text
stringlengths
0
1.99k
............................................................................
unikorea123$
unikorea1!!
unikorea100
unikorea625!
[...]
............................................................................
Drop location: work/home/user/Downloads/cert/dict/pass.txt
----[ 3.4 Hypothesis on AiTM attack against Microsoft users
In the middle of 2022, an AiTM attack was detected and reported by
Microsoft[#5] and Zscaler[#6]. The principal of the attack is the use of a
web server that acts as a proxy between the legitimate login page and the
victim.
The victims were sent an email, inviting them to click on a HTML attachment.
When opened, they would be redirected to the proxy via HTTPS. The proxy
would then forward any request to the Microsoft server (re-encrypt the data
via HTTPS).
Once logged in, the proxy would record the session cookie and redirect the
victim to the Microsoft server.
The stolen cookie is valid and can be used by the attacker without any
further MFA.
The domain used for this campaign was websecuritynotice.com [#7].
While this exact domain was not found on this threat actor's system, a
very similar one was used (notice the additional 's'):
............................................................................
subject=CN=*.websecuritynotices.com
............................................................................
Drop location: vps/etc/letsencrypt/live/websecuritynotices.com  
The Tactics, Techniques, and Procedures (TTPs), the similarity of domain
names, and post-exploitation activities (payment fraud, ...) show a strong
link to Kimsuky.
----[ 3.5 Is KIM Chinese?
KIM uses Google to translates Korean into simplified Chinese. He does seem
to understand some (very little) Korean without translating.
KIM follows the Chinese public holiday schedule: May 31st - June 2nd was the
Dragon Boat Festival. KIM was not working during this time whereas in North
Korea this would have been a normal working day.
However, using https://github.com/obsidianforensics/hindsight, his Chrome
settings reveal that KIM is on "Korean Standard Time".
We cautiously believe that KIM is chinese but fulfills the agenda of North
Korea (hacking mostly South Korea) and China (hacking Taiwain) alike.
----[ 3.6 Fun facts and laughables
In September 2023, "KIM" attempted to purchase the domain name
'nextforum-online.com' at namecheap.com. The payments could be made using
Bitcoin, what could go wrong?
A few days later, namecheap.com disabled the domain without given an
explanation. When "KIM" asked to have it unblocked, namecheap.com requested
the following:
............................................................................
In order to verify the legitimacy of the registered domain(s), please
provide us with the following information:
* The purpose of the registration of the domain<br>
* The documentation confirming the authorization to act on behalf of
Microsoft or a confirmation that the domain(s) in question is not
associated with it.
............................................................................
=> LOL, afterall, the namecheap.com is not so bulletproof :)
----------------------------------------------------------------------------
Another fun-fact: In 2020, when websecuritynotice.com was used in a
phishing campaign, the owner created several subdomains of realistic
URLs for the phishing attacks:
............................................................................
login.websecuritynotice.com. IN A 80.240.25.169
wwwoffice.websecuritynotice.com. IN A 80.240.25.169
www-microsoft.websecuritynotice.com. IN A 80.240.25.169
prod-msocdn-25ae5ec6.websecuritynotice.com. IN A 80.240.25.169
prod-msocdn-55e5273a.websecuritynotice.com. IN A 80.240.25.169
prod-msocdn-84311529.websecuritynotice.com. IN A 80.240.25.169
prod-msocdn-c7b8a444.websecuritynotice.com. IN A 80.240.25.169
aadcdn-msauth-84311529.websecuritynotice.com. IN A 80.240.25.169
sts-glb-nokia-346189f1.websecuritynotice.com. IN A 80.240.25.169
res-cdn-office-84311529.websecuritynotice.com. IN A 80.240.25.169
aadcdn-msftauth-25ae5ec6.websecuritynotice.com. IN A 80.240.25.169
aadcdn-msftauth-55e5273a.websecuritynotice.com. IN A 80.240.25.169