<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>investigations Archives &#8226; Dectar</title>
	<atom:link href="https://dectar.com/tag/investigations/feed/" rel="self" type="application/rss+xml" />
	<link></link>
	<description>Prevent. Defend. React.</description>
	<lastBuildDate>Thu, 20 Mar 2025 11:56:11 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://dectar.com/wp-content/uploads/2024/07/Logo-Black-512-150x150.png</url>
	<title>investigations Archives &#8226; Dectar</title>
	<link></link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Capturing Next-Generation Malware That A Malicious User Was Trying To Deploy</title>
		<link>https://dectar.com/news/capturing-next-generation-malwares-that-a-malicious-user-was-trying-to-deploy/</link>
		
		<dc:creator><![CDATA[Stefan Umit Uygur]]></dc:creator>
		<pubDate>Mon, 10 Jun 2019 15:10:58 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Product updates]]></category>
		<category><![CDATA[investigations]]></category>
		<guid isPermaLink="false">https://blog.acsia.io/?p=384</guid>

					<description><![CDATA[<p>We have been very busy with the continuous development of ACSIA &#8211; one of the reasons why we have been very quiet on our blog for last months. Today I just have had an hour break and decided to dig into one particular incident that has been notified by ACSIA. This specific incident was not<a href="https://dectar.com/news/capturing-next-generation-malwares-that-a-malicious-user-was-trying-to-deploy/">Continue reading <span class="sr-only">"Capturing Next-Generation Malware That A Malicious User Was Trying To Deploy"</span></a></p>
<p>The post <a href="https://dectar.com/news/capturing-next-generation-malwares-that-a-malicious-user-was-trying-to-deploy/">Capturing Next-Generation Malware That A Malicious User Was Trying To Deploy</a> appeared first on <a href="https://dectar.com">Dectar</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>We have been very busy with the continuous development of <a href="https://dectar.com/acsia-xdr-plus/">ACSIA</a> &#8211; one of the reasons why we have been very quiet on our blog for last months.</p>



<p>Today I just have had an hour break and decided to dig into one particular incident that has been notified by ACSIA.</p>



<p>This specific incident was not a hack of our systems nor it was successful. Last night after I disconnected from work and went home, I received an alert notification on my mobile that intrigued me. </p>



<p>We receive numerous alerts and the majority are usually dealt with in an automated way thanks to ACSIA’s automated incident handling feature. </p>



<p>But this one got my attention very quickly just by reading the information provided by ACSIA within the notification.</p>



<p>It is worth mentioning that this instance of ACSIA is not a demo instance. We have our production server being monitored constantly and in real-time by ACSIA (our own product) to achieve 2 goals, namely to keep ACSIA in an ongoing test, and deliberately expose our critical servers to measure robustness from a security perspective. </p>



<p>ACSIA has several ways of notifying user, internally we usually use both email and Slack. Having Slack installed on my mobile I received this incident as a push notification on my phone.</p>



<p>Before I go on &#8211; here is a little background about why ACSIA’s automated incident handling feature did not automatically block this incident.</p>



<p>In &nbsp;ambiguous cases when ACSIA is not 100% sure about the legitimacy and the system intentionally passes the alert to the human operator, providing a comprehensive breakdown of all the details necessary for that operator to exercise appropriate judgement in terms of which action to take.</p>



<p>We fully understand the information overload issue with security products that flood business with alerts, and can potentially bring normal operations to a halt through triggering of false alerts, false positives etc. so ACSIA is designed to strike a refined balance in terms of automation and user alerts. This does mean that there are, relatively rare, cases where the user is handed the ball so-to-speak, but fully enabled to take direct action at the press of a button.</p>



<p>Now &#8211; back to the topic and the incident ACSIA has captured for us.</p>



<p>Below is the main screenshot where the notification was channeled through our Slack account and ACSIA incident notification channel:</p>



<figure class="wp-block-image"><img decoding="async" src="https://lh4.googleusercontent.com/69enUXNwYlcZaxlZEqHBsmhQydxHP7VPXchQ1IGZK3KAKxwtIhx20zClBrbEhmOH6-nfUKEdiPEha0tTsGT0wc-xBphHvuingqhSpnGAmni83cVI1zYYklg9MVeFERd5Rosd7Lec" alt=""/></figure>



<p>Also the same incident from ACSIA web UI:</p>



<figure class="wp-block-image"><img decoding="async" src="https://lh5.googleusercontent.com/oFyNbHpp7Um8-p8LlNr8LYuU-bUlgg6GD5nsMWdxiu71pthfZS8vds8rAr3FkriWAGa2pmUgfKZLCUflKirnBF-AGVv3OCr45u1YQysxeNAdedEEqRl9cr2Lrx2qv_uf1dgLcezc" alt=""/></figure>



<p>The incident speaks clearly. We have the source IP 121.3.42.193 and the targeted host which is our blog https://blog.acsia.io . It is actually where I am publishing this article <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f642.png" alt="🙂" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>



<p>The message provides us the web parameters, which is the exact string or sequence of events/actions that the malicious user tried to perform and execute.</p>



<p>We have the geographical location where the attack is originating.</p>



<p>We perform a simple WHOIS using one of options offered by ACSIA. This also to make sure the consistency of the geographical location traced by ACSIA.:</p>



<figure class="wp-block-image"><img decoding="async" src="https://lh6.googleusercontent.com/XbuP5MNBZuY95tYLf2E9U8KPljWGGGDI9ignlgvvxlHwmRgaapi_R2XadGjQl785CYvBVaipOXLbdvcXswtR-Og7jVnieR018ja46bMZw74VmkMyKl78kQPgH2FH5UiEwcgaU2a9" alt=""/></figure>



<p>The IP appears to be belong to a well known internet provider located in Tokyo Japan. We must state at this point that we do not have access to military grade IP tools so our estimates accurate to around 300m.</p>



<p>Let’s analyze the web parameter that they have tried to inject or execute on a server hosting our blog.</p>



<figure class="wp-block-image"><img decoding="async" src="https://lh4.googleusercontent.com/BAkWruum6X_3dKRZ17l9mQpHvdOwrztKCMTNkZxPnSQH6HEOZw-Ji1dk0zDbLTDp4SD3Cok3sE6EEkg4LAPMYiuV2PEBaJEr6AbSqFzTbnI0FlPqJhjkGmbqwdtBQUqOTlDLB2US" alt=""/></figure>



<p>I will try to translate into simple words what that string means.</p>



<ul class="wp-block-list">
<li>We have a <strong>GET</strong> request executing index.php file which will provide nothing but the <s>https://blog.acsia.io</s> site (<a class="ek-link" href="https://dectar.com/blog-posts/">Dectar </a><a class="ek-link" href="https://dectar.com/blog-posts/"></a><a class="ek-link" href="https://dectar.com/blog-posts/">Blog</a>)</li>



<li>In addition to that the malicious user clearly has attached further instructions requesting the server to execute them also along with serving the web page. </li>



<li>We have “<em>invokefunction</em>” a function that makes a call to an array “<em>call_user_func_array</em>” where the array contains 2 sets of variables. </li>



<li>The first variable in this multidimensional array is “<em>shell_exec</em>” which is self explanatory, requesting server to execute this in a shell environment. </li>



