We have identified yet another ongoing IP hijacking operation primarily involving dormant APNIC IPv4 address space. Hanging off unallocated AS146887, previously used by ๐ฎ๐ณ NOOB TECHNOLOGIES PRIVATE LIMITED, the operation consists of:
โก๏ธ AS17994 (๐ณ๐ฟ Appserv Limited, merged out of existence in 2017)
โก๏ธ AS132899 (๐ญ๐ฐ/๐น๐ผ/๐ฌ๐ง URNET SOLUTIONS LTD., their UK-based entity dissolved in 2016)
โก๏ธ AS328819 (๐ฟ๐ฆ Bluecentrix PTY LTD a/k/a Smartswitch, liquidated following a 2024 court order)
As is so often in IP hijacking incidents, their network resources fell through the cracks when the company went out of business.
The miscreants, however, moved swiftly, identifying such orphaned allocations, re-registering involved domains, if necessary, and seeking a means to bring them back online for facilitation of their nefarious purposes, most frequently, snowshoe spamming.
In this case, the re-registered domains appserv[.]co[.]nz and bluecentrix[.]co[.]za even surface on the same Cloudflare nameservers, indicating the same threat actor being responsible for both hijacking incidents.
Uplink of this operation is ๐ท๐บ JSC TransTeleCom (AS20485), an ISP with a history of routing rogue ASNs. Spamhaus currently observes St. Petersburg-based TransTeleCom routers providing connectivity to AS146887.
Needless to say, all IP networks and Autonomous Systems are listed in Spamhaus's DROP lists โคต๏ธ
https://www.spamhaus.org/blocklists/do-not-route-or-peer/
If you don't already, start using them!
See https://www.spamhaus.org/resource-hub/hijacking/ for more insights into IP hijacking and involved TTPs, and keep an eye out for write-ups on the inevitable next IP hijacking incident. ๐ต๏ธ