0

Recently an attack based on booby trapped web servers was blocked by Microsoft through seizure of some of the known server names used in this attack. This attack analysis was focused to defend US midterm elections which will take place on November of 2018.

Here are the booby trapped web servers seized by Microsoft:

    name                            IP address      date updated 
------------------------------------------------------------------------
    adfs-senate.email               157.56.161.162  17/08/2018
    adfs-senate.services            157.56.161.162  17/08/2018
    hudsonorg-my-sharepoint.com     157.56.161.162  14/08/2018
    my-iri.org                      157.56.161.162  16/08/2018
    office365-onedrive.com          157.56.161.162  14/08/2018
    senate.group                    157.56.161.162  17/08/2018
------------------------------------------------------------------------

Of course 157.56.161.162 is an IP adress belonging to Microsoft, and they will get all the traffic of machines trapped by this attack before August the 14th.

This attack, from Microsoft analysis, looks like it could be attributed to the criminal group APT28.

But some information is now missing for other countries who could be other targets of this attack campaign either directly or indirectly to later attack the United States through the usual connection laundering technic.

It would be interesting to detect the machines on which an attack was successfull everywhere in the world. For this analysis to be successful, the easiest way consists in entering within the Egress filtering rules of Internet firewalls rules of the form (at the top of Egress filtering group):

deny ip any <IP_address_of_booby_trapped_web_server> 255.255.255.255 log

for the 6 servers identified by Microsoft.

And for this investigation we need the IP address attributed to these booby trapped web servers just before the seizure and update by Microsoft.


How may we quickly obtain what these criminals' IP addresses were before August the 14th within the international WHOIS database?

schroeder
  • 123,438
  • 55
  • 284
  • 319
dan
  • 3,033
  • 14
  • 34

0 Answers0