Star Blizzard (SEABORGIUM) News and Insights | Microsoft Security Blog http://approjects.co.za/?big=en-us/security/blog/tag/star-blizzard-seaborgium/ Expert coverage of cybersecurity topics Fri, 10 Apr 2026 18:59:30 +0000 en-US hourly 1 https://wordpress.org/?v=6.8.3 Defending against evolving identity attack techniques http://approjects.co.za/?big=en-us/security/blog/2025/05/29/defending-against-evolving-identity-attack-techniques/ Thu, 29 May 2025 17:00:00 +0000 Threat actors continue to develop and leverage various techniques that aim to compromise cloud identities. Despite advancements in protections like multifactor authentication (MFA) and passwordless solutions, social engineering remains a key aspect of phishing attacks. Implementing phishing-resistant solutions, like passkeys, can improve security against these evolving threats.

The post Defending against evolving identity attack techniques appeared first on Microsoft Security Blog.

]]>

In today’s evolving cyber threat landscape, threat actors are committed to advancing the sophistication of their attacks. The increasing adoption of essential security features like multifactor authentication (MFA), passwordless solutions, and robust email protections has changed many aspects of the phishing landscape, and threat actors are more motivated than ever to acquire credentials—particularly for enterprise cloud environments. Despite these evolutions, social engineering—the technique of convincing or deceiving users into downloading malware, directly divulging credentials, or more—remains a key aspect of phishing attacks.

Implementing phishing-resistant and passwordless solutions, such as passkeys, can help organizations improve their security stance against advanced phishing attacks. Microsoft is dedicated to enhancing protections against phishing attacks and making it more challenging for threat actors to exploit human vulnerabilities. In this blog, I’ll cover techniques that Microsoft has observed threat actors use for phishing and social engineering attacks that aim to compromise cloud identities. I’ll also share what organizations can do to defend themselves against this constant threat.

While the examples in this blog do not represent the full range of phishing and social engineering attacks being leveraged against enterprises today, they demonstrate several efficient techniques of threat actors tracked by Microsoft Threat Intelligence. Understanding these techniques and hardening your organization with the guidance included here will help contribute to a significant part of your defense-in-depth approach.

Pre-compromise techniques for stealing identities

Modern phishing techniques attempt to defeat authentication flows

Adversary-in-the-middle (AiTM)

Today’s authentication methods have changed the phishing landscape. The most prevalent example is the increase in adversary-in-the-middle (AiTM) credential phishing as the adoption of MFA grows. The phish kits available from phishing-as-a-service (PhaaS) platforms has further increased the impact of AiTM threats; the Evilginx phish kit, for example, has been used by multiple threat actors in the past year, from the prolific phishing operator Storm-0485 to the Russian espionage actor Star Blizzard.

Evilginx is an open-source framework that provides AiTM capabilities by deploying a proxy server between a target user and the website that the user wishes to visit (which the threat actor impersonates). Microsoft tracked Storm-0485 directing targets to Evilginx infrastructure using lures with themes such as payment remittance, shared documents, and fake LinkedIn account verifications, all designed to prompt a quick response from the recipient. Storm-0485 also consistently uses evasion tactics, notably passing initial links through obfuscated Google Accelerated Mobile Pages (AMP) URLs to make links harder to identify as malicious.

Screenshot of Storm-0485's fake LinkedIn verify account lure stating Account Action Required with a button reading Verify Account and an alternative LinkedIn URL to copy and paste if the button does not work.
Figure 1. Example of Storm-0485’s fake LinkedIn verify account lure

To protect against AiTM attacks, consider complementing MFA with risk-based Conditional Access policies, available in Microsoft Entra ID Protection, where sign-in requests are evaluated using additional identity-driven signals like IP address location information or device status, among others. These policies use real-time and offline detections to assess the risk level of sign-in attempts and user activities. This dynamic evaluation helps mitigate risks associated with token replay and session hijacking attempts common in AiTM phishing campaigns.

Additionally, consider implementing Zero Trust network security solutions, such as Global Secure Access which provides a unified pane of glass for secure access management of networks, identities, and endpoints.

Device code phishing

Device code phishing is a relatively new technique that has been incorporated by multiple threat actors into their attacks. In device code phishing, threat actors like Storm-2372 exploit the device code authentication flow to capture authentication tokens, which they then use to access target accounts. Storm-1249, a China-based espionage actor, typically uses generic phishing lures—with topics like taxes, civil service, and even book pre-orders—to target high-level officials at organizations of interest. Microsoft has also observed device code phishing being used for post-compromise activity, which are discussed more in the next sections.

At Microsoft, we strongly encourage organizations to block device code flow where possible; if needed, configure Microsoft Entra ID’s device code flow in your Conditional Access policies.

Another modern phishing technique is OAuth consent phishing, where threat actors employ the Open Authorization (OAuth) protocol and send emails with a malicious consent link for a third-party application. Once the target clicks the link and authorizes the application, the threat actor gains access tokens with the requested scopes and refresh tokens for persistent access to the compromised account. In one OAuth consent phishing campaign recently identified by Microsoft, even if a user declines the requested app permissions (by clicking Cancel on the prompt), the user is still sent to the app’s reply URL, and from there redirected to an AiTM domain for a second phishing attempt.

Screenshot of the OAuth app prompt requesting permissions for an unverified Share-File Point Document
Figure 2. OAuth app prompt seeks account permissions

You can prevent employees from providing consent to specific apps or categories of apps that are not approved by your organization by configuring app consent policies to restrict user consent operations. For example, configure policies to allow user consent only to apps requesting low-risk permissions with verified publishers, or apps registered within your tenant.

Device join phishing

Finally, it’s worth highlighting recent device join phishing operations, where threat actors use a phishing link to trick targets into authorizing the domain-join of an actor-controlled device. Since April 2025, Microsoft has observed suspected Russian-linked threat actors using third-party application messages or emails referencing upcoming meeting invitations to deliver a malicious link containing valid authorization code. When clicked, the link returns a token for the Device Registration Service, allowing registration of the threat actor’s device to the tenant. You can harden against this type of phishing attack by requiring authentication strength for device registration in your environment.

Lures remain an effective phishing weapon

While both end users and automated security measures have become more capable at identifying malicious phishing attachments and links, motivated threat actors continue to rely on exploiting human behavior with convincing lures. As these attacks hinge on deceiving users, user training and awareness of commonly identified social engineering techniques are key to defending against them.

Impersonation lures

One of the most effective ways Microsoft has observed threat actors deliver lures is by impersonating people familiar to the target or using malicious infrastructure spoofing legitimate enterprise resources. In the last year, Star Blizzard has shifted from primarily using weaponized document attachments in emails to spear phishing with a malicious link leading to an AiTM page to target the government, non-governmental organizations (NGO), and academic sectors. The threat actor’s highly personalized emails impersonate individuals from whom the target would reasonably expect to receive emails, including known political and diplomatic figures, making the target more likely to be deceived by the phishing attempt.

