home.social

#datapacket β€” Public Fediverse posts

Live and recent posts from across the Fediverse tagged #datapacket, aggregated by home.social.

  1. #GammaGroup #FinFisher #FinSpy #SystemApp callback caught #CALEA #malware #GreyMarket #investigations

    πŸ’»πŸ€β˜£οΈπŸ€πŸ€³ πŸŽ£πŸ”πŸ§

    on #BunnyNet's CDN from #DataPacket

    Interesting vectors... Quite the pointers this scan. Was scanned last 1yr ago. Showed up as malicious. Scans clean now except for the #malware found as a #GammaGroup shim caught nao. 🎣

    Caught a bit o' Meta also in the callback graph. Huh.

    #VirusTotal
    virustotal.com/graph/embed/g7e

  2. CW: #GammaGroup #FinFisher #FinSpy #SystemApp callback list of hosts / shims on #BunnyNet via #DataPacket

    Historical list of #SystemApp callback to #FinFisher clients logged while on #InfoseceXchange that's good for #tcpdump correlation #investigations in #Germany on the CDN #DataPacket hosting the #BunnyNet since November 2022ish for #GermanProsecutors to correlate.

    #FinFisherCom🀝#EnemyOfTheInternet

    #CALEA #greymarket #CALEAmalware πŸ”πŸ§#infosec

    ΒΉ
    143-244-49-183.bunnyinfra.net

    Β²
    143-244-50-83.bunnyinfra.net

    Β³
    169.150.221.147

    ⁴
    143-244-50-88.bunnyinfra.net

    ⁡
    143-244-50-211.bunnyinfra.net

    ⁢
    169-150-249-163.bunnyinfra.net

    ⁷
    169-150-221-147.bunnyinfra.net

    ⁸
    143-244-50-82.bunnyinfra.net

    ⁹
    143-244-50-213.bunnyinfra.net

    ¹⁰
    143-244-50-209.bunnyinfra.net

    ΒΉΒΉ
    143-244-49-180.bunnyinfra.net

    ΒΉΒ²
    143.244.50.214

    ΒΉΒ³
    185-93-1-251.bunnyinfra.net

    ¹⁴
    unn-169-150-249-163.datapacket.com

    ¹⁡
    unn-169-150-249-165.datapacket.com

    ¹⁢
    unn-169-150-249-164.datapacket.com

    ¹⁷
    unn-169-150-249-166.datapacket.com

    Cities:
    ΒΉ
    reddit.com/r/netzpolitik/comme

    Β²
    en.wikipedia.org/wiki/FinFishe

    Β³
    spiegel.de/netzwelt/netzpoliti

    ⁴
    netzpolitik.org/2022/nach-pfae

    ⁡
    securityweek.com/german-author

    ⁢
    bloomberg.com/news/articles/20

    #RTDNA #StateSponsoredMalwareβ„’ #SSMβ„’ #malware

  3. New #BunnyNet #GammaGroup #FinFisher #FinSpy #Finsky shim for #SystemApp found. #StateSponsoredMalwareβ„’βœ“

    This host hasn't been scanned in over 1yr until today.

    Initially scanned and found nothing. Dug in a bit further and found some interesting vectors for wot compromised #DataPacket's #BunnyCDN #BunnyNet though #blueteam at #DataPacket βš οΈπŸ‘‰β˜£οΈ

    #VirusTotal
    virustotal.com/graph/embed/gdb

  4. Huh. _TWO_ badbunny hosts with the #SystemApp #GammaGroup #FinFisher #FinSpy #Finsky callback to client but ... This time the scanned host comes up with interesting results after being caught. Both back to back attack attempts.

    One host was scanned about a year ago and the other, another attack node quite frequently used, was scanned less than a month ago.

    #Datapacket.Com #BunnyNet #InfosecExchange #infosec #fediverse #fediadmin

    Typical attack pattern. After detection an attempt of using the #QuicksandModule was sent to client, tried crashing client. SystemUI crash attempt, etc.