Some more hints on the Exploit:
- Related to #Spring4Shell
- Created by #BrazenEagle
- Related to ldap-auth demon used together with #Nginx
@_Blue_hornet Another Update containing a potential temporary #workaround has been pushed to Github just now.
Also confirming that #ldap-auth daemon is indeed vulnerable. Also mentioning that @Atlassian accounts are affected.
@campuscodi So as this Tweet is getting some reach, some might be asking themselves how @_Blue_hornet operates. @PogoWasRight did an interview with them arround 6 days ago and I think it is worth a read :)
@_Blue_hornet@Atlassian For those who want/need even more info, here is an internal message by ATW on this #exploit and its capabilities.
Seems ATW is unsure for now if it is an #LDAP issue or if its only affecting #Nginx
Ok, as this tweet get's way more exposure then I am used to, please keep the following in mind:
Everything I share is based on claims by @_Blue_hornet .
I have not seen a PoC, I have not seen a successfull exploitation and I do not know if any of this is true.
I do not warrant!
@_Blue_hornet@Atlassian So, in an unexpected turn of events @_Blue_hornet went dark.
They suggested its forever.
I am unsure how to procede now.
A lot of noise I willingly shared as I trusted in them and now this.
For the time beeing, I will quote my tweet from before:
So it seems @_Blue_hornet has updated the Github Repo several times since my last tweet.
Nothing too important in my eyes, but mentioning it just in case: github.com/AgainstTheWest…
At least shows that he/they are still maintaining the Repo :)
As several people have pointed out, it seems @nginx has released an article about the vulnerability described above. The article points out ways to mitigate and states that ONLY THE #Nginx REFERENCE IMPLEMENTATION IS AFFECTED.
So @censysio just deployed the "suspicious-open-dir" label to their search engine.
So far it appears a game changer, giving very solid hit rates on finding malicious infrastructure.
So for today, this will be a thread documenting my findings using the new feature.
1/x
@censysio Starting of, we have
hxxps://dev.deutsche-privatbank[.]de/
It does not need a genius to understand that this is someones #phishing setup.
Thanks to an exposed .git file we can clearly see that the tool used is:
@censysio @DeutscheBank We will continue with:
ihelpdesk.mbsbbanks[.]com
at 51.79.159[.]162
#phishing for #Google credentials.
Since the kit is packed in an awareness. zip file, this might actually be a #RedTeaming setup.
Otherwhise I would expect some sort of 2FA phishing...
Also: @MyTouchnGo 3/x
The #ContiLeaks contained some messages consisting of IP:Username:pass combinations for #Conti infrastructure.
This allows us to connect certain #Trickbot activcity with the #Conti group:
1/x
The IP's in the image are the following:
117.252.69[.]134
117.252.68[.]15
116.206.153[.]212
103.78.13[.]150
103.47.170[.]131
103.47.170[.]130
118.91.190[.]42
117.197.41[.]36
117.222.63[.]77
117.252.69[.]210
2/x
Using @MaltegoHQ together with OTX/Alienvault and @virustotal integration, we are able to connect several of these IP's to #Trickbot activity: