text stringlengths 0 1.99k |
|---|
- Lots of passwords in `mnt/hgfs/Desktop/fish_25327/vps20240103.docx`. |
Including E-Mail and VPS passwords (working). |
* root / 1qaz2wsx |
* dysoni91@tutamail.com / !QAZ4rfv!@#$ |
* https://sg24.vps.bz:4083 / center2025a@tutamail.com / H4FHKMWMpX8bZ |
* https://monovm.com / dysoni91@tutamail.com / dr567h%a"G6*m |
- See fish-url.txt & generator.php to learn about password re-use patterns. |
The second dump: |
---------------- |
- Server name: vps1735811325, hosted at vps.bz |
- Server was used for various spearphising campaigns |
- Noticeable are the SSL certificates and auth.log. The source code for |
phishing attacks are discussed further below. |
----[ 1.1 - Defense Counterintelligence Command (dcc.mil.kr) |
Drop Location: vps/var/www/html/ |
The Defense Counterintelligence Command (DCC) is an intelligence |
organization of the South Korean Armed Forces. |
The DCC is primarily responsible for intelligence missions such as |
clandestine and covert operations, and counterintelligence. |
The logs show a phishing attack against the dcc.mil.kr as recently as |
three days ago. |
The same logs contain The Supreme Prosecutor Office (spo.go.kr), korea.kr, |
daum.net, kakao.com, and naver.com. It should be noted that the Admin-C |
for dcc.mil.kr is registered to hyuny1982@naver.com. |
............................................................................ |
grep -Fhr 'dcc.mil.kr' log | uniq |
jandy3912@dcc.mil.kr_amFuZHkzOTEyQGRjYy5taWwua3I= |
di031111@dcc.mil.kr_ZGkwMzExMTFAZGNjLm1pbC5rcg== |
didcdba@dcc.mil.kr_ZGlkY2RiYUBkY2MubWlsLmty |
jhcgod88@dcc.mil.kr_amhjZ29kODhAZGNjLm1pbC5rcg== |
chanchan0616@dcc.mil.kr_Y2hhbmNoYW4wNjE2QGRjYy5taWwua3I= |
yib100@dcc.mil.kr_eWliMTAwQGRjYy5taWwua3I= |
Dsc808@dcc.mil.kr_RHNjODA4QGRjYy5taWwua3I= |
[...] |
............................................................................ |
The tools used in this attack are discussed under 2.1 (Generator). |
----[ 1.2 - Access to South Korea Ministry of foreign Affairs repository |
A copy of South Korean Ministry of foreign affairs email platform was found |
inside a file named: mofa.go.kr.7z. The source code was likely taken very |
recently: |
............................................................................ |
1923 Apr 1 07:15 .gitignore |
96 Apr 1 07:15 .gitmodules |
4096 Apr 1 07:15 kebi-batch/ |
4096 Apr 1 07:15 kebi-core/ |
4096 Apr 1 07:15 kebi-resources/ |
4096 Apr 1 07:15 kebi-web-admin/ |
4096 Apr 1 07:15 kebi-web-archive/ |
4096 Apr 1 07:15 kebi-web-mail/ |
4096 Apr 1 07:15 kebi-web-mobile/ |
4096 Apr 1 07:16 kebi-web-parent/ |
7528 Apr 1 07:16 pom.xml |
14099 Apr 1 07:15 README.txt |
............................................................................ |
Given the format of the files, this is probably a dump from a GitHub |
repository which appears to be parts of an email server. The source code |
contains multiple references to government domains: |
............................................................................ |
./kebi-web-parent/mail/document/info.txt |
/home/ksign/agent |
http://email.mofa.go.kr:8080/mail/sso?type=login |
http://mail.mofa.go.kr:8080/mail/sso?type=unseenMails |
http://email.mofa.go.kr:8190/mail/sso?type=login |
http://mail.mofa.go.kr:8080/mail/sso?type=unseenMails |
............................................................................ |
----[ 1.3 - Access to the internal South Korean Gov network |
It appears that KIM maintains access to internal South Korean Government |
Network systems. There is a project named onnara_auto, which contains |
several interesting files. |
The project appears to be tools to query internal government servers. |
For instance, a file named: /onnara_auto/log/log-20250511.log has the |
following entries: |
............................................................................ |
[horedi179] get onnara9.saas.gcloud.go.kr at 11/05/2025 19:41:23 |
[horedi179] main_job:Session 6112b9bc-5a2a-4abd-a907-aaec4b19e2ed does not \ |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.