmed they installed trojanized Orion updates on their internal networks but also specified that they also did not find any evidence of escalation from the attackers. <\/p>\n<p>However, the hackers did escalate their attacks on the networks of some of their targets. In an interview on Friday, FireEye CEO Kevin Mandia, whose company discovered the SolarWinds hack when investigating a breach of its internal systems, said that hackers, despite infecting almost 18,000 networks, only escalated access&nbsp;<a href=\"https:\/\/fcw.com\/articles\/2020\/12\/21\/sunburst-hack-fifty-orgs-russia.aspx\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">to around 50 targets<\/a>, based on FireEye&#8217;s visibility. <\/p>\n<p>In a separate report, also published on Friday, Microsoft also said it&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/microsoft-says-it-identified-40-victims-of-the-solarwinds-hack\/\" target=\"_blank\" rel=\"noopener noreferrer\">identified 40 of its own customers<\/a>&nbsp;that had installed infected Orion apps and where attackers escalated access. <\/p>\n<p>&#8220;Escalation&#8221; usually happened when the avsvmcloud[.]com C&amp;C server replied to an infected company with a very specific DNS response that contained a special CNAME field. <\/p>\n<p>This special DNS CNAME field contained the location of a second C&amp;C server from where the Sunburst malware would get additional commands and sometimes download other malware. <\/p>\n<p>Currently, the only publicly known company where hackers escalated access is FireEye, whose breach response helped uncover the entire SolarWinds hack. <\/p>\n<p>Making the difference between the two (a simple Sunburst infection and escalation) is crucial for incident responders. In the first case, they might only need to remove the Sunburst malware, while in the second, they might need to review logs to identify what internal systems hackers escalated access to and what data was stolen from their networks. <\/p>\n<p>Several security researchers have told ZDNet today that a large part of the cybersecurity community is now working with content delivery networks, internet service providers, and other internet companies to collect passive DNS data and hunt down traffic to and from the avsvmcloud[.]com domain in order to identify other victims where attackers escalated access. <\/p>\n<p>Below is a table compiled by security firm Truesec with the decoded internal domain names of some of the SolarWinds victims. <\/p>\n<table>\n<thead>\n<tr>\n<th><strong>Decoded Internal Name<\/strong><\/th>\n<th><strong>Possible Organization<br \/>(may be inaccurate)*<\/strong><\/th>\n<th><strong>Response Address Family<\/strong><\/th>\n<th><strong>Command<\/strong><\/th>\n<th><strong>First Seen<\/strong><\/th>\n<\/tr>\n<\/thead>\n<tbody readability=\"38\">\n<tr readability=\"3\">\n<td> mnh.rg-law.ac.il <\/td>\n<td> College of Law and Business,<br \/>Israel <\/td>\n<td> NetBios <\/td>\n<td> HTTP Backdoor <\/td>\n<td> 2020-05-26 <\/td>\n<\/tr>\n<tr>\n<td> ad001.mtk.lo <\/td>\n<td> Mediatek <\/td>\n<td> NetBios <\/td>\n<td> HTTP Backdoor <\/td>\n<td> 2020-08-26 <\/td>\n<\/tr>\n<tr>\n<td> Aeria <\/td>\n<td><\/td>\n<td> NetBios <\/td>\n<td> HTTP Backdoor <\/td>\n<td> 2020-06-26 <\/td>\n<\/tr>\n<tr>\n<td> Ameri <\/td>\n<td><\/td>\n<td> NetBios <\/td>\n<td> HTTP Backdoor <\/td>\n<td> 2020-08-02 <\/td>\n<\/tr>\n<tr>\n<td> ank.com <\/td>\n<td> Ankcom Communications <\/td>\n<td> NetBios <\/td>\n<td> HTTP Backdoor <\/td>\n<td> 2020-06-06 <\/td>\n<\/tr>\n<tr>\n<td> azlcyy <\/td>\n<td><\/td>\n<td> NetBios <\/td>\n<td> HTTP Backdoor <\/td>\n<td> 2020-08-07 <\/td>\n<\/tr>\n<tr readability=\"2\">\n<td> banccentral.com <\/td>\n<td> BancCentral Financial <br \/>Services Corp. <\/td>\n<td> NetBios <\/td>\n<td> HTTP Backdoor <\/td>\n<td> 2020-07-03 <\/td>\n<\/tr>\n<tr>\n<td> barrie.ca <\/td>\n<td> City of Barrie <\/td>\n<td> NetBios <\/td>\n<td> HTTP Backdoor <\/td>\n<td> 2020-05-13 <\/td>\n<\/tr>\n<tr>\n<td> BCC.l <\/td>\n<td><\/td>\n<td> NetBios <\/td>\n<td> HTTP Backdoor <\/td>\n<td> 2020-08-22 <\/td>\n<\/tr>\n<tr>\n<td> bhq.lan <\/td>\n<td><\/td>\n<td> NetBios <\/td>\n<td> HTTP Backdoor <\/td>\n<td> 2020-08-18 <\/td>\n<\/tr>\n<tr>\n<td> cds.capilanou. <\/td>\n<td> Capilano University <\/td>\n<td> NetBios <\/td>\n<td> HTTP Backdoor <\/td>\n<td> 2020-08-27 <\/td>\n<\/tr>\n<tr>\n<td> Centr <\/td>\n<td><\/td>\n<td> NetBios <\/td>\n<td> HTTP Backdoor <\/td>\n<td> 2020-06-24 <\/td>\n<\/tr>\n<tr>\n<td> chc.dom <\/td>\n<td><\/td>\n<td> NetBios <\/td>\n<td> HTTP Backdoor <\/td>\n<td> 2020-08-04 <\/td>\n<\/tr>\n<tr readability=\"2\">\n<td> christieclinic. <\/td>\n<td> Christie Clinic