Screenshot of Star Blizzard's file share spear-phishing email showing a redacted user shared a file with a button to Open the shared PDF. Clicked the Open button displays the embedded link was changed from a legitimate URL to an actor-controlled one.
Figure 3. Star Blizzard file share spear-phishing email

QR codes

We have seen threat actors regularly iterating on the types of lure links incorporated into their attacks to make social engineering more effective. As QR codes have become a ubiquitous feature in communications, threat actors have adopted their use as well. For example, over the past two years, Microsoft has seen multiple actors incorporate QR codes, encoded with links to AiTM phishing pages, into opportunistic tax-themed phishing campaigns.

The threat actor Star Blizzard has even leveraged nonfunctional QR codes as a part of a spear-phishing campaign offering target users an opportunity to join a WhatsApp group: the initial spear-phishing email contained a broken QR code to encourage the targeted users to contact the threat actor. Star Blizzard’s follow-on email included a URL that redirected to a webpage with a legitimate QR code, used by WhatsApp for linking a device to a user’s account, giving the actor access to the user’s WhatsApp account.

Use of AI

Threat actors are increasingly leveraging AI to enhance the quality and volume of phishing lures. As AI tools become more accessible, these actors are using them to craft more convincing and sophisticated lures. In a collaboration with OpenAI, Microsoft Threat Intelligence has seen threat actors such as Emerald Sleet and Crimson Sandstorm interacting with large language models (LLMs) to support social engineering operations. This includes activities such as drafting phishing emails and generating content likely intended for spear-phishing campaigns.

We have also seen suspected use of generative AI to craft messages in a large-scale credential phishing campaign against the hospitality industry, based on the variations of language used across identified samples. The initial email contains a request for information designed to elicit a response from the target and is then followed by a more generic phishing email containing a lure link to an AiTM phishing site.

Screenshot of a suspected AI-generated phishing email claiming to be hiring various services for a wedding.
Figure 4. One of multiple suspected AI-generated phishing email in a widespread phishing campaign

AI helps eliminate the common grammar mistakes and awkward phrasing that once made phishing attempts easier to spot. As a result, today’s phishing lures are more polished and harder for users to detect, increasing the likelihood of successful compromise. This evolution underscores the importance of securing identities in addition to user awareness training.

Phishing risks continue to expand beyond email

Enterprise communication methods have diversified to support distributed workforce and business operations, so phishing has expanded well beyond email messages. Microsoft has seen multiple threat actors abusing enterprise communication applications to deliver phishing messages, and we’ve also observed continued interest by threat actors to leverage non-enterprise applications and social media sites to reach targets.

Teams phishing

Microsoft Threat Intelligence has been closely tracking and responding to the abuse of the Microsoft Teams platform in phishing attacks and has taken action against confirmed malicious tenants by blocking their ability to send messages. The cybercrime access broker Storm-1674, for example, creates fraudulent tenants to create Teams meetings to send chat messages to potential victims using the meeting’s chat functionality; more recently, since November 2024, the threat actor has started compromising tenants and directly calling users over Teams to phish for credentials as well. Businesses can follow our security best practices for Microsoft Teams to further defend against attacks from external tenants.

Leveraging social media

Outside of business-managed applications, employees’ activity on social media sites and third-party communication platforms has widened the digital footprint for phishing attacks. For instance, while the Iranian threat actor Mint Sandstorm primarily uses spear-phishing emails, they have also sent phishing links to targets on social media sites, including Facebook and LinkedIn, to target high-profile individuals in government and politics. Mint Sandstorm, like many threat actors, also customizes and enhances their phishing messages by gathering publicly available information, such as personal email addresses and contacts, of their targets on social media platforms. Global Secure Access (GSA) is one solution that can reduce this type of phishing activity and manage access to social media sites on company-owned devices.

Post-compromise identity attacks

In addition to using phishing techniques for initial access, in some cases threat actors leverage the identity acquired from their first-stage phishing attack to launch subsequent phishing attacks. These follow-on phishing activities enable threat actors to move laterally within an organization, maintain persistence across multiple identities, and potentially acquire access to a more privileged account or to a third-party organization.

You can harden your environment against internal phishing activity by configuring the Microsoft Defender for Office 365 Safe Links policy to apply to internal recipients as well as by educating users to be wary of unsolicited documents and to report suspected phishing messages.

AiTM phishing crafted using legitimate company resources

Storm-0539, a threat actor that persistently targets the retail industry for gift card fraud, uses their initial access to a compromised identity to acquire legitimate emails—such as help desk tickets—that serve as templates for phishing emails. The crafted emails contain links directing users to AiTM phishing pages that mimic the federated identity service provider of the compromised organization. Because the emails resemble the organization’s legitimate messages, lead to convincing AiTM landing pages, and are sent from an internal account, they could be highly convincing. In this way, Storm-0539 moves laterally, seeking an identity with access to key cloud resources.

Intra-organization device code phishing

In addition to their use of device code phishing for initial access, Storm-2372 also leverages this technique in their lateral movement operations. The threat actor uses compromised accounts to send out internal emails with subjects such as “Document to review” and containing a device code authentication phishing payload. Because of the way device code authentication works, the payloads only work for 15 minutes, so Microsoft has seen multiple waves of post-compromise phishing attacks as the threat actor searches for additional credentials.

Screenshot of Storm-2372 lateral movement attempt containing a device code phishing payload
Figure 5. Storm-2372 lateral movement attempt contains device code phishing payload

Defending against credential phishing and social engineering

Defending against phishing attacks begins at the primary gateways: email and other communication platforms. Review our recommended settings for Exchange Online Protection and Microsoft Defender for Office 365, or the equivalent for your email security solution, to ensure your organization has established essential defenses and knows how to monitor and respond to threat activity.

A holistic security posture for phishing must also account for the human aspect of social engineering. Investing in user awareness training and phishing simulations is critical for arming employees with the needed knowledge to defend against tried-and-true social engineering methods. Training can also help when threat actors inevitably refine and improve their techniques. Attack simulation training in Microsoft Defender for Office 365, which also includes simulating phishing messages in Microsoft Teams, is one approach to running realistic attack scenarios in your organization.

Hardening credentials and cloud identities is also necessary to defend against phishing attacks. By implementing the principles of least privilege and Zero Trust, you can significantly slow down determined threat actors who may have been able to gain initial access and buy time for defenders to respond. To get started, follow our steps to configure Microsoft Entra with increased security.

As part of hardening cloud identities, authentication using passwordless solutions like passkeys is essential, and implementing MFA remains a core pillar in identity security. Use the Microsoft Authenticator app for passkeys and MFA, and complement MFA with conditional access policies, where sign-in requests are evaluated using additional identity-driven signals. Conditional access policies can also be scoped to strengthen privileged accounts with phishing resistant MFA. Your passkey and MFA policy can be further secured by only allowing MFA and passkey registrations from trusted locations and devices.

Finally, a Security Service Edge solution like Global Secure Access (GSA) provides identity-focused secure network access. GSA can help to secure access to any app or resource using network, identity, and endpoint access controls.

Among Microsoft Incident Response cases over the past year where we identified the initial access vector, almost a quarter incorporated phishing or social engineering. To achieve phishing resistance and limit the opportunity to exploit human behavior, begin planning for passkey rollouts in your organization today, and  at a minimum, prioritize phishing-resistant MFA for privileged accounts as you evaluate the effect of this security measure on your wider organization. In the meantime, use the other defense-in-depth approaches I’ve recommended in this blog to defend against phishing and social engineering attacks.

Stay vigilant and prioritize your security at every step.