<li>The second variable in the array is a chain of commands, a wget aimed to download from <a href="http://185.244.25.131">http://185.244.25.131</a> a file called “<em>.Akari</em>”, making it executable “<em>chmod +x .Akari”</em>, removing the file after execution “<em>rm -rf .Akari</em>” clearing the shell history and related logs “<em>history -c -w</em>” and exiting the session “<em>exit:logout</em>” by leaving “<em>Akari(selfrep)</em>” in execution which is fairly obvious a self replication function call of the malware that has been nested into (or tried to) our server.</li>
</ul>



<p>We are a bit curious and we want to dig a little to get more insights about the attackers locations and also in relation to this second IP 185.244.25.131 that has been used.</p>



<p>The first thing we want to do is to use the coordinates provided by ACSIA to see the actual physical location of the attacker. This is to establish if the attack is either coming from a server (therefore a data center) or a private home.</p>



<p>We just copy the coordinates using google maps:</p>



<figure class="wp-block-image"><img decoding="async" src="https://lh6.googleusercontent.com/HJk2yy52kxxjl7W9xGuoxB0_fOijwJzDwTOnGltR37slKXmvWXZRp5etKROciXea4M0Wr5DDk4ANuRfdpBINvcB0wj60q5h-3yAActZUtTDs4BJ9VTdiL0NaeStPAMKqcSm48b18" alt=""/></figure>



<p>And here we are, we are attacked by Japanese Imperial palace <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f642.png" alt="🙂" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>



<p>Of course we don’t think the actual location is imperial palace, could be a museum where someone using their network to perform this or could be some amenities nearby the place. The coordinates are estimated location within 300m diameter. </p>



<p>We found the location of the attacker, next we look into the server that’s been used to download malicious code and to execute on our server.</p>



<p>We gather from WHOIS the following information:</p>



<figure class="wp-block-image"><img decoding="async" src="https://lh3.googleusercontent.com/tpRHcxYFXdXdCyynOJbdlEv0FHIUx0cDU4OVYJ71GOwkkYGQqD3acIBqokk2zZIDS6x_HAt-cNkrY7czQ9hpmH71wIHfUhHxn7MXZVREJIxYX73zXMhkfRqgfXAS9nUDGVSeu41e" alt=""/></figure>



<p>It is a VPS offered by KV solution, a company that provide hosting solutions and located in the Netherlands.</p>



<p>We perform a simple Nmap scan to take a further look into server:</p>



<figure class="wp-block-image"><img decoding="async" src="https://lh4.googleusercontent.com/69zoT4i3kETvM2cjp2EIJmQSnePz9n6X5q1qJiWlNanepL1UNrpCCnv64gfLUv7mDV7KUyhJCSgiioWqahXY2Cke3JRf0bhmwoPm3a7QhM6XAnXtZUYpndMbrQQftCQVZ97FQQQv" alt=""/></figure>



<p>It is a web server that stores number of files publicly available. However, by trying to view the server via http protocol we find nothing and no pages are served. </p>



<p>Running some enumeration tools such as dirsearch we can find out that the HTTP protocol is actually in use and serving some data:</p>



<figure class="wp-block-image"><img decoding="async" src="https://lh3.googleusercontent.com/geaL6dQTBHdXvQrzo7JkndZKryjx_xP5UNxp6WpBZxv3NTtdNOX4YVJzSZoATfPq_elOA6aTiTa-SctP9YbosqtzagW4sAeaTCJ65g52KJ5TnjSxEjchgFcWZpQxi_PlFDuPZ2da" alt=""/></figure>



<p>Looking back at the Nmap details we see it is also being used as FTP server and that is where those publicly available files are listed. </p>



<p>We surely know that files are served through http as well but let’s dig into FTP to see if this will lead us anywhere.</p>



<figure class="wp-block-image"><img decoding="async" src="https://lh3.googleusercontent.com/i2ukc-tCTl1uwa9aZR66p8beYYN2y6-MtYB3vVQrvBDZ35w2ZZymdEUxdCtiXH7NTyEOF-G8HXFl_g08XJBsHHQNShxpQfoPNEXzh7hshr3TjeaHFukjxFwRKGSVUzmYQDam1vcJ" alt=""/></figure>



<p>Using the FTP protocol we are able to view the files and they are all freshly uploaded, dated 06 Apr 2019 so we are not in the front of some backdated old data.</p>



<p>We just download one file to have a quick look, the last one is “Trickle.x86”.</p>



<figure class="wp-block-image"><img decoding="async" src="https://lh4.googleusercontent.com/Q50l0W1W1JrhOpgq8uqNM9brqxZ5wHrKupKBbl-7q6MUKOT6x2QeIwTy1Nzl4Bgoe6dtavHtApgnMKoxr93PXRCZRveig_bQiYGDcwkGX3RbxVUREBm-wsZwtQyX9tnPyzrzYqPK" alt=""/></figure>



<p>It is an ELF binary file and the sort of thing we don’t want to execute unless we in a proper and safe lab environment. However, we can use a disassembler to look into the file:</p>



<figure class="wp-block-image"><img decoding="async" src="https://lh4.googleusercontent.com/zYHAePOxAb5ycEH0xUxR-1br-rMCkM7nIf3Z6e_4o3PP2kpG7JIG4XqgXFJ7cvYnWQJoK4hk24p9DZnUEKog34stpPn2JMJQzwQs1myskogSBJXtKmNj8ZvIBnNyYKRvo7Bj2JaF" alt=""/></figure>



<p>Looking into the detail it appears that this has something to do with Trickle file forwarding service used on the Bitnet Network: <a href="https://en.wikipedia.org/wiki/TRICKLE">https://en.wikipedia.org/wiki/TRICKLE</a></p>



<p>Of course it is being modified and adapted to a specific scope, perhaps to perform upload and execution of malware.</p>



<p>We just wanted to make sure that this Netherland (EU) based server is not another victim and not being used as a proxy for malicious attacks and we have assessed it is not a victim but part of the attack crew.</p>



<p>This is how our innovative product ACSIA captures any type of malicious attacks independently of the type, nature, the method or if it is a zero-day. It simply and magically captures.</p>



<p>The attack was not successful, of course but it is fascinating and this is what intrigued me to dig into the case when I read the notification.</p>



<p>The way ACSIA is designed, or even better, the way ACSIA distinguishes itself from any other cybersecurity solutions, including malware solutions, is that ACSIA does not rely on any particular malware database to track an inbound attack.</p>



<p>The way it captures malicious attacks is through anomalies and patterns that implemented within ACSIA’s machine learning algorithms designed to recognize system actions as well as user and application behavior. In this specific case ACSIA was able to recognize the malignity of the attack as the attack was performed using some of the advanced XSS (Cross Site Scripting &#8211; <a href="https://www.owasp.org/index.php/Cross-site_Scripting_(XSS)">https://www.owasp.org/index.php/Cross-site_Scripting_(XSS)</a>) attack, where the pattern match was determined swiftly by ACSIA.</p>



<p>It is not a silver bullet but it does certain magic:-)</p>



<p>Happy Hacking!!!</p>



<p></p>
<p>The post <a href="https://dectar.com/news/capturing-next-generation-malwares-that-a-malicious-user-was-trying-to-deploy/">Capturing Next-Generation Malware That A Malicious User Was Trying To Deploy</a> appeared first on <a href="https://dectar.com">Dectar</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Investigating An Attack Originating From A Turkish IT Services Provider</title>
		<link>https://dectar.com/company-news/investigating-an-attack-originating-from-an-turkish-it-service-provider-company/</link>
		
