Cookie Consent by Free Privacy Policy Generator When Scriptkiddies Attack
Paypal Spenden für Projekt | Google Playstore Download Button für Team IT Security

Theme Auswahl



➠ When Scriptkiddies Attack

Usually I don't blog about the hundreds of ridiculous or down right crazy emails I receive each year, but this exchange makes all the others seem completely reasonable in comparison. Normally my unwanted emails range from people asking obviously blackhat questions presented as whitehat questions to offers of under the table payments in return for coding malware, but this email was something special.

If you don't follow me on twitter (Why don't you follow me on twitter? ), I've been spending a while working on intel.malwaretech.com (a botnet tracker for various peer-to-peer botnet) and tweeting my progress. Yesterday I tweeted the following GIF showing my real-time tracking interface I'd just finished).


Within a couple of minutes of tweeting, I received the following email from someone with a name matching that of one of my followers.

Basically, he's mistaken my botnet tracker for me posting screenshots of my botnet on twitter (I guess there are probably people who do that???), and wants me to give him the code.

I was still in the process of updating the tracker, so I didn't notice the email until a follow-up was send 20 minutes later.

I particularly like this one for a couple reasons: If I wasn't such an upstanding citizen, I think my idea of being "blackhat for one second" would involve something a little more profitable and ambitious than giving out free malware to scriptkiddies (but I guess that's what blackhats do???) and the fact that he claims to have a remote RDP exploit and flash zeroday, but the best monetary amount he can offer is $50.

You can probably guess what the next email is if you're familiar with the popular phrase: "If at first you don't succeed, then result to blackmail".

I wasn't really sure if this was a troll or not, so I just replied with my standard canned response to such threats.

I also looked up his facebook page and went through the pictures, but due to some CIA grade redaction I doubt we'll ever know his real name.


Over the next hour I didn't notice anything in my access logs to suggest any attempt at hacking or DDoS, but I wasn't really looking hard as the site is behind cloudflare and I designed the backend in such a way that all user-input is canned to reduce the surface for web based attacks. Ofcourse if he somehow did managed to get into my server, there is no bot source or botnet for him to steal, so he's going to be very disappointed. Although there was no clear evidence of any attacks, I did however notice I'd been very busy sending myself emails.


Quite interestingly gmail doesn't mark spoofed emails from myself as spam, despite the fact that my email address uses DKIM and the spoofed emails were obviously not authenticated. Usually I'm very overzealous with writing regex rules for emails (sending me an email containing phrase such as  "I await your reply", "first page of google" and "Mobile App Development" will result in instant deletion of said mail and all subsequent emails from that address), but in this case all the emails were grouped into a single thread so I could delete with one click, making it not really worth it to log in to the server and add a new rule.


The hosting service he was using to "bumb" me kept killing the flood due to failures, so my inbox was hardly being overwhelmed by the volume. After about an hour of the world's lamest email flood, it ceased and i received another few mails from our friendly neighborhood hacker.


I checked out the link out on a VM through Tor hoping it would be some kind of exploit or IP logger, but it was just a login page for what we can assume is the shell he was offering me.


It's quite common for colleges and universities to allocate official sub-domains for different faculties and delegate management to faculty staff and even students, resulting in them often getting hacked. This specific sub-domain seems to have been accessed by various different hackers and the directories are full of strange files (I'm not really sure who to contact about the shell, so if you're associated with Harvard feel free to email from an official mail for the full link or contact the site administrator.).

Based on the shell link, I had already figured what his next threat would be and had saved some screenshots of the emails and link just in case; sure enough after another hour I received these two emails around 5 minutes apart.


Damn it Paul, stop chmodding your directory to 777
Creating a sub-page in a sub-directory of a sub-domain of a sub-domain, wow this MalwareTech guy really knows his stuff...

As of writing this the deface page is still up, but that's not really a surprised seeming as it's not even an index page or in an actively used directory.


I was also able to find publicly accessible logs from a cookie stealer running on the same sub-domain and according to a discussion in one of my tweet threads, this could potentially be high risks as sub-domains have the ability to read certain cookies set using the parent domain, i.e .harvard.eu.

But wait! The fun didn't even stop there: before I went to bed I received a few more threats.

What is option 2? I must known! Also notice indexx.php as I assume index wasn't writable.


This is the point where he realized I'd been live tweeting the whole thing and decided to instead blackmail me into deleting my tweets (because obviously blackmailing me had gone well for him so far?).

I then received one final email before he gave up with the threats (or at least I assume he did).


Now as a not entirely incompetent webmaster, I instantly noticed that IP is not in any of my provider's IP ranges, so I decided to look it up.


lol, gg.