Recommendations

Several recommendations were made throughout this blog to address some of the specific techniques being used by threat actors tracked by Microsoft, along with essential practices for securing identities. Here is a consolidated list for your security team to evaluate.

At Microsoft, we are accelerating security with our work on the Secure by Default framework. Specific Microsoft-managed policies are enabled for every new tenant and raise your security posture with security defaults that provide a baseline of protection for Entra ID and resources like Office 365.

Learn more  

For the latest security research from the Microsoft Threat Intelligence community, check out the Microsoft Threat Intelligence Blog

To get notified about new publications and to join discussions on social media, follow us on LinkedIn, X (formerly Twitter), and Bluesky

To hear stories and insights from the Microsoft Threat Intelligence community about the ever-evolving threat landscape, listen to the Microsoft Threat Intelligence podcast

The post Defending against evolving identity attack techniques appeared first on Microsoft Security Blog.

]]>
New Star Blizzard spear-phishing campaign targets WhatsApp accounts http://approjects.co.za/?big=en-us/security/blog/2025/01/16/new-star-blizzard-spear-phishing-campaign-targets-whatsapp-accounts/ Thu, 16 Jan 2025 17:00:00 +0000 In mid-November 2024, Microsoft Threat Intelligence observed the Russian threat actor we track as Star Blizzard sending their typical targets spear-phishing messages, this time offering the supposed opportunity to join a WhatsApp group.

The post New Star Blizzard spear-phishing campaign targets WhatsApp accounts appeared first on Microsoft Security Blog.

]]>
In mid-November 2024, Microsoft Threat Intelligence observed the Russian threat actor we track as Star Blizzard sending their typical targets spear-phishing messages, this time offering the supposed opportunity to join a WhatsApp group. This is the first time we have identified a shift in Star Blizzard’s longstanding tactics, techniques, and procedures (TTPs) to leverage a new access vector. Star Blizzard’s targets are most commonly related to government or diplomacy (both incumbent and former position holders), defense policy or international relations researchers whose work touches on Russia, and sources of assistance to Ukraine related to the war with Russia.

In our last blog post about Star Blizzard, we discussed how the threat actor targeted dozens of civil society organizations—journalists, think tanks, and non-governmental organizations (NGOs)—between January 2023 and August 2024 by deploying spear-phishing campaigns to exfiltrate sensitive information and interfere in their activities. Since October 3, 2024, Microsoft and the US Department of Justice have seized or taken down more than 180 websites related to that activity. While this coordinated action had a short-term impact on Star Blizzard’s phishing operations, we noted at the time that after this threat actor’s active infrastructure was exposed, they swiftly transitioned to new domains to continue their operations, indicating that the threat actor is highly resilient to operational disruptions.

We assess the threat actor’s shift to compromising WhatsApp accounts is likely in response to the exposure of their TTPs by Microsoft Threat Intelligence and other organizations, including national cybersecurity agencies. While this campaign appears to have wound down at the end of November, we are highlighting the new shift as a sign that the threat actor could be seeking to change its TTPs in order to evade detection.

As part of our continuous monitoring, analysis, and reporting on the threat landscape, we are sharing our information on Star Blizzard’s latest activity to raise awareness of this threat actor’s shift in tradecraft and to educate organizations on how to harden their attack surfaces against this and similar activity. We also directly notify customers who have been targeted or compromised, providing them with the necessary information to help secure their environments.

Targeting WhatsApp account data

Star Blizzard’s new spear-phishing campaign, while novel in that it uses and targets WhatsApp for the first time, exhibits familiar spear-phishing TTPs for Star Blizzard, with the threat actor initiating email contact with their targets, to engage them, before sending them a second message containing a malicious link. The sender address used by the threat actor in this campaign impersonates a US government official, continuing Star Blizzard’s practice of impersonating known political/diplomatic figures, to further ensure target engagement. The initial email sent to targets contains a quick response (QR) code purporting to direct users to join a WhatsApp group on “the latest non-governmental initiatives aimed at supporting Ukraine NGOs.” This code, however, is intentionally broken and will not direct the user towards any valid domain; this is an effort to coax the target recipient into responding.

A close-up of a text
Figure 1. Star Blizzard initial spear-phishing email with broken QR code

When the recipient responds, Star Blizzard sends a second email containing a Safe Links-wrapped t[.]ly shortened link as the alternative link to join the WhatsApp group.

A black text on a white background
Figure 2. Star Blizzard follow-on spear-phishing email with URL link

When this link is followed, the target is redirected to a webpage asking them to scan a QR code to join the group. However, this QR code is actually used by WhatsApp to connect an account to a linked device and/or the WhatsApp Web portal. This means that if the target follows the instructions on this page, the threat actor can gain access to the messages in their WhatsApp account and have the capability to exfiltrate this data using existing browser plugins, which are designed for exporting WhatsApp messages from an account accessed via WhatsApp Web.

Screenshot of the phish attempt displaying a legitimate WhatsApp webpage called To join the US-Ukraine NGOs Group, followed by instructions directing the user to scan the redacted QR code to link their device.
Figure 3. Malicious Star Blizzard phish attempt using WhatsApp linking QR code

While this campaign was limited and appeared to have terminated at the end of November, it nevertheless marked a break in long-standing Star Blizzard TTPs and highlighted the threat actor’s tenacity in continuing spear-phishing campaigns to gain access to sensitive information even in the face of repeated degradations of their operations.

Microsoft Threat Intelligence recommends that all email users belonging to sectors that Star Blizzard typically targets always remain vigilant when dealing with email, especially emails containing links to external resources. These targets are most commonly related to:

  • Government or diplomacy (incumbent and former position holders)
  • Research into defense policy or international relations when related to Russia
  • Assistance to Ukraine related to the ongoing conflict with Russia

When in doubt, contact the person you think is sending the email using a known and previously used email address to verify that the email was indeed sent by them.

Mitigations

To harden networks against the Star Blizzard activity listed above, defenders can implement the following:

  • Implement Microsoft Defender for Endpoint on Android and iOS, which includes anti-phishing capabilities that also apply to QR code phishing attacks, blocking phishing sites from being accessed. 
  • Enable network protection in Microsoft Defender for Endpoint
  • Ensure that tamper protection is enabled in Microsoft Defender for Endpoint
  • Run endpoint detection and response in block mode so that Microsoft Defender for Endpoint can block malicious artifacts, even when your non-Microsoft antivirus does not detect the threat or when Microsoft Defender Antivirus is running in passive mode.
  • Configure investigation and remediation in full automated mode to let Microsoft Defender for Endpoint take immediate action on alerts to resolve breaches, significantly reducing alert volume.
  • Turn on PUA protection in block mode in Microsoft Defender Antivirus
  • Turn on cloud-delivered protection in Microsoft Defender Antivirus or the equivalent for your antivirus product to cover rapidly evolving attacker tools and techniques.
  • Turn on Microsoft Defender Antivirus real-time protection.
  • Encourage users to use Microsoft Edge and other web browsers that support SmartScreen, which identifies and blocks malicious websites, including phishing sites, scam sites, and sites that host malware.
  • Turn on Safe Links and Safe Attachments for Office 365.
  • Use the Attack Simulator in Microsoft Defender for Office 365 to run realistic, yet safe, simulated phishing and password attack campaigns. Utilize the QR code payload in attack simulation training scenarios to mirror Star Blizzard’s and other threat actor’s QR code spear-phishing techniques.