		<dc:creator><![CDATA[Luca Di Marco]]></dc:creator>
		<pubDate>Fri, 06 Apr 2018 13:54:10 +0000</pubDate>
				<category><![CDATA[Company news]]></category>
		<category><![CDATA[Product updates]]></category>
		<category><![CDATA[investigations]]></category>
		<guid isPermaLink="false">https://blog.acsia.io/?p=235</guid>

					<description><![CDATA[<p>Today we have another study case which alerted our curiosity. As usual, our software ACSIA is constantly monitoring our server infrastructure and notifying us in real-time of any anomalous activity targeting our servers. This one is indeed another interesting case therefore let’s not wait long and start immediately looking into the case. Less talk more<a href="https://dectar.com/company-news/investigating-an-attack-originating-from-an-turkish-it-service-provider-company/">Continue reading <span class="sr-only">"Investigating An Attack Originating From A Turkish IT Services Provider"</span></a></p>
<p>The post <a href="https://dectar.com/company-news/investigating-an-attack-originating-from-an-turkish-it-service-provider-company/">Investigating An Attack Originating From A Turkish IT Services Provider</a> appeared first on <a href="https://dectar.com">Dectar</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Today we have another study case which alerted our curiosity. As usual, our software <a href="https://dectar.com/acsia-xdr-plus/">ACSIA is constantly monitoring our server infrastructure</a> and notifying us in real-time of any anomalous activity targeting our servers.</p>



<p>This one is indeed another interesting case therefore let’s not wait long and start immediately looking into the case. Less talk more practice <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f642.png" alt="🙂" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>



<p>Below is the main screenshot where can see the anomaly captured by ACSIA:</p>



<figure class="wp-block-image size-full"><img fetchpriority="high" decoding="async" width="900" height="506" src="https://dectar.com/wp-content/uploads/2022/06/TurkishAttack1.jpg" alt="Turkish Attack 1 screenshot" class="wp-image-4833"/></figure>



<p>We can look in details zooming into the incident captured:</p>



<figure class="wp-block-image size-full"><img decoding="async" width="900" height="272" src="https://dectar.com/wp-content/uploads/2022/06/TurkishAttack2.jpg" alt="Turkish Attack 2 details" class="wp-image-4835"/></figure>



<p>As per incident details we have “Malicious user attack onto web server” originating from IP address 213.159.29.20. The attack is targeting one of our web servers which we use to host demo.acsia.io that we use to store company media posts and videos. The location of attack appears to be originating from Istanbul &#8211; Turkey</p>



<p>First thing we take a look at the ownership of the IP address “213.159.29.20”, so we proceed querying that using ACSIA directly:</p>



<figure class="wp-block-image aligncenter size-full"><img decoding="async" width="625" height="888" src="https://dectar.com/wp-content/uploads/2022/06/TurkishAttack3.jpg" alt="Turkish Attack 3 ip" class="wp-image-4836"/></figure>



<p>The IP appears to be belong to Aerotek Bilisim Sanayi ve Ticaret AS which is an internet provider located in Turkey in the city of Kocaeli/Izmit.</p>



<p>It is clear enough that the attack is not coming from the provider itself and obvious to us that the geographical location of the attack is not the city of Kocaeli but Istanbul. This is thanks to ACSIA’s accurate geo-locator.</p>



<figure class="wp-block-image aligncenter size-full"><img loading="lazy" decoding="async" width="602" height="809" src="https://dectar.com/wp-content/uploads/2022/06/TurkishAttack4.jpg" alt="Turkish Attack 4 location" class="wp-image-4837"/></figure>



<p>Below we have the email notification that was dispatched in real time by ACSIA:</p>



<p>As outlined in the above screenshots we can also see from the email notification that the attacker was trying to find “phpmyadmin” tool (which we don’t have it by the way) and try to exploit some of its vulnerabilities.</p>



<p>After having verified the identity of the attacker via the IP address we than start our assessment and looking forward to see why this fellow is trying to annoy us:-)</p>



<p>We start with a simple “Nmap” scan to check what we have here and:</p>



<figure class="wp-block-image aligncenter size-full"><img loading="lazy" decoding="async" width="465" height="369" src="https://dectar.com/wp-content/uploads/2022/06/TurkishAttack5.jpg" alt="Turkish Attack 5 nmap" class="wp-image-4838"/></figure>



<p>Nmap identifies various services running and lists them for us. Most of those services are common services running an almost every server.</p>



<p>What is not common here:</p>



<ul class="wp-block-list"><li>Port 2049 -NFS (Network file system)</li><li>Port 4242 &#8211; mounted (filesystem mounting daemon)</li><li>Port 5432 &#8211; Postgresql Database</li><li>Port 8080 &#8211; Web application</li><li>Port 9000 &#8211; Listener</li></ul>



<p>So the first comes to our mind by looking at those unusually exposed ports is to try the NFS one.</p>



<p>We simply try to mount it to on our local PC by trying to guess the source mount point and…..</p>



<figure class="wp-block-image aligncenter size-full"><img loading="lazy" decoding="async" width="900" height="621" src="https://dectar.com/wp-content/uploads/2022/06/TurkishAttack6.jpg" alt="Turkish Attack 6 local pc" class="wp-image-4839"/></figure>



<p>That is unbelievable, the entire web application mounted into my PC and I can navigate locally as per highlight in the above screenshot.</p>



<p>Excellent &#8211; but I want to dig more on the web app side and see if I can find any login faced pages. We have more ports to analyse there.</p>



<p>We try to look at the “Listener”, the service running on port 9000:</p>



<figure class="wp-block-image aligncenter size-full"><img loading="lazy" decoding="async" width="900" height="527" src="https://dectar.com/wp-content/uploads/2022/06/TurkishAttack7.jpg" alt="Turkish Attack 7 listener" class="wp-image-4840"/></figure>



<p>We are making progress here:-)</p>



<p>We have access into the listener but there are some services popping up and impeding us to navigate. That can be drilled down on more but let’s do it the easier way:-)</p>



<p>I said the easier way because knowing that the listener lets you into the process area means that I have higher chances of getting access directly into web app and I am almost sure that the login page is on port 8080.</p>



<p>So let’s tweak the port 8080…</p>



<figure class="wp-block-image aligncenter size-full"><img loading="lazy" decoding="async" width="900" height="692" src="https://dectar.com/wp-content/uploads/2022/06/TurkishAttack8.jpg" alt="Turkish Attack 8 sign in" class="wp-image-4841"/></figure>



<p>We got the login page, I am going to be generous and won’t disclose the login details here. Long story short, I was able to get in in fairly easy manner</p>



<figure class="wp-block-image aligncenter size-full"><img loading="lazy" decoding="async" width="900" height="527" src="https://dectar.com/wp-content/uploads/2022/06/TurkishAttack9.jpg" alt="Turkish Attack 9 dashboard" class="wp-image-4842"/></figure>



<p>And voila!!!</p>



<p>What we have here is Apache Ambari (<a href="https://ambari.apache.org/"><span style="color: #1155cc;"><u>https://ambari.apache.org</u></span></a>) an application tool stack to manage Apache Hadoop/Hive and several other Big Data components.</p>



<p>The Apache Ambari project is aimed at making Hadoop management simpler by developing software for provisioning, managing, and monitoring Apache Hadoop clusters. Ambari provides an intuitive, easy-to-use Hadoop management web UI backed by its RESTful APIs.</p>