Telehealth <\/td>\n<td> NetBios <\/td>\n<td> HTTP Backdoor <\/td>\n<td> 2020-04-22 <\/td>\n<\/tr>\n<tr>\n<td> CIMBM <\/td>\n<td><\/td>\n<td> NetBios <\/td>\n<td> HTTP Backdoor <\/td>\n<td> 2020-09-25 <\/td>\n<\/tr>\n<tr>\n<td> CIRCU <\/td>\n<td><\/td>\n<td> NetBios <\/td>\n<td> HTTP Backdoor <\/td>\n<td> 2020-05-30 <\/td>\n<\/tr>\n<tr>\n<td> CONSO <\/td>\n<td><\/td>\n<td> NetBios <\/td>\n<td> HTTP Backdoor <\/td>\n<td> 2020-06-17 <\/td>\n<\/tr>\n<tr readability=\"2\">\n<td> corp.ptci.com <\/td>\n<td> Pioneer Telephone <br \/>Scholarship Recipients <\/td>\n<td> NetBios <\/td>\n<td> HTTP Backdoor <\/td>\n<td> 2020-06-19 <\/td>\n<\/tr>\n<tr readability=\"2\">\n<td> corp.stingraydi <\/td>\n<td> Stingray (Media and <br \/>entertainment) <\/td>\n<td> NetBios <\/td>\n<td> HTTP Backdoor <\/td>\n<td> 2020-06-10 <\/td>\n<\/tr>\n<tr>\n<td> corp.stratusnet <\/td>\n<td> Stratus Networks <\/td>\n<td> NetBios <\/td>\n<td> HTTP Backdoor <\/td>\n<td> 2020-04-28 <\/td>\n<\/tr>\n<tr readability=\"2\">\n<td> cosgroves.local <\/td>\n<td> Cosgroves (Building services <br \/>consulting) <\/td>\n<td> NetBios <\/td>\n<td> HTTP Backdoor <\/td>\n<td> 2020-08-25 <\/td>\n<\/tr>\n<tr readability=\"2\">\n<td> COTES <\/td>\n<td> Cotes (Humidity Management) <\/td>\n<td> NetBios <\/td>\n<td> HTTP Backdoor <\/td>\n<td> 2020-07-25 <\/td>\n<\/tr>\n<tr>\n<td> csnt.princegeor <\/td>\n<td> City of Prince George <\/td>\n<td> NetBios <\/td>\n<td> HTTP Backdoor <\/td>\n<td> 2020-09-18 <\/td>\n<\/tr>\n<tr readability=\"2\">\n<td> cys.local <\/td>\n<td> CYS Group (Marketing analytics) <\/td>\n<td> NetBios <\/td>\n<td> HTTP Backdoor <\/td>\n<td> 2020-07-10 <\/td>\n<\/tr>\n<tr readability=\"2\">\n<td> digitalsense.co <\/td>\n<td> Digital Sense (Cloud Services) <\/td>\n<td> NetBios <\/td>\n<td> HTTP Backdoor <\/td>\n<td> 2020-06-24 <\/td>\n<\/tr>\n<tr>\n<td> ehtuh- <\/td>\n<td><\/td>\n<td> NetBios <\/td>\n<td> HTTP Backdoor <\/td>\n<td> 2020-05-01 <\/td>\n<\/tr>\n<tr>\n<td> escap.org <\/td>\n<td><\/td>\n<td> NetBios <\/td>\n<td> HTTP Backdoor <\/td>\n<td> 2020-07-10 <\/td>\n<\/tr>\n<tr>\n<td> f.gnam <\/td>\n<td><\/td>\n<td> NetBios <\/td>\n<td> HTTP Backdoor <\/td>\n<td> 2020-04-04 <\/td>\n<\/tr>\n<tr>\n<td> fhc.local <\/td>\n<td><\/td>\n<td> NetBios <\/td>\n<td> HTTP Backdoor <\/td>\n<td> 2020-07-06 <\/td>\n<\/tr>\n<tr readability=\"2\">\n<td> fidelitycomm.lo <\/td>\n<td> Fidelity Communications (ISP) <\/td>\n<td> NetBios <\/td>\n<td> HTTP Backdoor <\/td>\n<td> 2020-06-02 <\/td>\n<\/tr>\n<tr readability=\"2\">\n<td> fisherbartoninc.com <\/td>\n<td> The Fisher Barton Group <br \/>(Blade Manufacturer) <\/td>\n<td> NetBios <\/td>\n<td> HTTP Backdoor <\/td>\n<td> 2020-05-15 <\/td>\n<\/tr>\n<tr>\n<td> fmtn.ad <\/td>\n<td> City of Farmington <\/td>\n<td> NetBios <\/td>\n<td> HTTP Backdoor <\/td>\n<td> 2020-07-21 <\/td>\n<\/tr>\n<tr>\n<td> FWO.I <\/td>\n<td><\/td>\n<td> NetBios <\/td>\n<td> HTTP Backdoor <\/td>\n<td> 2020-08-05 <\/td>\n<\/tr>\n<tr>\n<td> ggsg-us.cisco <\/td>\n<td> Cisco GGSG <\/td>\n<td> NetBios <\/td>\n<td> HTTP Backdoor <\/td>\n<td> 2020-06-24 <\/td>\n<\/tr>\n<tr>\n<td> ghsmain1.ggh.g <\/td>\n<td><\/td>\n<td> NetBios <\/td>\n<td> HTTP Backdoor <\/td>\n<td> 2020-06-09 <\/td>\n<\/tr>\n<tr>\n<td> gxw <\/td>\n<td><\/td>\n<td> NetBios <\/td>\n<td> HTTP Backdoor <\/td>\n<td> 2020-07-07 <\/td>\n<\/tr>\n<tr>\n<td> htwanmgmt.local <\/td>\n<td><\/td>\n<td> NetBios <\/td>\n<td> HTTP Backdoor <\/td>\n<td> 2020-07-22 <\/td>\n<\/tr>\n<tr>\n<td> ieb.go.id <\/td>\n<td><\/td>\n<td> NetBios <\/td>\n<td> HTTP Backdoor <\/td>\n<td> 2020-06-12 <\/td>\n<\/tr>\n<tr>\n<td> int.ncahs.net <\/td>\n<td><\/td>\n<td> NetBios <\/td>\n<td> HTTP Backdoor <\/td>\n<td> 2020-09-23 <\/td>\n<\/tr>\n<tr>\n<td> internal.jtl.c <\/td>\n<td><\/td>\n<td> NetBios <\/td>\n<td> HTTP Backdoor <\/td>\n<td> 2020-05-19 <\/td>\n<\/tr>\n<tr readability=\"2\">\n<td> ironform.com <\/td>\n<td> Ironform (metal fabrication) <\/td>\n<td> NetBios <\/td>\n<td> HTTP Backdoor <\/td>\n<td> 2020-06-19 <\/td>\n<\/tr>\n<tr>\n<td> isi <\/td>\n<td><\/td>\n<td> NetBios <\/td>\n<td> HTTP Backdoor <\/td>\n<td> 2020-07-06 <\/td>\n<\/tr>\n<tr readability=\"2\">\n<td> itps.uk.net <\/td>\n<td> Infection Prevention Society (IPS) <\/td>\n<td> NetBios <\/td>\n<td> HTTP Backdoor <\/td>\n<td> 2020-08-11 <\/td>\n<\/tr>\n<tr>\n<td> jxxyx. <\/td>\n<td><\/td>\n<td> NetBios <\/td>\n<td> HTTP Backdoor <\/td>\n<td> 2020-06-26 <\/td>\n<\/tr>\n<tr readability=\"2\">\n<td> kcpl.com <\/td>\n<td> Kansas City Power and <br \/>Light Company <\/td>\n<td> NetBios <\/td>\n<td> HTTP Backdoor <\/td>\n<td> 2020-07-07 <\/td>\n<\/tr>\n<tr>\n<td> keyano.local <\/td>\n<td> Keyano College <\/td>\n<td> NetBios <\/td>\n<td> HTTP