Microsoft Defender XDR detections

Microsoft Defender XDR customers can refer to the list of applicable detections below. Microsoft Defender XDR coordinates detection, prevention, investigation, and response across endpoints, identities, email, apps to provide integrated protection against attacks like the threat discussed in this blog.

Customers with provisioned access can also use Microsoft Security Copilot in Microsoft Defender to investigate and respond to incidents, hunt for threats, and protect their organization with relevant threat intelligence.

Microsoft Defender for Endpoint

The following alerts might indicate threat activity associated with this threat. These alerts, however, can be triggered by unrelated threat activity and are not monitored in the status cards provided with this report.

  • Star Blizzard activity group

Hunting queries

Microsoft Defender XDR

Surface events that may have communicated with the Star Blizzard C2s

let domainList = dynamic(["civilstructgeo.org", "aerofluidthermo.org"]);
union
(
    DnsEvents
    | where QueryType has_any(domainList) or Name has_any(domainList)
    | project TimeGenerated, Domain = QueryType, SourceTable = "DnsEvents"
),
(
    IdentityQueryEvents
    | where QueryTarget has_any(domainList)
    | project Timestamp, Domain = QueryTarget, SourceTable = "IdentityQueryEvents"
),
(
    DeviceNetworkEvents
    | where RemoteUrl has_any(domainList)
    | project Timestamp, Domain = RemoteUrl, SourceTable = "DeviceNetworkEvents"
),
(
    DeviceNetworkInfo
    | extend DnsAddresses = parse_json(DnsAddresses), ConnectedNetworks = parse_json(ConnectedNetworks)
    | mv-expand DnsAddresses, ConnectedNetworks
    | where DnsAddresses has_any(domainList) or ConnectedNetworks.Name has_any(domainList)
    | project Timestamp, Domain = coalesce(DnsAddresses, ConnectedNetworks.Name), SourceTable = "DeviceNetworkInfo"
),
(
    VMConnection
    | extend RemoteDnsQuestions = parse_json(RemoteDnsQuestions), RemoteDnsCanonicalNames = parse_json(RemoteDnsCanonicalNames)
    | mv-expand RemoteDnsQuestions, RemoteDnsCanonicalNames
    | where RemoteDnsQuestions has_any(domainList) or RemoteDnsCanonicalNames has_any(domainList)
    | project TimeGenerated, Domain = coalesce(RemoteDnsQuestions, RemoteDnsCanonicalNames), SourceTable = "VMConnection"
),
(
    W3CIISLog
    | where csHost has_any(domainList) or csReferer has_any(domainList)
    | project TimeGenerated, Domain = coalesce(csHost, csReferer), SourceTable = "W3CIISLog"
),
(
    EmailUrlInfo
    | where UrlDomain has_any(domainList)
    | project Timestamp, Domain = UrlDomain, SourceTable = "EmailUrlInfo"
),
(
    UrlClickEvents
    | where Url has_any(domainList)
    | project Timestamp, Domain = Url, SourceTable = "UrlClickEvents"
)
| order by TimeGenerated desc

Microsoft Sentinel

Microsoft Sentinel customers can use the TI Mapping analytics (a series of analytics all prefixed with ‘TI map’) to automatically match the malicious domain indicators mentioned in this blog post with data in their workspace. If the TI Map analytics are not currently deployed, customers can install the Threat Intelligence solution from the Microsoft Sentinel Content Hub to have the analytics rule deployed in their Sentinel workspace.

While the below queries are not linked to any specific threat actor, they are effective in detecting potential phishing attempts. Implementing these queries can help you stay vigilant and safeguard your organization from phishing attacks

Microsoft Security Copilot

Security Copilot customers can use the standalone experience to create their own prompts or run the following pre-built promptbooks to automate incident response or investigation tasks related to this threat:

  • Incident investigation
  • Microsoft User analysis
  • Threat actor profile
  • Threat Intelligence 360 report based on MDTI article

Note that some promptbooks require access to plugins for Microsoft products such as Microsoft Defender XDR or Microsoft Sentinel.

Threat intelligence reports

Microsoft customers can use the following reports in Microsoft products to get the most up-to-date information about the threat actor, malicious activity, and techniques discussed in this blog. These reports provide the intelligence, protection information, and recommended actions to prevent, mitigate, or respond to associated threats found in customer environments.

Microsoft Defender Threat Intelligence

Microsoft Security Copilot customers can also use the Microsoft Security Copilot integration in Microsoft Defender Threat Intelligence, either in the Security Copilot standalone portal or in the embedded experience in the Microsoft Defender portal to get more information about this threat actor.

Indicators of compromise

IndicatorTypeLast seen
civilstructgeo[.]orgDomainOctober 2024
aerofluidthermo[.]orgDomainOctober 2024

References

Learn more

For further information on the threats detailed in this blog post, refer to these additional Microsoft blogs:

For the latest security research from the Microsoft Threat Intelligence community, check out the Microsoft Threat Intelligence Blog: https://aka.ms/threatintelblog.

To get notified about new publications and to join discussions on social media, follow us on LinkedIn at https://www.linkedin.com/showcase/microsoft-threat-intelligence, and on X (formerly Twitter) at https://twitter.com/MsftSecIntel.

To hear stories and insights from the Microsoft Threat Intelligence community about the ever-evolving threat landscape, listen to the Microsoft Threat Intelligence podcast: https://thecyberwire.com/podcasts/microsoft-threat-intelligence.

The post New Star Blizzard spear-phishing campaign targets WhatsApp accounts appeared first on Microsoft Security Blog.

]]>
Star Blizzard increases sophistication and evasion in ongoing attacks http://approjects.co.za/?big=en-us/security/blog/2023/12/07/star-blizzard-increases-sophistication-and-evasion-in-ongoing-attacks/ Thu, 07 Dec 2023 12:01:00 +0000 Microsoft Threat Intelligence continues to track and disrupt malicious activity attributed to a Russian state-sponsored actor we track as Star Blizzard, who has continuously improved their detection evasion capabilities while remaining focused on email credential theft against targets.

The post Star Blizzard increases sophistication and evasion in ongoing attacks appeared first on Microsoft Security Blog.

]]>

January 2025 update – In mid-November 2024, Star Blizzard was observed shifting their tactics, techniques, and procedures (TTPs), likely in response to the exposure of their TTPs by Microsoft Threat Intelligence and other organizations. Learn more about our observations and findings in this Microsoft Threat Intelligence blog post: New Star Blizzard spear-phishing campaign targets WhatsApp accounts.

October 2024 update – Microsoft’s Digital Crimes Unit (DCU) is disrupting the technical infrastructure used by Star Blizzard. We have updated this blog with the latest observed Star Blizzard tactics, techniques, and procedures (TTPs).

Microsoft Threat Intelligence continues to track and disrupt malicious activity attributed to a Russian nation-state actor we call Star Blizzard. Star Blizzard has continuously improved their detection evasion capabilities while remaining focused on email credential theft against the same targets. Star Blizzard, whose activities we assess to have historically supported both espionage and cyber influence objectives, continues to prolifically target individuals and organizations involved in international affairs, defense, and logistics support to Ukraine, as well as academia, information security companies, and other entities aligning with Russian state interests. Microsoft continues to refine and deploy protections against Star Blizzard’s evolving spear-phishing tactics.