<p>Ambari enables System Administrators to:</p>



<ul class="wp-block-list"><li>Provision a Hadoop Cluster
<ul>
<li>Ambari provides a step-by-step wizard for installing Hadoop services across any number of hosts.</li>
<li>Ambari handles configuration of Hadoop services for the cluster.</li>
</ul>
</li><li>Manage a Hadoop Cluster
<ul>
<li>Ambari provides central management for starting, stopping, and reconfiguring Hadoop services across the entire cluster.</li>
</ul>
</li><li>Monitor a Hadoop Cluster
<ul>
<li>Ambari provides a dashboard for monitoring health and status of the Hadoop cluster.</li>
<li>Ambari leverages <a href="https://issues.apache.org/jira/browse/AMBARI-5707"><span style="color: #1155cc;"><u>Ambari Metrics System</u></span></a> for metrics collection.</li>
<li>Ambari leverages <a href="https://issues.apache.org/jira/browse/AMBARI-6354"><span style="color: #1155cc;"><u>Ambari Alert Framework</u></span></a> for system alerting and will notify you when your attention is needed (e.g., a node goes down, remaining disk space is low, etc).</li>
</ul>
</li></ul>



<p>Having obtained full admin access to Ambari I can do whatever I want to these servers where Apache Hadoop is running along other full stack tools.</p>



<p>For instance, let’s check how many servers are hosted on this Hadoop project:</p>



<figure class="wp-block-image aligncenter size-full"><img loading="lazy" decoding="async" width="900" height="245" src="https://dectar.com/wp-content/uploads/2022/06/TurkishAttack10.jpg" alt="Turkish Attack 10 servers" class="wp-image-4843"/></figure>



<p>As we can see from the above screenshot, that there are 2 servers hosted each with 16GB of RAM and running the Hadoop stack.</p>



<p>We just click on one of the hosts to see some further information about specific host:</p>



<figure class="wp-block-image aligncenter size-full"><img loading="lazy" decoding="async" width="900" height="745" src="https://dectar.com/wp-content/uploads/2022/06/TurkishAttack11.jpg" alt="Turkish Attack 11 hosts" class="wp-image-4844"/></figure>



<p>There is lots of information there but the relevant one is about the 3 running services:</p>



<figure class="wp-block-image aligncenter size-full"><img loading="lazy" decoding="async" width="564" height="171" src="https://dectar.com/wp-content/uploads/2022/06/TurkishAttack12.jpg" alt="Turkish Attack 12 services" class="wp-image-4845"/></figure>



<p>Chat service running on Hive, Zookeeper and HDFS (hadoop filesystem) as data node.</p>



<p>There is some other information that we have not disclosed here and we prefer to keep it that way. But we can give a clue/hint about such information. This Big Data service is run by an IT company that provides internet web services, in particular providing WebChat to more than 10 thousand websites in Turkey.</p>



<p>As mentioned, we generously keep this information but we will contact the IT company and let them know about this case where they jeopardise all those businesses and themselves.</p>



<p>Always keep in mind that this is just one of incident that we pick up randomly and we have 100s of events like this a day attacking our server infrastructures. So I leave it to you to imagine what happens as soon as you expose a server or even a simple service to the public internet. They target you for no reason, these are mass attacks targeting entire subnets and your server/service just happen to be in that subnet.</p>



<p>This is all for now folks.</p>



<p>Happy Hacking!!!</p>
<p>The post <a href="https://dectar.com/company-news/investigating-an-attack-originating-from-an-turkish-it-service-provider-company/">Investigating An Attack Originating From A Turkish IT Services Provider</a> appeared first on <a href="https://dectar.com">Dectar</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>A Malicious Attacker Disguised As A Malware Hunter</title>
		<link>https://dectar.com/company-news/a-malicious-attacker-disguised-as-a-malware-hunter/</link>
		
		<dc:creator><![CDATA[Luca Di Marco]]></dc:creator>
		<pubDate>Fri, 23 Mar 2018 15:38:38 +0000</pubDate>
				<category><![CDATA[Company news]]></category>
		<category><![CDATA[Product updates]]></category>
		<category><![CDATA[investigations]]></category>
		<guid isPermaLink="false">https://blog.acsia.io/?p=221</guid>

					<description><![CDATA[<p>Within the space of a week we had yet another unusual case to investigate thanks to ACSIA monitoring our systems regularly and notifying us in real time of anomalies and irregularities targeting our server infrastructure. Now lets walk through this particular case in a little detail. ACSIA notified the event as an XSS attack, even<a href="https://dectar.com/company-news/a-malicious-attacker-disguised-as-a-malware-hunter/">Continue reading <span class="sr-only">"A Malicious Attacker Disguised As A Malware Hunter"</span></a></p>
<p>The post <a href="https://dectar.com/company-news/a-malicious-attacker-disguised-as-a-malware-hunter/">A Malicious Attacker Disguised As A Malware Hunter</a> appeared first on <a href="https://dectar.com">Dectar</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Within the space of a week we had yet another unusual case to investigate thanks to ACSIA monitoring our systems regularly and notifying us in real time of anomalies and irregularities targeting our server infrastructure.</p>



<p>Now lets walk through this particular case in a little detail.</p>



<p>ACSIA notified the event as an XSS attack, even though it did not succeed, it aroused my curiosity and I decided to look into this case.</p>



<p>Below is the snippet captured from the logs where everything started:</p>



<figure class="wp-block-image aligncenter size-full"><img loading="lazy" decoding="async" width="900" height="120" src="https://dectar.com/wp-content/uploads/2022/06/Disguised-Malicious-logs.jpg" alt="Disguised Malicious logs" class="wp-image-4822"/></figure>



<p>The attack originated from IP 66.240.205.34 and the attacker under the name “Gh0st” tried to inject a malicious script via XSS attack technique with the intention to compromise the servers and extract data from them.</p>



<p>Therefore we go on ACSIA’s dashboard and query to populate all activities related to this IP address.</p>



<figure class="wp-block-image aligncenter size-full"><img loading="lazy" decoding="async" width="900" height="441" src="https://dectar.com/wp-content/uploads/2022/06/Disguised-Malicious-dashboard.jpg" alt="Disguised Malicious dashboard" class="wp-image-4823"/></figure>



<p>Below is the screenshot with our findings:</p>



<figure class="wp-block-image aligncenter size-full"><img loading="lazy" decoding="async" width="900" height="279" src="https://dectar.com/wp-content/uploads/2022/06/Disguised-Malicious-findings.jpg" alt="Disguised Malicious findings" class="wp-image-4824"/></figure>



<p>As we can see from the full list and activity of that specific IP address, the attacker attempted to maliciously access our main web server, blog and demo web site.</p>



<p>We can expand in detail one of the attacks:</p>



<figure class="wp-block-image aligncenter size-full"><img loading="lazy" decoding="async" width="900" height="729" src="https://dectar.com/wp-content/uploads/2022/06/Disguised-Malicious-details.jpg" alt="Disguised Malicious details" class="wp-image-4825"/></figure>



<figure class="wp-block-image aligncenter size-full"><img loading="lazy" decoding="async" width="659" height="542" src="https://dectar.com/wp-content/uploads/2022/06/Disguised-Malicious-details-expand.jpg" alt="Disguised Malicious details expand" class="wp-image-4826"/></figure>



<p>A typical XSS attack with the intent of trying to inject malicious code. We then try to decode the malicious code:</p>



<figure class="wp-block-image aligncenter size-full"><img loading="lazy" decoding="async" width="487" height="563" src="https://dectar.com/wp-content/uploads/2022/06/Disguised-Malicious-decode.jpg" alt="Disguised Malicious decode" class="wp-image-4827"/></figure>



