20 Tweets 15 reads Oct 03, 2023
OMG LOL
someone tried to send me an email which spoofed....
MY OWN ADDRESS...
LULZ how stupid!
but also....
Let's take a look!
ROFL ROFL ROFL
They aren't very good at this!
"YOU HAVE A VERY BAD-NEWS"
well let's see! the sender of this might have a "BAD-NEWS" soon... LOL
hahaha ok I've got their IP!
They have RDP exposed....
They are also using a VM in a company that is a friendly....
OK they are likely running Windows 10 or Server.
It's like windows server as they are in a data center
ok i've pivoted on the computer name:
We have two machines in the same hosting provider with the same name!
let's go back for a second.. what did they try and send me?
#Sextortion #Cybercrime
Let's start by looking at the email they sent:
For starers no one writes:
Hi email address (LULZ) if they have intimate knowledge of you.
##############################
"I will be direct You watch adult content often, and I caught you
masturbating. We all do it from time to time. How I did this Your
router
was vulnerable. I was able to inject some code into the firmware,
and every
device connected on the network, including phones, was
compromised. Then I
set every device available to record with the camera only when
you watch
adult content. I also got your contact lists, phone numbers,
emails, social
media contacts, and here is the deal. If you don`t pay me $1800
USD worth
in Bicoin, I will send your masturbation video, search history,
and all your private chat to all
your contacts and all social media"
##############################
This is terribly written, look there's a double tap space.
Bitcoin is spelt incorrectly.
Also... haha the kill chain described.... is nuts! The hacked my phone :P
What school did they goto ClownData1's school for HaX?
The VPN they are using runs through here...
it's been used quite a bit...
ok gang who wants to see an attempted #Sextortion scam kill chain?
Here we see a threat actor use @Azure a VPN provider to try and "attack" me with a really badly worded email, trying to spoof my own address (LOL) and using a BTC wallet that so far as 0 Dollars in it!
and here is the FULL text from the EMAIL body!
the language is terrible. The format is shockingly bad!
"Analyst suspects the writer is a non native English speaker." #lol
#Cybercrime #Sextortion #Crime #Microsoft #Azure
Here is a pivot from @shodanhq showing how I used the machine name to find likely related machines:
There are two likely threat actor controlled serves in @Azure
74.249.42.58
and
possible: 20.51.201.47 (but not confirmed, they have the same name (kind)
shodan.io
and lastly.... unfortunatley they didn't leave me a way to contact them back! but the email they send was FUNNY (to me)
but
somewhere out there this might work...
someone might feel under threat
someone might pay...
if not this one... to one that's less shit!
so what does this show us?
Well for starts the fact they used a VPN from azure did NOT hide their source IP! (at least up to the Azure point: @MsftSecIntel then would need to chase it back further)
It show's us this is primarly aimed at "personal" targets!
How do I conclude this?
The spoofing of the name part, doesn't work very well against business mail configurations!
So tweeps what do we do?
we need to report it to @Azure @MsftSecIntel
to do this we can use this API or web form:
msrc.microsoft.com
(May I suggest there are additional catagories? this doesn't fit under Spam, this isn't phishing)
and now it is reported!
Now theory time:
what if someone wanted to "HACK BACK!" what could someone do?
The first thing I'd say: what's the bloody point. You can spaf loads of packets at a server. You might not get in. The target is in Azure, they will get lots of data about that. The TA if they look at logs will see.
But anyway the theory would be likely to attack RDP. We have no real other vectors against the target.
Anyway that's a bit of theory. I am not taking this route. I am going to make a tea. the MS team should be knocking that server offline :) (taking down the TA is MUCH harder...)
Hopefully that was educational and fun for people!
These scammers are wankers. Sometimes this stuff works.
Be safe, be legal. Use the @MsftSecIntel abuse API / Forms. Also use the @NCSC reporting services!
๐Ÿซก๐Ÿค™๐Ÿ‡ฌ๐Ÿ‡งโค๏ธ #DefendAsOne
@MsftSecIntel @NCSC And here is a dose of cyber reality:
Abuse report rejected. No action taken.
@MsftSecIntel ๐Ÿ˜ญ๐Ÿ˜ญ๐Ÿ˜ญ๐Ÿ˜ญ๐Ÿ˜ญ๐Ÿ˜ญ๐Ÿ˜ญ
@therealshodan booo!
@MsftSecIntel @NCSC @therealshodan The reality of this stuff is:
Corporate cyber defence:
Identify
Protect
Detect
Respond is easier (not easy) than
Prevent and Pursue (cyber crime fighting)
The webs are vast,
Cross border and difficult methinks

Loading suggestions...