Backdoor <\/td>\n<td> 2020-06-03 <\/td>\n<\/tr>\n<tr>\n<td> khi0kl <\/td>\n<td><\/td>\n<td> NetBios <\/td>\n<td> HTTP Backdoor <\/td>\n<td> 2020-08-26 <\/td>\n<\/tr>\n<tr>\n<td> lhc_2f <\/td>\n<td><\/td>\n<td> NetBios <\/td>\n<td> HTTP Backdoor <\/td>\n<td> 2020-04-18 <\/td>\n<\/tr>\n<tr>\n<td> lufkintexas.net <\/td>\n<td> Lufkin (City in Texas) <\/td>\n<td> NetBios <\/td>\n<td> HTTP Backdoor <\/td>\n<td> 2020-07-07 <\/td>\n<\/tr>\n<tr readability=\"2\">\n<td> magnoliaisd.loc <\/td>\n<td> Magnolia Independent <br \/>School District <\/td>\n<td> NetBios <\/td>\n<td> HTTP Backdoor <\/td>\n<td> 2020-06-01 <\/td>\n<\/tr>\n<tr>\n<td> MOC.l <\/td>\n<td><\/td>\n<td> NetBios <\/td>\n<td> HTTP Backdoor <\/td>\n<td> 2020-04-30 <\/td>\n<\/tr>\n<tr>\n<td> moncton.loc <\/td>\n<td> City of Moncton <\/td>\n<td> NetBios <\/td>\n<td> HTTP Backdoor <\/td>\n<td> 2020-08-25 <\/td>\n<\/tr>\n<tr>\n<td> mountsinai.hosp <\/td>\n<td> Mount Sinai Hospital <\/td>\n<td> NetBios <\/td>\n<td> HTTP Backdoor <\/td>\n<td> 2020-07-02 <\/td>\n<\/tr>\n<tr readability=\"2\">\n<td> netdecisions.lo <\/td>\n<td> Netdecisions (IT services) <\/td>\n<td> NetBios <\/td>\n<td> HTTP Backdoor <\/td>\n<td> 2020-10-04 <\/td>\n<\/tr>\n<tr>\n<td> newdirections.k <\/td>\n<td><\/td>\n<td> NetBios <\/td>\n<td> HTTP Backdoor <\/td>\n<td> 2020-04-21 <\/td>\n<\/tr>\n<tr>\n<td> nswhealth.net <\/td>\n<td> NSW Health <\/td>\n<td> NetBios <\/td>\n<td> HTTP Backdoor <\/td>\n<td> 2020-06-12 <\/td>\n<\/tr>\n<tr>\n<td> nzi_9p <\/td>\n<td><\/td>\n<td> NetBios <\/td>\n<td> HTTP Backdoor <\/td>\n<td> 2020-08-04 <\/td>\n<\/tr>\n<tr readability=\"4\">\n<td> city.kingston.on.ca <\/td>\n<td> City of Kingston, <br \/>Ontario, Canada <\/td>\n<td> NetBios <\/td>\n<td> HTTP Backdoor <\/td>\n<td> 2020-06-15 <\/td>\n<\/tr>\n<tr readability=\"4\">\n<td> dufferincounty.on.ca <\/td>\n<td> Dufferin County, <br \/>Ontario, Canada <\/td>\n<td> NetBios <\/td>\n<td> HTTP Backdoor <\/td>\n<td> 2020-07-17 <\/td>\n<\/tr>\n<tr>\n<td> osb.local <\/td>\n<td><\/td>\n<td> NetBios <\/td>\n<td> HTTP Backdoor <\/td>\n<td> 2020-04-28 <\/td>\n<\/tr>\n<tr readability=\"2\">\n<td> oslerhc.org <\/td>\n<td> William Osler Health System <\/td>\n<td> NetBios <\/td>\n<td> HTTP Backdoor <\/td>\n<td> 2020-07-11 <\/td>\n<\/tr>\n<tr>\n<td> pageaz.gov <\/td>\n<td> City of Page <\/td>\n<td> NetBios <\/td>\n<td> HTTP Backdoor <\/td>\n<td> 2020-04-19 <\/td>\n<\/tr>\n<tr readability=\"2\">\n<td> pcsco.com <\/td>\n<td> Professional Computer Systems <\/td>\n<td> NetBios <\/td>\n<td> HTTP Backdoor <\/td>\n<td> 2020-07-23 <\/td>\n<\/tr>\n<tr>\n<td> pkgix_ <\/td>\n<td><\/td>\n<td> NetBios <\/td>\n<td> HTTP Backdoor <\/td>\n<td> 2020-07-15 <\/td>\n<\/tr>\n<tr>\n<td> pqcorp.com <\/td>\n<td> PQ Corporation <\/td>\n<td> NetBios <\/td>\n<td> HTTP Backdoor <\/td>\n<td> 2020-07-02 <\/td>\n<\/tr>\n<tr>\n<td> prod.hamilton. <\/td>\n<td> Hamilton Company <\/td>\n<td> NetBios <\/td>\n<td> HTTP Backdoor <\/td>\n<td> 2020-08-19 <\/td>\n<\/tr>\n<tr readability=\"2\">\n<td> resprod.com <\/td>\n<td> Res Group (Renewable <br \/>energy company) <\/td>\n<td> NetBios <\/td>\n<td> HTTP Backdoor <\/td>\n<td> 2020-05-06 <\/td>\n<\/tr>\n<tr>\n<td> RPM.l <\/td>\n<td><\/td>\n<td> NetBios <\/td>\n<td> HTTP Backdoor <\/td>\n<td> 2020-05-28 <\/td>\n<\/tr>\n<tr readability=\"2\">\n<td> sdch.local <\/td>\n<td> South Davis <br \/>Community Hospital <\/td>\n<td> NetBios <\/td>\n<td> HTTP Backdoor <\/td>\n<td> 2020-05-18 <\/td>\n<\/tr>\n<tr>\n<td> servitia.intern <\/td>\n<td><\/td>\n<td> NetBios <\/td>\n<td> HTTP Backdoor <\/td>\n<td> 2020-06-16 <\/td>\n<\/tr>\n<tr>\n<td> sfsi.stearnsban <\/td>\n<td> Stearns Bank <\/td>\n<td> NetBios <\/td>\n<td> HTTP Backdoor <\/td>\n<td> 2020-08-02 <\/td>\n<\/tr>\n<tr>\n<td> signaturebank.l <\/td>\n<td> Signature Bank <\/td>\n<td> NetBios <\/td>\n<td> HTTP Backdoor <\/td>\n<td> 2020-06-25 <\/td>\n<\/tr>\n<tr>\n<td> sm-group.local <\/td>\n<td> SM Group (Distribution) <\/td>\n<td> NetBios <\/td>\n<td> HTTP Backdoor <\/td>\n<td> 2020-07-07 <\/td>\n<\/tr>\n<tr readability=\"2\">\n<td> te.nz <\/td>\n<td> TE Connectivity (Sensor <br \/>manufacturer) <\/td>\n<td> NetBios <\/td>\n<td> HTTP Backdoor <\/td>\n<td> 2020-05-13 <\/td>\n<\/tr>\n<tr>\n<td> thx8xb <\/td>\n<td><\/td>\n<td> NetBios <\/td>\n<td> HTTP Backdoor <\/td>\n<td> 2020-06-16 <\/td>\n<\/tr>\n<tr>\n<td> tx.org <\/td>\n<td><\/td>\n<td> NetBios <\/td>\n<td> HTTP Backdoor <\/td>\n<td> 2020-07-15 <\/td>\n<\/tr>\n<tr>\n<td> usd373.org <\/td>\n<td> Newton Public Schools <\/td>\n<td> NetBios <\/td>\n<td> HTTP Backdoor <\/td>\n<td> 2020-08-01 <\/td>\n<\/tr>\n<tr>\n<td> uzq <\/td>\n<td><\/td>\n<td> NetBios <\/td>\n<td> HTTP Backdoor <\/td>\n<td> 