<p>The decoded result seems to be some sort of Chinese characters but further decoding the result, the snippet below reveals this as a database query that embodied with some other website such as ancestry.com .</p>



<p>I am not going to dig further here as it is clear enough to me that we are confronted by an XSS attack that apparently copies database queries executed &lt;and maybe succeeded&gt; on other websites including ancestry.com and so on.</p>



<figure class="wp-block-image aligncenter size-full"><img loading="lazy" decoding="async" width="709" height="51" src="https://dectar.com/wp-content/uploads/2022/06/Disguised-Malicious-attacks.jpg" alt="Disguised Malicious attacks" class="wp-image-4828"/></figure>



<p>From the above decoding, one of the query seems to be originating from ancestry.com:</p>



<p>Lets go back to the attacker’s IP address which is 66.240.205.34 and get some details about it.</p>



<figure class="wp-block-image aligncenter size-full"><img loading="lazy" decoding="async" width="815" height="32" src="https://dectar.com/wp-content/uploads/2022/06/Disguised-Malicious-ip.jpg" alt="Disguised Malicious ip" class="wp-image-4829"/></figure>



<p>First thing we do we run some network scanner to check if either is a webserver or something else.</p>



<figure class="wp-block-image aligncenter size-full"><img loading="lazy" decoding="async" width="810" height="65" src="https://dectar.com/wp-content/uploads/2022/06/Disguised-Malicious-network-scanner.jpg" alt="Disguised Malicious network scanner" class="wp-image-4830"/></figure>



<p>And there we are, it is a web server Ubuntu Linux installed with <a href="https://www.nginx.com/">nginx</a> web-server and it resolves to <s>https://malware-hunt.shodan.io/</s> .</p>



<p>That is really interesting&#8230;</p>



<p>We just follow the link and click on it.</p>



<figure class="wp-block-image aligncenter size-full"><img loading="lazy" decoding="async" width="900" height="506" src="https://dectar.com/wp-content/uploads/2022/06/Disguised-Malicious-follow-the-link.jpg" alt="Disguised Malicious follow the link" class="wp-image-4831"/></figure>



<p>It is the popular search engine for IoT as per the article advertised on The Hacker News: <a href="https://thehackernews.com/2017/05/shodan-malware-hunter.html" target="_blank" rel="noreferrer noopener">https://thehackernews.com/2017/05/shodan-malware-hunter.html</a></p>



<p>In the beginning I said that this was another unusual case because this one is a sort of dilemma. The reason behind this attack seems to be hunting for malware. At least this is what they say publicly on the website which we are going to reveal shortly.</p>



<p>This really is a dilemma because I couldn’t figure out why someone would attack with malicious intent, performing an XSS (Cross-Site-Scripting &#8211; <a href="https://en.wikipedia.org/wiki/Cross-site_scripting" target="_blank" rel="noreferrer noopener">https://en.wikipedia.org/wiki/Cross-site_scripting</a>) attack with the simple intention to check if my system either has been affected by malware.</p>



<p>The dilemma deepens because:</p>



<ol class="wp-block-list"><li>I didn’t ask for such analysis</li><li>I did not authorize this assessment (this is a deeply invasive assessment, normally organizations need to provide express written permission for such).</li><li>I don’t think the attacker is an internet NGO or charity organisation trying to help me out</li><li>Who the heck are these people??</li></ol>



<p>So it appears that Shodan Malware project is going around the internet and performing unauthorized malware detection scans on 3<sup>rd</sup> party servers.</p>



<p>What can I say, very ambitious people and I wonder what next they are going to do.</p>



<p>To initiate a mass DDOS attack to everyone in the search of malware?</p>



<p>We obviously will report the case to them upon publication of this article.</p>



<p>Happy Hacking!!!</p>
<p>The post <a href="https://dectar.com/company-news/a-malicious-attacker-disguised-as-a-malware-hunter/">A Malicious Attacker Disguised As A Malware Hunter</a> appeared first on <a href="https://dectar.com">Dectar</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Data Collection Masking As Research &#8211; A Journey To The Source Of An Attack Targeting Our Web Server</title>
		<link>https://dectar.com/company-news/data-collection-masking-as-research-a-journey-to-the-source-of-an-attack-targeting-our-web-server/</link>
		
		<dc:creator><![CDATA[Luca Di Marco]]></dc:creator>
		<pubDate>Wed, 21 Mar 2018 15:51:06 +0000</pubDate>
				<category><![CDATA[Company news]]></category>
		<category><![CDATA[Product updates]]></category>
		<category><![CDATA[investigations]]></category>
		<guid isPermaLink="false">https://blog.acsia.io/?p=208</guid>

					<description><![CDATA[<p>Today our security product, ACSIA, detected numerous attacks but one in particular took our attention. The attack originated from Chicago Illinois and it seemed to resolve to a legitimate company called “SecurityScorecard” &#8211; www.securityscorecard.com – a security risk rating company. Usually in the majority of attacks that we see, people launch random and mass attacks<a href="https://dectar.com/company-news/data-collection-masking-as-research-a-journey-to-the-source-of-an-attack-targeting-our-web-server/">Continue reading <span class="sr-only">"Data Collection Masking As Research &#8211; A Journey To The Source Of An Attack Targeting Our Web Server"</span></a></p>
<p>The post <a href="https://dectar.com/company-news/data-collection-masking-as-research-a-journey-to-the-source-of-an-attack-targeting-our-web-server/">Data Collection Masking As Research &#8211; A Journey To The Source Of An Attack Targeting Our Web Server</a> appeared first on <a href="https://dectar.com">Dectar</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Today our security product, ACSIA, detected numerous attacks but one in particular took our attention.</p>



<p>The attack originated from Chicago Illinois and it seemed to resolve to a legitimate company called “SecurityScorecard” &#8211; <a href="http://www.securityscorecard.com/" target="_blank" rel="noreferrer noopener">www.securityscorecard.com</a> – a security risk rating company.</p>



<p>Usually in the majority of attacks that we see, people launch random and mass attacks onto entire subnets and they mostly do this with the purpose of trying to gain access to server facilities via brute-force attacks.</p>



<p>The reason this attack caught our attention was because this wasn’t a mass attack or random attack as we commonly encounter. In this incident we are dealing with a manual attack where a vulnerability exploitation tool was launched against our server.</p>



<p>Below what ACSIA captured instantly when the attack was in progress in real-time:</p>



<figure class="wp-block-image aligncenter size-full"><img loading="lazy" decoding="async" width="900" height="506" src="https://dectar.com/wp-content/uploads/2022/06/attack-in-progress-captured.jpg" alt="attack in progress captured" class="wp-image-4811"/></figure>



<p>As we can see from the above screenshot, ACSIA, as usual, is very clear in explaining the case. We have a web request anomaly. ‘Anomaly’ because it is not an ordinary request such as visiting the web site but a specific request &#8211; with malicious underlying purpose.</p>



<p>If we look into screenshot in detail we see that the tool has been used in the attack is “<i>WPScan</i>” a popular word press vulnerability and exploitation tool and has made <b>8 attempts</b> to access our server.</p>



<p>Further details provided by ACSIA:</p>



<figure class="wp-block-image aligncenter size-full"><img loading="lazy" decoding="async" width="803" height="231" src="https://dectar.com/wp-content/uploads/2022/06/attack-details.jpg" alt="attack details" class="wp-image-4813"/></figure>