Microsoft is grateful for the collaboration on investigating Star Blizzard compromises with the international cybersecurity community, including our partners at the UK National Cyber Security Centre, the US National Security Agency Cybersecurity Collaboration Center, and the US Federal Bureau of Investigation.

This blog provides updated technical information about Star Blizzard tactics, techniques, and procedures (TTPs), building on our 2022 blog as the threat actor continues to refine their tradecraft to evade detection. As with any observed nation-state actor activity, Microsoft directly notifies customers that have been targeted or compromised, providing them with the necessary information to secure their accounts.

Star Blizzard TTPs observed in 2024

Star Blizzard persistently introduces new techniques to avoid detection. These TTPs are employed for brief periods and are either modified or abandoned once they become publicly known.

Microsoft has identified the following evasive techniques used by Star Blizzard in campaigns in 2024:

  • Use of multiple registrars to register domain infrastructure
  • Use of multiple link-shortening services and legitimate websites with open redirects, to hide actor-registered domains
  • Use of altered legitimate email templates as spear-phishing lures

Using multiple registrars to register domain infrastructure

In December 2023, we highlighted that Star Blizzard was using the registrar NameCheap to register their domain infrastructure. As CitizenLab reported (August 2024), the threat actor has also used Hostinger to register domains used in the infrastructure for email credential theft.

Microsoft can confirm that in 2024 Star Blizzard transitioned from their long-standing practice of primarily using a single domain name registrar. Among the registrars seen used by Star Blizzard in 2024 are the following:

  • Hostinger
  • RealTime Register
  • GMO Internet

A list of recent domain names registered by Star Blizzard can be found at the end of this report.

Since August 2024, Star Blizzard has made substantial changes in the methods they employ to redirect targets to their virtual private server (VPS) infrastructure, on which Evilginx is installed and then used to facilitate credential theft.

In December 2023, we detailed the threat actor’s use of email marketing platforms to prevent the need to embed the actor-registered domains in their spear-phishing emails. This technique was abandoned in early 2024, with the threat actor transitioning first to hosting the initial redirector website on shared infrastructure. Since August 2024, Star Blizzard has added multiple layers of redirection to their VPS infrastructure, utilizing various link-shortening services and legitimate websites that can be used as open redirectors.

For example, in a recent spear-phishing email that was sent from an actor-controlled Outlook account, we found that the threat actor had embedded an initial link, which was created using the Microsoft 365 Safe Links into the attached PDF lure. The Safe Links URL could only be generated by sending an email between actor-controlled accounts with the link in the body. The actor then copied that generated Safe Links URL to use in their attack.   

text
Figure 1. Initial link in a spear-phishing campaign by Star Blizzard embedded in a PDF file

This link redirected to a shortened URL created using the Bitly link-shortening service, which resolved to another shortened URL created using the Cuttly link-shortening service. The second shortened URL redirected to a legitimate website, used as an open redirector, which ultimately redirected to the first actor-controlled domain.

The website mechengsys[.]net was hosted on shared infrastructure at Hostinger and performed various filtering actions until ultimately redirecting to an actor-controlled VPS installed with Evilginx, resolving the domain vidmemax[.]com.

diagram
Figure 2. Chain of redirection from initial link to the Star Blizzard-controlled domain

Use of altered legitimate email templates as spear-phishing lures

For a brief period between July and August 2024, the threat actor utilized spear-phishing lures that did not contain or redirect to PDF lures embedded with links that redirected to actor-controlled infrastructure. Instead, Star Blizzard sent targets an altered OneDrive file share notification that included a clickable link to a malicious URL. When clicked, the link would initiate redirection to actor-controlled infrastructure. We observed Star Blizzard using this approach in spear-phishing attacks against its traditional espionage targets, including individuals associated with politics and diplomacy, NGOs, and think tanks.

diagram
Figure 3. The attack chain used in Star Blizzard’s 2024 spear-phishing lure campaign

In this approach, the threat actor began by creating a new email account, usually a Proton account, intended to impersonate a trusted sender so the recipient would be more likely to open the phishing email. The actor then stored a benign PDF or Word file in a cloud file-hosting service (for example, when targeting Microsoft customers, OneDrive) and shared the file with the newly created email account. The threat actor edited the HTML of the email, changing the displayed sender name and the URL behind the “Open” button that would otherwise lead back to the OneDrive-hosted file so that it directed to the Evilginx redirector domain instead.  

Star Blizzard then sent the spear-phishing email to the target. When the “Open” button was clicked, it directed the user to the redirector domain, which, after performing filtering based on browser fingerprinting and additional methods, directed the target to an actor-controlled Virtual Private Server (VPS) with the Evilginx installation. The Evilginx server allowed Star Blizzard to perform an adversary-in-the-middle (AiTM) attack on an authentication session to an email provider, enabling the actor to receive the necessary information to perform subsequent sign-ins to the target’s email account, including the username, password, and MFA token, if MFA is used by the target.

graphical user interface, text, application
Figure 4. Star Blizzard spear-phishing lure

TTPs used in past Star Blizzard campaigns

Microsoft observed Star Blizzard using the following TTPs in campaigns before 2024, highlighting continuously evolving techniques used by the threat actor to evade detection:

  • Use of server-side scripts to prevent automated scanning of actor-controlled infrastructure
  • Use of email marketing platform services to hide true email sender addresses and obviate the need for including actor-controlled domain infrastructure in email messages
  • Use of a DNS provider to obscure the IP addresses of actor-controlled virtual private server (VPS) infrastructure. Once notified, the DNS provider took action to mitigate actor-controlled domains abusing their service.
  • Password-protected PDF lures or links to cloud-based file-sharing platforms where PDF lures are hosted
  • Shift to a more randomized domain generation algorithm (DGA) for actor-registered domains

Use of server-side scripts to prevent automated scanning

Between April 2023 and December 2023, we observed Star Blizzard gradually moving away from using hCaptcha servers as the sole initial filter to prevent automatic scanning of their Evilginx server infrastructure. Redirection was still performed by an actor-controlled server, first executing JavaScript code (titled “Collect and Send User Data”) before redirecting the browsing session to the Evilginx server.

Shortly after, in May 2023, the threat actor was observed refining the JavaScript code, resulting in an updated version (titled “Docs”), which is still in use today.

This capability collects various information from the browser performing the browsing session to the redirector server. The code contains three main functions:

  • pluginsEmpty(): This function checks if the browser has any plugins installed.
A screenshot of code for a function that checks if the browser has any plugins installed
  • isAutomationTool(): This function checks for various indicators that the page is being accessed by an automation tool (such as Selenium, PhantomJS, or Nightmare) and returns an object with information about the detected tools.
A screenshot of code for a function that checks for various indicators that the page is being accessed by an automation tool and returns an object with information about the detected tools.
  • sendToBackend(data): This function sends the data collected by isAutomationTool() to the server using a POST request. If the server returns a response, the message in the response is executed using eval().
A screenshot of code for a function that sends the data collected by isAutomationTool() to the server using a POST request.

Following the POST request, the redirector server assessed the data collected from the browser and decided whether to allow continued browser redirection.

