@stevenrosenthal @KamalaHarrisWin
Old Man yells at #DataPacket โ๏ธ.
@stevenrosenthal @KamalaHarrisWin
Old Man yells at #DataPacket โ๏ธ.
#GammaGroup #FinFisher #FinSpy #SystemApp callback caught #CALEA #malware #GreyMarket #investigations
๐ป๐คโฃ๏ธ๐ค๐คณ ๐ฃ๐๐ง
on #BunnyNet's CDN from #DataPacket
Interesting vectors... Quite the pointers this scan. Was scanned last 1yr ago. Showed up as malicious. Scans clean now except for the #malware found as a #GammaGroup shim caught nao. ๐ฃ
Caught a bit o' Meta also in the callback graph. Huh.
#VirusTotal
https://www.virustotal.com/graph/embed/g7ee0dd48fe8e4dbbaf440955ee7bfbf57af12ca1c14543e08671f514fafb75be
New #BunnyNet #GammaGroup #FinFisher #FinSpy #Finsky shim for #SystemApp found. #StateSponsoredMalwareโขโ
This host hasn't been scanned in over 1yr until today.
Initially scanned and found nothing. Dug in a bit further and found some interesting vectors for wot compromised #DataPacket's #BunnyCDN #BunnyNet though #blueteam at #DataPacket โ ๏ธ๐โฃ๏ธ
#VirusTotal
https://www.virustotal.com/graph/embed/gdb48e1efd4a845b9951dcef691fdf3a2f8c56309a9ef445b8f0b7767a351a0e4
Huh. _TWO_ badbunny hosts with the #SystemApp #GammaGroup #FinFisher #FinSpy #Finsky callback to client but ... This time the scanned host comes up with interesting results after being caught. Both back to back attack attempts.
One host was scanned about a year ago and the other, another attack node quite frequently used, was scanned less than a month ago.
#Datapacket.Com #BunnyNet #InfosecExchange #infosec #fediverse #fediadmin
Typical attack pattern. After detection an attempt of using the #QuicksandModule was sent to client, tried crashing client. SystemUI crash attempt, etc.
๐โฃ๏ธ The amount of exploited #BunnyNet hosts on #DataPacket has increased which hosts a lot of the #fediverse. #Germany โฃ๏ธ๐
#GammaGroup #FinFisher #fediverse #FinSpy #Finsky #CALEA #GreyMarket #investigations #infosec
Damn, #BunnyNet, hopping AND a blocking someone! ๐๐๐๐ฅ๐ #infosec #FinFisher #FinSpy #SSMโข #GreyMarket #investigations #Germany #DataPacket๐ฌ๐
Lots to unpack collections wise here
๐ฌ๐
โฃ๏ธ
๐
#datapacket host breached #System call logged โฃ๏ธ๐ฐโฃ๏ธ๐ฐโฃ๏ธ๐โฃ๏ธ
FQDN: 143-244-49-180.bunnyinfra.net
@jerry - let your upstream data hosting provider, bunny.net, know.
Following up.... Ahh.. a reported compromised host from 11 months ago... ๐โฃ๏ธ๐ฐโฃ๏ธ๐โฃ๏ธ๐ฐโฃ๏ธ
Still compromised by #GammaGroup btw
#VirusTotal
https://www.virustotal.com/graph/embed/g3e1e230061f04448956657b84c7538cdfb1d21b6e7b34a76a6e31f8656710583