<p>The IP address of attacker including the full geographical location.</p>



<p>Below is the 8 attempts in detail shown by ACSIA again:</p>



<figure class="wp-block-image aligncenter size-full"><img loading="lazy" decoding="async" width="900" height="225" src="https://dectar.com/wp-content/uploads/2022/06/attack-attempts.jpg" alt="attack attempts" class="wp-image-4814"/></figure>



<p>We avail of ACSIA’s feature to try to figure out who owns this IP.</p>



<p>Here is the email notification dispatched by ACSIA following the whois record:</p>



<figure class="wp-block-image aligncenter size-full"><img loading="lazy" decoding="async" width="628" height="850" src="https://dectar.com/wp-content/uploads/2022/06/attack-email-notification.jpg" alt="attack email notification" class="wp-image-4815"/></figure>



<figure class="wp-block-image aligncenter size-full"><img loading="lazy" decoding="async" width="520" height="545" src="https://dectar.com/wp-content/uploads/2022/06/whois-attack.jpg" alt="whois attack" class="wp-image-4816"/></figure>



<p>The IP address is owned by Steadfast, which is one of the major ISPs/Internet providers in Illinois state. The IP is leased to an organization called Security Scorecard.</p>



<p>So we just wanted to check why a ‘security’ company would run a malicious scan against our server and we hit this web page at first glance.</p>



<figure class="wp-block-image aligncenter size-full"><img loading="lazy" decoding="async" width="900" height="506" src="https://dectar.com/wp-content/uploads/2022/06/malicious-company-webpage.jpg" alt="malicious company webpage" class="wp-image-4817"/></figure>



<p>The web page outputs a message saying “Let us apologize for any inconvenience our scans may have caused you.”.</p>



<p>Well, you can’t just attack someone and then say oh I am sorry if I have caused any harm.</p>



<p>You scanned us, we will then scan you:-)</p>



<p>So we did some further digging to figure out why these friends are trying to perform such scans and to what end. More importantly, if they really are doing this with the purpose they specify in that web page exposed on that IP.</p>



<p>So as we anticipated in the very beginning this IP happened to be owned by company called SecurityScorecard. We dig into their infrastructure and saw that they are hiding behind Cloudflare.</p>



<p><i>(The majority of IT companies today thinks that the solutions like cloudflare are making their servers safer, to me, they actually help malicious user to hide their tracks:-))</i></p>



<p>However, lets go back to our digging and investigation. We collected information about their other servers (apart from the web server they have, which hosts their website) and look what we found:</p>



<figure class="wp-block-image aligncenter size-full"><img loading="lazy" decoding="async" width="614" height="371" src="https://dectar.com/wp-content/uploads/2022/06/other-servers-screencapture.jpg" alt="other servers screencapture" class="wp-image-4818"/></figure>



<figure class="wp-block-image aligncenter size-full"><img loading="lazy" decoding="async" width="900" height="519" src="https://dectar.com/wp-content/uploads/2022/06/other-servers-screencapture2.jpg" alt="other servers screencapture2" class="wp-image-4819"/></figure>



<p>In the above 2 screenshots we clearly see number of servers, including their development and production environments.</p>



<p>For instance, we took a look into one of their domains &#8211; “prm1.impartner.com” which redirects to <a href="http://www.impartner.com/">www.impartner.com</a> which happens to be a sort of marketing and business intelligence company. Additionally they have several other portals and companies interrelated to each other (all seems to be owned by the same people). The first thing was coming into my mind to describe this was a sort of interoperating business conglomerate. A ‘full stack’ business chain if you know what I mean.</p>



<p>We did some analysis onto all of their servers (servers ranging from 20 to 25) and we would like to be discrete and keep the detail confidential as we have no bad intentions here. Even though we were attacked by this organization.</p>



<p>We can however, disclose information about one of the servers which we think there is no harm in doing nor any sensitive information is in discussion.</p>



<p>The server in discussion is 45.55.130.194 and this server happen to route us into some info about an employee that currently works with SecurityScorecard.</p>



<figure class="wp-block-image"><img decoding="async" src="https://blog.acsia.io/wp-content/uploads/2018/03/imageArticleSscrocard8.png" alt="" class="wp-image-217"/></figure>



<p>In the above snippet we just posted the server details including the location and the OS type. It is managed by Luis C.Vargas.</p>



<p>Below is the landing page of the server:</p>



<figure class="wp-block-image aligncenter size-full"><img loading="lazy" decoding="async" width="900" height="466" src="https://dectar.com/wp-content/uploads/2022/06/landing-page-server.jpg" alt="landing page server" class="wp-image-4820"/></figure>



<h2 class="wp-block-heading"><strong><b>Internet Research Project</b>?</strong></h2>



<p>What sort of private company does that sort of research? This sort of disclaimer is used by academic researchers using large anonymised datasets, and those researchers have to outline the nature and purpose of their research and gain the consent of those surveyed where feasible.</p>



<p>This looks like something else – a large data collection operation trying to look legitimate.</p>



<p>In conclusion, we do not want to disclose deep detailed information but the impression we have had based on intel we have is that, this company, or a chain of companies, are set to perform scans against random organisations and individuals for the purpose of collecting information, data scraping in order to create specific profiles and market this data.</p>



<p>Given the coverage of the Facebook data breach, this is particularly topical this week and shines a light on this massive amount of data collection that occurs, sight unseen, online. Facebook itself require their express <a href="https://www.facebook.com/apps/site_scraping_tos_terms.php" target="_blank" rel="noreferrer noopener">written permission</a> for automated collection.</p>



<p>We will inform them about this incident and also inform them about the article we are posting here on our blog. Hopefully they will learn their lessons and cease this sort of activity.</p>



<p>Or else, there will be always someone who will bug them:-)</p>



<p>Happy Hacking!!!</p>
<p>The post <a href="https://dectar.com/company-news/data-collection-masking-as-research-a-journey-to-the-source-of-an-attack-targeting-our-web-server/">Data Collection Masking As Research &#8211; A Journey To The Source Of An Attack Targeting Our Web Server</a> appeared first on <a href="https://dectar.com">Dectar</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>ACSIA Capturing Sophisticated BotNet Attacks Originating From Dallas, USA</title>
		<link>https://dectar.com/company-news/acsia-capturing-sophisticated-botnet-attacks-originating-from-dallas-usa/</link>
		
		<dc:creator><![CDATA[Luca Di Marco]]></dc:creator>
		<pubDate>Tue, 27 Feb 2018 17:27:18 +0000</pubDate>
				<category><![CDATA[Company news]]></category>
		<category><![CDATA[Product updates]]></category>
		<category><![CDATA[investigations]]></category>
		<guid isPermaLink="false">https://blog.acsia.io/?p=189</guid>

					<description><![CDATA[<p>With all the excitement of our first Release Candidate launch last week, it’s nice to step back and get some feedback from our system. We have deployed ACSIA to monitor a number of our &#160;internal monitoring systems while we continue development and improvement &#8211; after checking in on our system left running over the weekend,<a href="https://dectar.com/company-news/acsia-capturing-sophisticated-botnet-attacks-originating-from-dallas-usa/">Continue reading <span class="sr-only">"ACSIA Capturing Sophisticated BotNet Attacks Originating From Dallas, USA"</span></a></p>
<p>The post <a href="https://dectar.com/company-news/acsia-capturing-sophisticated-botnet-attacks-originating-from-dallas-usa/">ACSIA Capturing Sophisticated BotNet Attacks Originating From Dallas, USA</a> appeared first on <a href="https://dectar.com">Dectar</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><span style="font-weight: 400;">With all the excitement of our first Release Candidate launch last week, it’s nice to step back and get some feedback from our system. We have deployed ACSIA to monitor a number of our &nbsp;internal monitoring systems while we continue development and improvement &#8211; after checking in on our system left running over the weekend, we had a chance to see ACSIA in action in the real world, notifying and protecting our systems. </span></p>