When a good verdict is reached, the browser received a response from the redirection server, redirecting to the next stage of the chain, which is either an hCaptcha for the user to solve, or direct to the Evilginx server.

A bad verdict resulted in the receipt of an HTTP error response and no further redirection.

Screenshot of code depicting the POST request and server response
Figure 5. Content of POST request and server response using “Collect and Send User Data” JavaScript

Use of email marketing platform services

We previously observed Star Blizzard using two different services, HubSpot and MailerLite. The actor used these services to create an email campaign, which provided them with a dedicated subdomain on the service that is then used to create URLs. These URLs acted as the entry point to a redirection chain ending at actor-controlled Evilginx server infrastructure. The services also provided the user with a dedicated email address per configured email campaign, which the threat actor has been seen to use as the “From” address in their campaigns.

Most Star Blizzard HubSpot email campaigns have targeted multiple academic institutions, think tanks, and other research organizations using a common theme, aimed at obtaining their credentials for a US grants management portal. We assess that this use-case of the HubSpot mailing platform was to allow the threat actor to track large numbers of identical messages sent to multiple recipients. Note should be taken to the “Reply-to” address in these emails, which is required by the HubSpot platform to be an actual in-use account. All the sender accounts in the following examples were dedicated threat actor-controlled accounts.

Three screenshots of themed spear-phishing email headers for a US grants management portal
Figure 6. Examples of themed spear-phishing email headers

Other HubSpot campaigns have been observed using the campaign URL embedded in an attached PDF lure or directly in the email body to perform redirection to actor-controlled Evilginx server infrastructure configured for email account credential theft. We assess that in these cases, the HubSpot platform was used to remove the need for including actor-controlled domain infrastructure in the spear-phishing emails and better evade detection based on indicators of compromise (IOC).

Figure 7. Example of victim redirection chain using initial HubSpot URL

Star Blizzard’s use of the MailerLite platform is similar to the second HubSpot tactic described above, with the observed campaign URL redirecting to actor-controlled infrastructure purposed for email credential theft.

Use of a DNS provider to resolve actor-controlled domain infrastructure

In December 2022, we began to observe Star Blizzard using a domain name service (DNS) provider that also acts as a reverse proxy server to resolve actor-registered domain infrastructure. As of May 2023, most Star Blizzard registered domains associated with their redirector servers use a DNS provider to obscure the resolving IP addresses allocated to their dedicated VPS infrastructure.

We have yet to observe Star Blizzard utilizing a DNS provider to resolve domains used on Evilginx servers.

Star Blizzard has been observed sending password-protected PDF lures in an attempt to evade email security processes implemented by defenders. The threat actor usually sends the password to open the file to the targeted user in the same or a subsequent email message.

In addition to password-protecting the PDF lures themselves, the actor has been observed hosting PDF lures at a cloud storage service and sharing a password-protected link to the file in a message sent to the intended victim. While Star Blizzard frequently uses cloud storage services from all major providers (including Microsoft OneDrive), Proton Drive is predominantly chosen for this purpose.

Microsoft suspends Star Blizzard operational accounts discovered using our platform for their spear-phishing activities.

Screenshot of an example spear-phishing email with a password protecting link to Proton Drive
Figure 8. Example of spear-phishing email with password protected link to Proton Drive

Randomizing DGA for actor registered domains

Following the detailed public reporting by Recorded Future (August 2023) on detection opportunities for Star Blizzard domain registrations, we have observed the threat actor making significant changes in their chosen domain naming syntax.

Prior to the public reporting, Star Blizzard utilized a limited wordlist for their DGA. Subsequently, Microsoft has observed that the threat actor has upgraded their domain-generating mechanism to include a more randomized list of words.

Despite the increased randomization, Microsoft has identified detection opportunities based on the following constant patterns in Star Blizzard domain registration behavior:

  • Namecheap remains the registrar of choice
  • Domains are usually registered in groups, many times with similar naming conventions
  • X.509 TLS certificates are provided by Let’s Encrypt, created in the same timeframe of domain registration
Examples of two X.509 TLS certificates used by the threat actor
Figure 9. Examples of X.509 TLS certificates used by Star Blizzard

A list of recent domain names registered by Star Blizzard can be found at the end of this report.

Consistent TTPs since 2022

Star Blizzard activities remain focused on email credential theft, predominantly targeting cloud-based email providers that host organizational and/or personal email accounts.

Star Blizzard continues to utilize the publicly available Evilginx framework to achieve their objective, with the initial access vector remaining to be spear-phishing via email. Target redirection to the threat actor’s Evilginx server infrastructure is still usually achieved using custom-built PDF lures that open a browser session. This session follows a redirection chain ending at actor-controlled Evilginx infrastructure that is configured with a “phishlet” for the intended targets’ email provider.

Star Blizzard remains constant in their use of pairs of dedicated VPSs to host actor-controlled infrastructure (redirector + Evilginx servers) used for spear-phishing activities, where each server usually hosts a separate actor registered domain.

Dgram displaying the redirection chain from PDF spear-phishing lure, to the actor-controlled VPS hosting redirection server, to the actor-controlled VPS hosting Evilginx server.
Figure 10. Typical Star Blizzard redirection chain to Evilginx infrastructure

Protecting yourself against Star Blizzard

As with all threat actors that focus on phishing or spear-phishing to gain initial access to victim mailboxes, individual email users should be aware of who these attacks target and what they look like to improve their ability to identify and avoid further attacks.

The following are a list of answers to questions that enterprise and consumer email users should be asking about the threat from Star Blizzard:

Am I at risk of being a Star Blizzard target?

Users and organizations are more likely to be a potential Star Blizzard target if connected to the following areas:

  1. Government or diplomacy (both incumbent and former position holders).
  2. Research into defense policy or international relations when related to Russia.
  3. Assistance to Ukraine related to the ongoing conflict with Russia.

Remember that Star Blizzard targets both consumer and enterprise accounts, so there is an equal threat to both organization and personal accounts.

What will a Star Blizzard spear-phishing email look like?

Star Blizzard emails appear to be from a known contact that users or organizations expect to receive email from. The sender address could be from any free email provider, but special attention should be paid to emails received from Proton account senders  (@proton[.]me, @protonmail[.]com) as they are frequently used by the threat actor.

An initial email is usually sent to the target, asking them to review a document, but without any attachment or link to the document.

The threat actor will wait for a response, and following that, will send an additional message with either an attached PDF file or an embedded link, as detailed above in “Star Blizzard TTPs observed in 2024.”

If the targeted user has not completed authentication by entering their password in the offered sign-in page and/or supplied all the required factors for multifactor authentication (MFA), the threat actor does not have the capability to successfully compromise the targeted account.

Our recommendation to all email users that belong to Star Blizzard targeted sectors is to always remain vigilant when dealing with email, especially emails containing links to external resources. When in doubt, contact the person you think is sending the email using a known and previously used email address, to verify that the email was indeed sent by them.

What happens if I interact with a Star Blizzard PDF lure?

Pressing the button in a PDF lure causes the default browser to open a link embedded in the PDF file code—this is the beginning of the redirection chain. Targets will likely see a web page titled “Docs” in the initial page opened and may be presented with a CAPTCHA to solve before continuing the redirection. The browsing session will end showing a sign-in screen to the account where the spear-phishing email was received, with the targeted email already appearing in the username field.