...


➦ Reverse Engineering ☆ malwaretech.com

➠ Komplette Nachricht lesen


Zur Startseite

Kommentiere zu When Scriptkiddies Attack











➤ Ähnliche Beiträge für 'When Scriptkiddies Attack'

MHDDoS - DDoS Attack Script With 56 Methods

vom 405.05 Punkte
Best DDoS Attack Script Python3, (Cyber / DDos) Attack With 56 Methods Please Don't Attack websites without the owners consent. Features And Methods Layer7 GET | GET Flood POST | POST Flood OVH | Bypass OVH RHEX | Random HEX STOMP | Bypass chk_captcha STRESS | Send HTTP Packet Wi

AA20-336A: Advanced Persistent Threat Actors Targeting U.S. Think Tanks

vom 371.3 Punkte
Original release date: December 1, 2020<br/><h3>Summary</h3><p class="tip-intro" style="font-size: 15px;"><em>This Advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&amp;CK®) framework.

CISA Red Team Shares Key Findings to Improve Monitoring and Hardening of Networks

vom 306.04 Punkte
SUMMARY The Cybersecurity and Infrastructure Security Agency (CISA) is releasing this Cybersecurity Advisory (CSA) detailing activity and key findings from a recent CISA red team assessment—in coordination with the assessed organization—to provide network defenders re

NSA and CISA Red and Blue Teams Share Top Ten Cybersecurity Misconfigurations

vom 245.28 Punkte
A plea for network defenders and software manufacturers to fix common problems. EXECUTIVE SUMMARY The National Security Agency (NSA) and Cybersecurity and Infrastructure Security Agency (CISA) are releasing this joint cybersecurity advisory (CSA) to h

NSA and CISA Red and Blue Teams Share Top Ten Cybersecurity Misconfigurations

vom 245.28 Punkte
A plea for network defenders and software manufacturers to fix common problems. EXECUTIVE SUMMARY The National Security Agency (NSA) and Cybersecurity and Infrastructure Security Agency (CISA) are releasing this joint cybersecurity advisory (CSA) to h

Multiple Nation-State Threat Actors Exploit CVE-2022-47966 and CVE-2022-42475

vom 222.78 Punkte
SUMMARY The Cybersecurity and Infrastructure Security Agency (CISA), Federal Bureau of Investigation (FBI), and Cyber National Mission Force (CNMF) identified the presence of indicators of compromise (IOCs) at an Aeronautical Sector organization as early

AA22-083A: Tactics, Techniques, and Procedures of Indicted State-Sponsored Russian Cyber Actors Targeting the Energy Sector

vom 216.03 Punkte
Original release date: March 24, 2022SummaryActions to Take Today to Protect Energy Sector Networks: • Implement and ensure robust network segmentation between IT and ICS networks. • Enforce MFA to authenticate to a system. • Manage the creation

Scattered Spider

vom 216.03 Punkte
SUMMARY The Federal Bureau of Investigation (FBI) and Cybersecurity and Infrastructure Security Agency (CISA) are releasing this joint Cybersecurity Advisory (CSA) in response to recent activity by Scattered Spider threat actors against the commercia

AA21-048A: AppleJeus: Analysis of North Korea’s Cryptocurrency Malware

vom 202.53 Punkte
Original release date: February 17, 2021SummaryThis Advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework. See the ATT&CK for Enterprise for all referenced threat actor tactics and techniques. This joint advisory is the result o

AA22-320A: Iranian Government-Sponsored APT Actors Compromise Federal Network, Deploy Crypto Miner, Credential Harvester

vom 193.53 Punkte
Original release date: November 16, 2022SummaryFrom mid-June through mid-July 2022, CISA conducted an incident response engagement at a Federal Civilian Executive Branch (FCEB) organization where CISA observed suspected advanced persistent threat (APT) ac

Iranian Government-Sponsored APT Actors Compromise Federal Network, Deploy Crypto Miner, Credential Harvester

vom 193.53 Punkte
Summary From mid-June through mid-July 2022, CISA conducted an incident response engagement at a Federal Civilian Executive Branch (FCEB) organization where CISA observed suspected advanced persistent threat (APT) activity. In the course of incident

Crypton - Library Consisting Of Explanation And Implementation Of All The Existing Attacks On Various Encryption Systems, Digital Signatures, Hashing Algorithms

vom 180.02 Punkte
Crypton is an educational library to learn and practice Offensive and Defensive Cryptography. It is basically a collection of explanation and implementation of all the existing vulnerabilities and attacks on various Encryption Systems (Symmetric and Asymmetric), Digital Signatures, Message Authentication Codes and Authenticated