<p><span style="font-weight: 400;">We have left the monitoring and alert notifications running for the weekend. We have received about ~243 notifications from one of our servers.</span></p>



<p><span style="font-weight: 400;">Some of emails listed below in the screenshot&#8230;</span></p>



<figure class="wp-block-image aligncenter size-full"><img loading="lazy" decoding="async" width="900" height="495" src="https://dectar.com/wp-content/uploads/2022/06/emails-listed-screenshot.jpg" alt="" class="wp-image-4794"/></figure>



<p><span style="font-weight: 400;">The interesting thing is that out of the 243 notifications, 242 were originating from the same IP address. This IP address has made several mass-scan attacks against our product’s website which we happen to have set up just a few days before we launched ACSIA. </span></p>



<p><span style="font-weight: 400;">This IP “24.173.98.42” succeeded in getting our attention and we just wanted to have a quick look into who this might be and what else it has attempted on our servers. ACSIA will provide us all we need to achieve this <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f642.png" alt="🙂" class="wp-smiley" style="height: 1em; max-height: 1em;" /></span></p>



<p><span style="font-weight: 400;">So here is one of the email notification we have received so far from ACSIA:</span></p>



<figure class="wp-block-image aligncenter size-full"><img loading="lazy" decoding="async" width="644" height="816" src="https://dectar.com/wp-content/uploads/2022/06/email-notification-specific.jpg" alt="email notification specific" class="wp-image-4797"/></figure>



<p><span style="font-weight: 400;">As we can see from the above notification, this type of attack is trying to find if we happen to have a tool called pypmyadmin2018 on our server and so on. </span></p>



<p><span style="font-weight: 400;">Now, let&#8217;s take a closer look at what ACSIA can provide us to investigate this case.</span></p>



<p><span style="font-weight: 400;">We filter our “Live Notifications” by the IP address and here are a few of their attacks listed in the below screenshot:</span></p>



<figure class="wp-block-image aligncenter size-full"><img loading="lazy" decoding="async" width="900" height="506" src="https://dectar.com/wp-content/uploads/2022/06/live-notification-screencapture.jpg" alt="live notification screencapture" class="wp-image-4799"/></figure>



<p><span style="font-weight: 400;">We click on an individual notification and get its details; e.g. the IP’s geographical location and the type of attack, as per below snippet:</span></p>



<figure class="wp-block-image aligncenter size-full"><img loading="lazy" decoding="async" width="900" height="381" src="https://dectar.com/wp-content/uploads/2022/06/ip-geographical-location-screen.jpg" alt="ip geographical location screen" class="wp-image-4800"/></figure>



<p><span style="font-weight: 400;">Among other options, ACSIA has IP tracking, which will take us onto a dedicated dashboard where we can see all traffic related to this IP address.</span></p>



<figure class="wp-block-image aligncenter size-full"><img loading="lazy" decoding="async" width="900" height="506" src="https://dectar.com/wp-content/uploads/2022/06/kibana-dashboard-screenshot.jpg" alt="kibana dashboard screenshot" class="wp-image-4801"/></figure>



<p><span style="font-weight: 400;">In the above screenshot we can see the list of all of malicious requests made by that IP address. </span></p>



<p><span style="font-weight: 400;">We go further and pick one of the malicious requests to be analysed in detail. The snippet below show the details “</span><span style="font-weight: 400;">Mozilla/5.0 muhstik-scan” is the type of attack</span><span style="font-weight: 400;">:</span></p>



<figure class="wp-block-image aligncenter size-full"><img loading="lazy" decoding="async" width="900" height="548" src="https://dectar.com/wp-content/uploads/2022/06/kibana-details-screenshot.jpg" alt="kibana dashboard screenshot" class="wp-image-4802"/></figure>



<p><span style="font-weight: 400;">ACSIA has been very efficient in notifying all of this in real time, and it ascertained that our product website integrity has not been compromised; that the attack was ended without achieving anything relevant that would represent a threat. </span></p>



<p><span style="font-weight: 400;">The WhoIs record for this IP address, as shown by ACSIA, &nbsp;shows us that this IP is owned by a company called Time Warner Cable Internet LLC:</span></p>



<figure class="wp-block-image aligncenter size-full"><img loading="lazy" decoding="async" width="595" height="296" src="https://dectar.com/wp-content/uploads/2022/06/whois-ip-address.jpg" alt="whois ip address" class="wp-image-4803"/></figure>



<p><span style="font-weight: 400;">Before we proceed to ban this IP permanently, we would like to do some further investigation purely out of curiosity &#8211; this is one of the main issues troubling hackers, isn’t it <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f642.png" alt="🙂" class="wp-smiley" style="height: 1em; max-height: 1em;" /></span></p>



<p><span style="font-weight: 400;">So let&#8217;s dig in and have a look who this would-be intruder is…</span></p>



<p><span style="font-weight: 400;">We just run some deep “nmap” scanning against the IP address:</span></p>



<figure class="wp-block-image aligncenter size-full"><img loading="lazy" decoding="async" width="900" height="602" src="https://dectar.com/wp-content/uploads/2022/06/nmap-ip-address-screenshot-1.jpg" alt="" class="wp-image-4806"/></figure>



<p><span style="font-weight: 400;">Nmap scan indicates that this device is appear to be Dell SonicWall Security appliance:</span></p>



<figure class="wp-block-image aligncenter size-full"><img loading="lazy" decoding="async" width="900" height="52" src="https://dectar.com/wp-content/uploads/2022/06/nmap-scan-screenshot-1.jpg" alt="" class="wp-image-4807"/></figure>



<p><span style="font-weight: 400;">Usually these sort of appliances have web interfaces and we just wanted to confirm this:</span></p>



<figure class="wp-block-image aligncenter size-full"><img loading="lazy" decoding="async" width="900" height="509" src="https://dectar.com/wp-content/uploads/2022/06/dell-virtual-office.jpg" alt="dell virtual office" class="wp-image-4808"/></figure>



<p><span style="font-weight: 400;">And we have the confirmation of course.</span></p>



<p><span style="font-weight: 400;">Let’s do some further digging to get more details from this device:</span></p>



<figure class="wp-block-image aligncenter size-full"><img loading="lazy" decoding="async" width="900" height="322" src="https://dectar.com/wp-content/uploads/2022/06/nikto-sonicwall.jpg" alt="nikto sonicwall" class="wp-image-4809"/></figure>



<p><span style="font-weight: 400;">And there you go &#8211; the system has some vulnerabilities….</span></p>



<p><span style="font-weight: 400;">We have established that the device behind the Dell SonicWall Network Security Appliance is actually a PC running Windows 10.</span></p>



<p><span style="font-weight: 400;">So we are dealing with a script kiddie here, who is running Kali Linux in a VM, and using several automated mass-scan tools to attack an entire subnet. Our server happens to be part of that subnet <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f642.png" alt="🙂" class="wp-smiley" style="height: 1em; max-height: 1em;" /></span></p>