The host domain in the web address is an actor-controlled domain (see appendix for full list), and not the expected domain of the email server or cloud service.

If multifactor authentication is configured for a targeted email account, entering a password in the displayed sign-in screen will trigger an authentication approval request. If passwordless access is configured for the targeted account, an authentication approval request is immediately received on the device chosen for receiving authentication approvals.

As long as the authentication process is not completed (a valid password is not entered and/or an authentication request is not approved), the threat actor has not compromised the account.

If the authentication process is completed, the credentials have been successfully compromised by Star Blizzard, and the threat actor has all the required details needed to immediately access the mailbox, even if multifactor authentication is enabled.

Four screenshots of what the PDF lures look like when opened, such as a CAPTCHAs or sign-in pages.
Figure 11. Examples of Star Blizzard PDF lures when opened

Recommendations

As with any observed nation-state actor activity, Microsoft directly notifies customers that have been targeted or compromised, providing them with the necessary information to secure their accounts.

Microsoft emphasizes that the following two mitigations will strengthen customers’ environments against Star Blizzard attack activity:

Microsoft is sharing indicators of compromise related to this attack at the end of this report to encourage the security community to further investigate for potential signs of Star Blizzard activity using their security solution of choice. All these indicators have been incorporated into the threat intelligence feed that powers Microsoft Defender products to aid in protecting customers and mitigating this threat. If your organization is a Microsoft Defender for Office customer or a Microsoft Defender for Endpoint customer with network protection turned on, no further action is required to mitigate this threat presently. A thorough investigation should be performed to understand potential historical impact if Star Blizzard activity has been previously alerted on in the environment.

Additionally, Microsoft recommends the following mitigations to reduce the impact of this threat:

  • Use advanced anti-phishing solutions like Microsoft Defender for Office 365 that monitor and scan incoming emails and visited websites. For example, organizations can leverage web browsers that automatically identify and block malicious websites and provide solutions that detect and block malicious emails, links, and files.
  • Run endpoint detection and response (EDR) in block mode so that Microsoft Defender for Endpoint can block malicious artifacts, even when your non-Microsoft antivirus does not detect the threat, or when Microsoft Defender Antivirus is running in passive mode. EDR in block mode works behind the scenes to remediate malicious artifacts that are detected post-compromise.
  • Configure investigation and remediation in full automated mode to allow Microsoft Defender for Endpoint to take immediate action on alerts to resolve breaches, significantly reducing alert volume.
  • Turn on cloud-delivered protection and automatic sample submission in Microsoft Defender Antivirus to cover rapidly evolving attacker tools, techniques, and behaviors. These capabilities use artificial intelligence and machine learning to quickly identify and stop new and unknown threats.
  • Use  security defaults as a baseline set of policies to improve identity security posture. For more granular control, enable conditional access policies.  Conditional access policies evaluate sign-in requests using additional identity driven signals like user or group membership, IP location information, and device status, among others, and are enforced for suspicious sign-ins. Organizations can protect themselves from attacks that leverage stolen credentials by enabling policies such as compliant devices or trusted IP address requirements.
  • Implement continuous access evaluation.
  • Continuously monitor suspicious or anomalous activities. Investigate sign-in attempts with suspicious characteristics (for example, location, ISP, user agent, and use of anonymizer services).
  • Configure Microsoft Defender for Office 365 to recheck links on click. Safe Links provides URL scanning and rewriting of inbound email messages in mail flow, and time-of-click verification of URLs and links in email messages, other Office 365 applications such as Teams, and other locations such as SharePoint Online. Safe Links scanning occurs in addition to the regular anti-spam and anti-malware protection in inbound email messages in Exchange Online Protection (EOP). Safe Links scanning can help protect your organization from malicious links that are used in phishing and other attacks.
  • Use the Attack Simulator in Microsoft Defender for Office 365 to organize realistic, yet safe, simulated phishing and password attack campaigns in your organization by training end users against clicking URLs in unsolicited messages and disclosing their credentials. Training should include checking for poor spelling and grammar in phishing emails or the application’s consent screen as well as spoofed app names, logos, and domain URLs appearing to originate from legitimate applications or companies. Note that Attack Simulator testing only supports phishing emails containing links at this time.
  • Encourage users to use Microsoft Edge and other web browsers that support Microsoft Defender SmartScreen, which identifies and blocks malicious websites, including phishing sites, scam sites, and sites that contain exploits and host malware. In all web protection scenarios, SmartScreen and Network Protection can be used together to ensure protection across both Microsoft and non-Microsoft browsers and processes.
  • Microsoft Defender customers can turn on attack surface reduction rules to prevent common attack techniques:

Appendix

Microsoft Defender XDR detections

Microsoft Defender for Office 365

Microsoft Defender for Office 365 offers enhanced solutions for blocking and identifying malicious emails. Signals from Microsoft Defender for Office 365 inform Microsoft 365 Defender, which correlate cross-domain threat intelligence to deliver coordinated defense, when this threat has been detected. These alerts, however, can be triggered by unrelated threat activity. Example alerts:

  • A potentially malicious URL click was detected
  • Email messages containing malicious URL removed after delivery
  • Email messages removed after delivery
  • Email reported by user as malware or phish

Microsoft Defender SmartScreen

Microsoft Defender SmartScreen has implemented detections against the phishing domains represented in the IOC section below. By enabling Network protection, organizations can block attempts to connect to these malicious domains.

Microsoft Defender for Endpoint

Aside from the Microsoft Defender for Office 365 alerts above, customers can also monitor for the following Microsoft Defender for Endpoint alerts for this attack. Note that these alerts can also be triggered by unrelated threat activity. Example alerts:

  • Star Blizzard activity group
  • Suspicious URL clicked
  • Suspicious URL opened in web browser
  • User accessed link in ZAP-quarantined email
  • Suspicious activity linked to a Russian state-sponsored threat actor has been detected
  • Connection to adversary-in-the-middle (AiTM) phishing site
  • User compromised in AiTM phishing attack
  • Possible AiTM phishing attempt

Threat intelligence reports

Microsoft customers can use the following reports in Microsoft products to get the most up-to-date information about the threat actor, malicious activity, and techniques discussed in this blog. These reports provide the intelligence, protection information, and recommended actions to prevent, mitigate, and respond to associated threats found in customer environments.

Microsoft Defender Threat Intelligence

Microsoft Defender for Endpoint Threat analytics 

Hunting queries  

Microsoft Sentinel 

Microsoft Sentinel customers can use the TI Mapping analytics (a series of analytics all prefixed with ‘TI map’) to automatically match the malicious domain indicators mentioned in this blog post with data in their workspace. If the TI Map analytics are not currently deployed, customers can install the Threat Intelligence solution from the Microsoft Sentinel Content Hub to have the analytics rule deployed in their Sentinel workspace.  