2020-10-02 <\/td>\n<\/tr>\n<tr>\n<td> ville.terrebonn <\/td>\n<td> Ville de Terrebonne <\/td>\n<td> NetBios <\/td>\n<td> HTTP Backdoor <\/td>\n<td> 2020-08-02 <\/td>\n<\/tr>\n<tr readability=\"2\">\n<td> wrbaustralia.ad <\/td>\n<td> W. R. Berkley Insurance Australia <\/td>\n<td> NetBios <\/td>\n<td> HTTP Backdoor <\/td>\n<td> 2020-07-11 <\/td>\n<\/tr>\n<tr>\n<td> ykz <\/td>\n<td><\/td>\n<td> NetBios <\/td>\n<td> HTTP Backdoor <\/td>\n<td> 2020-07-11 <\/td>\n<\/tr>\n<tr>\n<td> 2iqzth <\/td>\n<td><\/td>\n<td> ImpLink <\/td>\n<td> Enum processes <\/td>\n<td> 2020-06-17 <\/td>\n<\/tr>\n<tr readability=\"2\">\n<td> 3if.2l <\/td>\n<td> 3IF (Industrial Internet) <\/td>\n<td> ImpLink <\/td>\n<td> Enum processes <\/td>\n<td> 2020-08-20 <\/td>\n<\/tr>\n<tr readability=\"2\">\n<td> airquality.org <\/td>\n<td> Sacramento Metropolitan <br \/>Air Quality Management District <\/td>\n<td> ImpLink <\/td>\n<td> Enum processes <\/td>\n<td> 2020-08-09 <\/td>\n<\/tr>\n<tr readability=\"2\">\n<td> ansc.gob.pe <\/td>\n<td> GOB&nbsp; (Digital Platform of <br \/>the Peruvian State) <\/td>\n<td> ImpLink <\/td>\n<td> Enum processes <\/td>\n<td> 2020-07-25 <\/td>\n<\/tr>\n<tr>\n<td> bcofsa.com.ar <\/td>\n<td> Banco de Formosa <\/td>\n<td> ImpLink <\/td>\n<td> Enum processes <\/td>\n<td> 2020-07-13 <\/td>\n<\/tr>\n<tr>\n<td> bi.corp <\/td>\n<td><\/td>\n<td> ImpLink <\/td>\n<td> Enum processes <\/td>\n<td> 2020-12-14 <\/td>\n<\/tr>\n<tr>\n<td> bop.com.pk <\/td>\n<td> The Bank of Punjab <\/td>\n<td> ImpLink <\/td>\n<td> Enum processes <\/td>\n<td> 2020-09-18 <\/td>\n<\/tr>\n<tr>\n<td> camcity.local <\/td>\n<td><\/td>\n<td> ImpLink <\/td>\n<td> Enum processes <\/td>\n<td> 2020-08-07 <\/td>\n<\/tr>\n<tr>\n<td> cow.local <\/td>\n<td><\/td>\n<td> ImpLink <\/td>\n<td> Enum processes <\/td>\n<td> 2020-06-13 <\/td>\n<\/tr>\n<tr>\n<td> deniz.denizbank <\/td>\n<td> DenizBank <\/td>\n<td> ImpLink <\/td>\n<td> Enum processes <\/td>\n<td> 2020-11-14 <\/td>\n<\/tr>\n<tr readability=\"2\">\n<td> ies.com <\/td>\n<td> IES Communications&nbsp; <br \/>(Communications technology) <\/td>\n<td> ImpLink <\/td>\n<td> Enum processes <\/td>\n<td> 2020-06-11 <\/td>\n<\/tr>\n<tr>\n<td> insead.org <\/td>\n<td> INSEAD Business School <\/td>\n<td> ImpLink <\/td>\n<td> Enum processes <\/td>\n<td> 2020-11-07 <\/td>\n<\/tr>\n<tr>\n<td> KS.LO <\/td>\n<td><\/td>\n<td> ImpLink <\/td>\n<td> Enum processes <\/td>\n<td> 2020-07-10 <\/td>\n<\/tr>\n<tr readability=\"2\">\n<td> mixonhill.com <\/td>\n<td> Mixon Hill (intelligent <br \/>transportation systems) <\/td>\n<td> ImpLink <\/td>\n<td> Enum processes <\/td>\n<td> 2020-04-29 <\/td>\n<\/tr>\n<tr>\n<td> ni.corp.natins <\/td>\n<td><\/td>\n<td> ImpLink <\/td>\n<td> Enum processes <\/td>\n<td> 2020-10-24 <\/td>\n<\/tr>\n<tr readability=\"3\">\n<td> phabahamas.org <\/td>\n<td> Public Hospitals Authority, <br \/>Caribbean <\/td>\n<td> ImpLink <\/td>\n<td> Enum processes <\/td>\n<td> 2020-11-05 <\/td>\n<\/tr>\n<tr>\n<td> rbe.sk.ca <\/td>\n<td> Regina Public Schools <\/td>\n<td> ImpLink <\/td>\n<td> Enum processes <\/td>\n<td> 2020-08-20 <\/td>\n<\/tr>\n<tr>\n<td> spsd.sk.ca <\/td>\n<td> Saskatoon Public Schools <\/td>\n<td> ImpLink <\/td>\n<td> Enum processes <\/td>\n<td> 2020-06-12 <\/td>\n<\/tr>\n<tr readability=\"2\">\n<td> yorkton.cofy <\/td>\n<td> Community Options for <br \/>Families &amp; Youth <\/td>\n<td> ImpLink <\/td>\n<td> Enum processes <\/td>\n<td> 2020-05-08 <\/td>\n<\/tr>\n<tr>\n<td> .sutmf <\/td>\n<td><\/td>\n<td> Ipx <\/td>\n<td> Update config <\/td>\n<td> 2020-06-25 <\/td>\n<\/tr>\n<tr>\n<td> atg.local <\/td>\n<td><\/td>\n<td> No Match <\/td>\n<td> Unknown <\/td>\n<td> 2020-05-11 <\/td>\n<\/tr>\n<tr readability=\"2\">\n<td> bisco.int <\/td>\n<td> Bisco International <br \/>(Adhesives and tapes) <\/td>\n<td> No Match <\/td>\n<td> Unknown <\/td>\n<td> 2020-04-30 <\/td>\n<\/tr>\n<tr>\n<td> ccscurriculum.c <\/td>\n<td><\/td>\n<td> No Match <\/td>\n<td> Unknown <\/td>\n<td> 2020-04-18 <\/td>\n<\/tr>\n<tr readability=\"2\">\n<td> e-idsolutions. <\/td>\n<td> IDSolutions (video conferencing) <\/td>\n<td> No Match <\/td>\n<td> Unknown <\/td>\n<td> 2020-07-16 <\/td>\n<\/tr>\n<tr>\n<td> ETC1. <\/td>\n<td><\/td>\n<td> No Match <\/td>\n<td> Unknown <\/td>\n<td> 2020-08-01 <\/td>\n<\/tr>\n<tr>\n<td> gk5 <\/td>\n<td><\/td>\n<td> No Match <\/td>\n<td> Unknown <\/td>\n<td> 2020-07-09 <\/td>\n<\/tr>\n<tr>\n<td> grupobazar.loca <\/td>\n<td><\/td>\n<td> No Match <\/td>\n<td> Unknown <\/td>\n<td> 2020-06-07 <\/td>\n<\/tr>\n<tr>\n<td> internal.hws.o <\/td>\n<td><\/td>\n<td> No Match <\/td>\n<td> Unknown <\/td>\n<td> 2020-05-23 <\/td>\n<\/tr>\n<tr>\n<td> n2k <\/td>\n<td><\/td>\n<td> No Match <\/td>\n<td> Unknown <\/td>\n<td> 2020-07-12 <\/td>\n<\/tr>\n<tr>\n<td> publiser.it <\/td>\n<td><\/td>\n<td> No Match <\/td>\n<td> Unknown <\/td>\n<td> 2020-07-05 <\/td>\n<\/tr>\n<tr>\n<td> us.deloitte.co <\/td>\n<td> Deloitte <\/td>\n<td> No Match <\/td>\n<td> Unknown <\/td>\n<td> 2020-07-08 <\/td>\n<\/tr>\n<tr>\n<td> ush.com <\/td>\n<td><\/td>\n<td> No Match <\/td>\n<td> Unknown <\/td>\n<td> 2020-06-15 <\/td>\n<\/tr>\n<tr>\n<td> xijtt- <\/td>\n<td><\/td>\n<td> No Match <\/td>\n<td> Unknown <\/td>\n<td> 2020-07-21 <\/td>\n<\/tr>\n<tr readability=\"2\">\n<td> xnet.kz <\/td>\n<td> X NET (IT provider in Kazakhstan) <\/td>\n<td> No Match <\/td>\n<td> Unknown <\/td>\n<td> 2020-06-09 <\/td>\n<\/tr>\n<tr>\n<td> zu0 <\/td>\n<td><\/td>\n<td> No Match <\/td>\n<td> Unknown <\/td>\n<td> 2020-08-13 <\/td>\n<\/tr>\n<tr>\n<td> staff.technion.ac.il <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> digitalreachinc.com <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> orient-express.com <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> tr.technion.ac.il <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> lasers.state.la.us <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> ABLE. <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> abmuh_ <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> acmedctr.ad <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> ad.azarthritis.com <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> ad.library.ucla.edu <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> ad.optimizely. <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> admin.callidusc <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> aerioncorp.com <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> agloan.ads <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> ah.org <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> AHCCC <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> allegronet.co. <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> alm.brand.dk <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> amalfi.local <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> americas.phoeni <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> amr.corp.intel <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> apu.mn <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> ARYZT <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> b9f9hq <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> BE.AJ <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> belkin.com <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> bk.local <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> bmrn.com <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> bok.com <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> btb.az <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> c4e-internal.c <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> calsb.org <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> casino.prv <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> cda.corp <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> central.pima.g <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> cfsi.local <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> ch.local <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> ci.dublin.ca. <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> cisco.com <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> corp.dvd.com <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> corp.sana.com <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> Count <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> COWI. <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> coxnet.cox.com <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> CRIHB <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> cs.haystax.loc <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> csa.local <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> csci-va.com <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> csqsxh <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> DCCAT <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> deltads.ent <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> detmir-group.r <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> dhhs- <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> dmv.state.nv. <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> dotcomm.org <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> DPCIT <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> dskb2x <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> e9.2pz <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> ebe.co.roanoke.va.us <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> ecobank.group <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> ecocorp.local <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> epl.com <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> fremont.lamrc. <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> FSAR. <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> ftfcu.corp <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> gksm.local <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> gloucesterva.ne <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> glu.com <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> gnb.local <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> gncu.local <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> gsf.cc <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> gyldendal.local <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> helixwater.org <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> hgvc.com <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> ia.com <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> inf.dc.net <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> ingo.kg <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> innout.corp <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr readability=\"2\">\n<td> int.lukoil-international.uz <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> intensive.int <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> ions.com <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> its.iastate.ed <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> jarvis.lab <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> -jlowd <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> jn05n8 <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> jxb3eh <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> k.com <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> LABEL <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> milledgeville.l <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> nacr.com <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> ncpa.loc <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> neophotonics.co <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> net.vestfor.dk <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> nih.if <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> nvidia.com <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> on-pot <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> ou0yoy <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> paloverde.local <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> pl8uw0 <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> q9owtt <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> rai.com <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> rccf.ru <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> repsrv.com <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> ripta.com <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> roymerlin.com <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> rs.local <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> rst.atlantis-pak.ru <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> sbywx3 <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> sc.pima.gov <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> scif.com <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> SCMRI <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> scroot.com <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> seattle.interna <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> securview.local <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> SFBAL <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> SF-Li <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> siskiyous.edu <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> sjhsagov.org <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> Smart <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> smes.org <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> sos-ad.state.nv.us <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> sro.vestfor.dk <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> superior.local <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> swd.local <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> ta.org <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> taylorfarms.com <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> thajxq <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> thoughtspot.int <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> tsyahr <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> tv2.local <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> uis.kent.edu <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> uncity.dk <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> uont.com <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> viam-invenient <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> vms.ad.varian.com <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> vsp.com <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> WASHO <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> weioffice.com <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> wfhf1.hewlett. <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> woodruff-sawyer <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> HQ.RE-wwgi2xnl <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> xdxinc.net <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> y9k.in <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> zeb.i8 <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<tr>\n<td> zippertubing.co <\/td>\n<td><\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<td> N\/A <\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>undefined <\/p>\n<div class=\"relatedContent alignNone\">\n<h3 class=\"heading\"> <span class=\"int\">SolarWinds Coverage<\/span> <\/h3>\n<\/p><\/div>\n<p> READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/partial-lists-of-organizations-infected-with-sunburst-malware-released-online\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As security researchers dig through forensic evidence in the aftermath of the SolarWinds supply chain attack, victim names are slowly starting to surface.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":38901,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-38900","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Partial lists of organizations infected with Sunburst malware released online 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/partial-lists-of-organizations-infected-with-sunburst-malware-released-online\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Partial lists of organizations infected with Sunburst malware released online 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/partial-lists-of-organizations-infected-with-sunburst-malware-released-online\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-12-21T20:40:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/12\/partial-lists-of-organizations-infected-with-sunburst-malware-released-online.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"515\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"16 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/partial-lists-of-organizations-infected-with-sunburst-malware-released-online\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/partial-lists-of-organizations-infected-with-sunburst-malware-released-online\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Partial lists of organizations infected with Sunburst malware released online\",\"datePublished\":\"2020-12-21T20:40:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/partial-lists-of-organizations-infected-with-sunburst-malware-released-online\\\/\"},\"wordCount\":3211,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/partial-lists-of-organizations-infected-with-sunburst-malware-released-online\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/partial-lists-of-organizations-infected-with-sunburst-malware-released-online.jpg\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/partial-lists-of-organizations-infected-with-sunburst-malware-released-online\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/partial-lists-of-organizations-infected-with-sunburst-malware-released-online\\\/\",\"name\":\"Partial lists of organizations infected with Sunburst malware released online 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/partial-lists-of-organizations-infected-with-sunburst-malware-released-online\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/partial-lists-of-organizations-infected-with-sunburst-malware-released-online\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/partial-lists-of-organizations-infected-with-sunburst-malware-released-online.jpg\",\"datePublished\":\"2020-12-21T20:40:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/partial-lists-of-organizations-infected-with-sunburst-malware-released-online\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/partial-lists-of-organizations-infected-with-sunburst-malware-released-online\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/partial-lists-of-organizations-infected-with-sunburst-malware-released-online\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/partial-lists-of-organizations-infected-with-sunburst-malware-released-online.