<p><span style="font-weight: 400;">Happy Hacking!!!</span></p>



<p><span style="font-weight: 400;">Disclaimer: some personal information about the attacker has been withheld in order to protect their identity. </span></p>
<p>The post <a href="https://dectar.com/company-news/acsia-capturing-sophisticated-botnet-attacks-originating-from-dallas-usa/">ACSIA Capturing Sophisticated BotNet Attacks Originating From Dallas, USA</a> appeared first on <a href="https://dectar.com">Dectar</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Investigating Online Botnets</title>
		<link>https://dectar.com/company-news/investigating-online-botnets/</link>
		
		<dc:creator><![CDATA[Luca Di Marco]]></dc:creator>
		<pubDate>Tue, 30 Jan 2018 12:43:35 +0000</pubDate>
				<category><![CDATA[Company news]]></category>
		<category><![CDATA[Product updates]]></category>
		<category><![CDATA[investigations]]></category>
		<guid isPermaLink="false">https://blog.acsia.io/?p=142</guid>

					<description><![CDATA[<p>A botnet is a number of internet-connected devices, each of which is running one or more bots. Botnets can be used to perform distributed denial-of-service attack (DDoS attack), steal data, send spam, and allow the attacker access to the device and its connection. The owner can control the botnet using command and control (C&#38;C) software.<a href="https://dectar.com/company-news/investigating-online-botnets/">Continue reading <span class="sr-only">"Investigating Online Botnets"</span></a></p>
<p>The post <a href="https://dectar.com/company-news/investigating-online-botnets/">Investigating Online Botnets</a> appeared first on <a href="https://dectar.com">Dectar</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A botnet is a number of internet-connected devices, each of which is running one or more bots. Botnets can be used to perform distributed denial-of-service attack (DDoS attack), steal data, send spam, and allow the attacker access to the device and its connection. The owner can control the botnet using command and control (C&amp;C) software.</p>



<p>From Dublin to Austria to a suburb of a city in North Eastern China, we bring you a recent investigation of online botnets. During our development and testing phase of <a href="https://dectar.com/acsia-xdr-plus/">ACSIA, our automated cyberdefense product</a> we activated several testing servers exposed to the public internet. This is deliberate and our exposed servers are constantly subject to multiple random attacks (botnet, script kiddies, random hackers and so on) as an hourly occurrence. These attackers are mostly automated and attempt to gain control of computers and devices which are open to the web.</p>



<p>Our product alerts us with email notifications in real-time for important/relevant security issues and threats. From time to time we pick out unusual cases for further investigation.</p>



<p>One of the email notifications we received is shown here:</p>



<figure class="wp-block-image aligncenter size-full"><img loading="lazy" decoding="async" width="247" height="300" src="https://dectar.com/wp-content/uploads/2022/06/FailedLogin-Screenshot.png" alt="FailedLogin Screenshot" class="wp-image-4786"/></figure>



<p>We don’t usually investigate bot net attacks as in majority they originate from automated botnets in geographical locations outside US and EU. However as we see from the above notification the source is located in Nuziders – Austria.</p>



<p>This has sparked our curiosity and we decided to dig into this case.</p>



<p>To learn more we performed some very basic security tests and information gathering to have some further details about why an EU resident – subject to GDPR and national data and security regulations would attempt such an obvious attack.</p>



<p>The source turned out to be a regional Austrian ISP and cable TV company which provides customers with internet connection.</p>



<figure class="wp-block-image aligncenter size-full"><img loading="lazy" decoding="async" width="739" height="589" src="https://dectar.com/wp-content/uploads/2022/06/Whois-Screencapture.jpg" alt="Whois screencapture" class="wp-image-4790"/></figure>



<p>One of their IP’s was attempting to brute force our servers and gain access to our systems.</p>



<h2 class="wp-block-heading">Further detective work</h2>



<p>So why in 2018 would an ISP from a regional Austrian ISP be launching brute force attacks on a newly commissioned server located in Dublin?</p>



<p>Well, it turned out that things got a little stranger. Using some security and infrastructure tools we were able to determine that the source of the attack arose not from Austria, not even from within Europe but from a source in China.</p>



<figure class="wp-block-image aligncenter size-full"><img loading="lazy" decoding="async" width="300" height="34" src="https://dectar.com/wp-content/uploads/2022/06/Whois2-Screencapture.jpg" alt="" class="wp-image-4791"/></figure>



<figure class="wp-block-image aligncenter size-full"><img loading="lazy" decoding="async" width="900" height="263" src="https://dectar.com/wp-content/uploads/2022/06/geolocation-screenshot.jpg" alt="geolocation screenshot" class="wp-image-4792"/></figure>



<h2 class="wp-block-heading">Geo-IP (courtesy of Shodan)</h2>



<p>The Austrian device was actually being controlled by another device based in the city of Harbin in North East China.</p>



<h2 class="wp-block-heading">What we did next</h2>



<p>We informed the Austrian ISP about this device on their network, and also sent a note to China Telecom. We have not heard back from either to date…..</p>



<h2 class="wp-block-heading">Threats and trends</h2>



<p>A botnet attack can be devastating. In 2016 the Mirai botnet affected large parts of the internet, including Twitter, Netflix, CNN, and other major sites, as well as major Russian banks and the entire public internet of Liberia. The botnet took advantage of unsecured internet of things (IoT) devices installing malware that then attacked servers that route internet traffic. Mirai infected vulnerable devices that used default user names and passwords and is still affecting devices worldwide to this day.</p>



<p>Bot nets enable hackers to steal bank credentials and website cookies to impersonate victims, searching hard disks for specific files, granting threat actors remote access to a computer, and allowing threat actors to exfiltrate stolen information or download additional malware.The botnet-as-a-service model has grown increasingly popular. Threat actors rent subsets of their botnets for malicious activities such as distributed denial of service (DDoS) attacks, click fraud, cryptocurrency mining, and targeted attacks.</p>



<p>The ISP’s above likely were compromised by groups to be instrumental in attacking EU based entities. Having a compromised EU located device is a big plus to a criminal organisation.</p>



<h2 class="wp-block-heading">IoT Threats</h2>



<p>There is a great deal of hype about IoT, Smart Homes and connecting all devices in our daily life to the public internet. Security is rarely a top consideration. Most IoT devices have very basic security controls and are easily compromised. IOT devices are cheap and mass produced with little built in security or updates planned into their functional life.</p>



<p>As consumers continue to buy low-cost, insecure devices, the number of vulnerable end points (like the IP’s above) just keeps going up. Gartner estimates that there will be 8.4 billion connected devices in use by the end of this year, and that will more than double by 2020, to 20.4 billion.</p>



<p>This simple random case how systems can be compromised by 3rd parties masquerading as legitimate actors and this threat is proliferating.</p>



<p>The complex, interconnected networks that cloud providers have developed can create a single point of failure for hundreds of businesses, including government entities, critical infrastructures, and essential healthcare organisations. Cybercriminals are capitalising on this situation to devise hard-to-detect attacks that can disrupt cloud providers and their customers.</p>



<p>Will 2018 be the the year that the industry wakes up, and device manufacturers, regulators, telecom companies, and internet infrastructure providers work together to isolate compromised devices, take them down or patch them, to ensure that automated bot nets can no longer proliferate? We are not holding our breath….</p>



<p></p>
<p>The post <a href="https://dectar.com/company-news/investigating-online-botnets/">Investigating Online Botnets</a> appeared first on <a href="https://dectar.com">Dectar</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