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/partial-lists-of-organizations-infected-with-sunburst-malware-released-online.jpg\",\"width\":1000,\"height\":515},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/partial-lists-of-organizations-infected-with-sunburst-malware-released-online\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Partial lists of organizations infected with Sunburst malware released online\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Partial lists of organizations infected with Sunburst malware released online 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/partial-lists-of-organizations-infected-with-sunburst-malware-released-online\/","og_locale":"en_US","og_type":"article","og_title":"Partial lists of organizations infected with Sunburst malware released online 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/partial-lists-of-organizations-infected-with-sunburst-malware-released-online\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-12-21T20:40:00+00:00","og_image":[{"width":1000,"height":515,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/12\/partial-lists-of-organizations-infected-with-sunburst-malware-released-online.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"16 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/partial-lists-of-organizations-infected-with-sunburst-malware-released-online\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/partial-lists-of-organizations-infected-with-sunburst-malware-released-online\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Partial lists of organizations infected with Sunburst malware released online","datePublished":"2020-12-21T20:40:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/partial-lists-of-organizations-infected-with-sunburst-malware-released-online\/"},"wordCount":3211,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/partial-lists-of-organizations-infected-with-sunburst-malware-released-online\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/12\/partial-lists-of-organizations-infected-with-sunburst-malware-released-online.jpg","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/partial-lists-of-organizations-infected-with-sunburst-malware-released-online\/","url":"https:\/\/www.threatshub.org\/blog\/partial-lists-of-organizations-infected-with-sunburst-malware-released-online\/","name":"Partial lists of organizations infected with Sunburst malware released online 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/partial-lists-of-organizations-infected-with-sunburst-malware-released-online\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/partial-lists-of-organizations-infected-with-sunburst-malware-released-online\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/12\/partial-lists-of-organizations-infected-with-sunburst-malware-released-online.jpg","datePublished":"2020-12-21T20:40:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/partial-lists-of-organizations-infected-with-sunburst-malware-released-online\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/partial-lists-of-organizations-infected-with-sunburst-malware-released-online\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/partial-lists-of-organizations-infected-with-sunburst-malware-released-online\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/12\/partial-lists-of-organizations-infected-with-sunburst-malware-released-online.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/12\/partial-lists-of-organizations-infected-with-sunburst-malware-released-online.jpg","width":1000,"height":515},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/partial-lists-of-organizations-infected-with-sunburst-malware-released-online\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Partial lists of organizations infected with Sunburst malware released online"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/38900","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=38900"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/38900\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/38901"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=38900"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=38900"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=38900"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}