Indicators of compromise

Domain infrastructure observed in 2024

Domain nameRegistrarRegistered
confsendlist[.]orgHostinger UAB2024/08/27 18:31
asyncmainfunc[.]netHostinger UAB2024/08/27 17:52
postpackfull[.]comRealtime Register2024/08/27 17:26
bootsgatein[.]netHostinger UAB2024/08/27 16:36
getshowprofile[.]comRealtime Register2024/08/27 15:11
universalindospices[.]comRealtime Register2024/08/26 16:00
nucleareng[.]netHostinger UAB2024/08/22 16:48
embriodev[.]orgHostinger UAB2024/08/22 12:36
compmatheng[.]comEranet International 2024/08/21 13:52
biomechsys[.]orgPublicDomainRegistry2024/08/21 13:02
abstractalg[.]comHostinger UAB2024/08/21 11:54
epidemioeng[.]orgHostinger UAB2024/08/21 11:44
entomoleng[.]orgPublicDomainRegistry2024/08/19 13:52
firewalliot[.]orgHostinger UAB2024/08/16 14:28
vidmemax[.]comHostinger UAB2024/08/16 09:22
authadm[.]toolsPublicDomainRegistry2024/08/15 21:35
opiloans[.]comGMO Internet2024/08/15 03:45
steeldartpro[.]comGMO Internet2024/08/15 01:09
mechengsys[.]netTucows2024/08/08 15:53
poortruncselector[.]comHostinger UAB2024/08/01 17:36
keyvaluepassin[.]netHostinger UAB2024/08/01 16:40
aeromechelec[.]orgHostinger UAB2024/07/25 13:46
quantumspherebyteonline[.]orgHostinger UAB2024/07/22 13:49
bittechxeondynamics[.]orgHostinger UAB2024/07/22 11:34
synchrosphere[.]orgHostinger UAB2024/07/19 17:52
quantumnyx[.]orgHostinger UAB2024/07/19 16:12
introsavemsg[.]orgHostinger UAB2024/07/11 18:20
grepfileintro[.]netHostinger UAB2024/07/11 16:53
innotechhub[.]netHostinger UAB2024/07/09 17:44
nextgenprotocol[.]orgHostinger UAB2024/07/09 16:57
cyberwaytransfer[.]netHostinger UAB2024/07/09 15:55
dentalmag[.]orgHostinger UAB2024/07/08 17:41
eichenfass[.]orgHostinger UAB2024/07/08 16:18
loyaltyfirst[.]orgHostinger UAB2024/07/05 18:02
investfix[.]orgHostinger UAB2024/07/03 15:36
spurcapitalconstruction[.]comHostinger UAB2024/06/29 09:45
nutritivoybarato[.]comHostinger UAB2024/06/29 07:56
crestwoodtok[.]comHostinger UAB2024/06/28 17:29
accountingempowered[.]comHostinger UAB2024/06/28 08:53
iinguinalhernia[.]comHostinger UAB2024/06/28 06:03
absardeiracargo[.]comHostinger UAB2024/06/27 18:18
destelloideal[.]comHostinger UAB2024/06/27 14:33
dontezandkrisselm[.]comHostinger UAB2024/06/27 11:45
jeredutech[.]comHostinger UAB2024/06/26 16:52
mettezera[.]comHostinger UAB2024/06/26 16:33
btxfirewood[.]comHostinger UAB2024/06/26 14:34
equipemyr[.]comHostinger UAB2024/06/25 16:13
vizionviews[.]comHostinger UAB2024/06/25 08:03
alonaservices[.]comHostinger UAB2024/06/24 19:08
getvfsmartwatch[.]comHostinger UAB2024/06/22 13:43
cellvariedades[.]comHostinger UAB2024/06/21 16:55
mashelterssettlement[.]comHostinger UAB2024/06/20 17:59
specialdiskount[.]comHostinger UAB2024/06/19 17:07
sinatagotasbrasil[.]comHostinger UAB2024/06/19 10:53
yorkviewstating[.]comHostinger UAB2024/06/19 09:12
supermercadolagocalima[.]comHostinger UAB2024/06/18 15:11
arsenalcaption[.]comHostinger UAB2024/06/15 20:02
carpenterkari[.]comPublicDomainRegistry2024/06/12 13:58
spandvi[.]comHostinger UAB2024/06/11 18:10
cucudor[.]comHostinger UAB2024/06/11 16:16
animalmedic[.]orgHostinger UAB2024/06/11 15:07
movercon[.]comHostinger UAB2024/06/07 13:11
crafflights[.]comHostinger UAB2024/06/06 16:14
pilotsheikh[.]comHostinger UAB2024/06/06 10:37
smlancer[.]comHostinger UAB2024/06/06 09:27
casioakocustom[.]comHostinger UAB2024/06/05 15:24
prismhavenphotography[.]comHostinger UAB2024/06/04 19:12
diananithilamills[.]comHostinger UAB2024/06/04 15:45
egenre[.]netHostinger UAB2024/05/19 16:20
cityessentials[.]netHostinger UAB2024/05/19 15:30
esestacey[.]netHostinger UAB2024/05/19 14:33
seltinger[.]comPublicDomainRegistry2024/05/16 20:54
livonereg[.]comPublicDomainRegistry2024/05/16 20:54
gothicshop[.]orgHostinger UAB2024/05/07 13:14
directic[.]netNameCheap2024/04/25 16:49
sgmods[.]netNameCheap2024/04/25 14:39
calmlion[.]orgNameCheap2024/04/18 13:11
mayquarkesthetic[.]comHostinger UAB2024/04/08 17:00
xacshop[.]comHostinger UAB2024/04/08 13:50
prostrokes[.]netNameCheap2024/03/29 13:34
imgrich[.]comHostinger UAB2024/03/15 14:56
editablezoom[.]orgHostinger UAB2024/03/15 13:33

Past Star Blizzard domain infrastructure

DomainRegisteredRegistrarX.509 TLS Certificate IssuerDNS provider resolving
centralitdef[.]com2023/04/03 14:29:33NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
rootgatewayshome[.]com2023/04/06 16:09:06NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
directstoragepro[.]com2023/04/07 14:18:19NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
infocryptoweb[.]com2023/04/07 14:44:38NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
cloudwebstorage[.]com2023/04/09 14:13:44NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
cryptdatahub[.]com2023/04/10 10:07:44NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
datainfosecure[.]com2023/04/10 10:16:20NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
servershieldme[.]com2023/04/11 07:32:41NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
scandefinform[.]com2023/04/12 10:18:26NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
guardittech[.]com2023/04/12 13:36:33NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
storageinfohub[.]com2023/04/14 12:23:02NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
docsinfohub[.]com2023/04/14 16:24:45NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
dbasechecker[.]com2023/04/20 08:31:04NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
dbasecheck[.]com2023/04/20 08:31:04NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
gaterecord[.]com2023/04/25 14:17:14NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
directsgate[.]com2023/04/25 14:17:14NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
storageinformationsolutions[.]com2023/04/25 15:33:03NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
storagedatadirect[.]com2023/04/25 15:33:05NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
informationdoorwaycertificate[.]com2023/04/25 17:50:04NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
datagatewaydoc[.]com2023/04/25 17:50:37NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
panelittechweb[.]com2023/04/27 12:19:19NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
panelitsolution[.]com2023/04/27 12:19:19NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
keeperdocument[.]com2023/04/27 14:18:19NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
keeperdocumentgatewayhub[.]com2023/04/27 14:18:25NameCheap, IncC=US, O=Let’s Encrypt, CN=R3Yes
docview[.]cloud2023/05/03 06:33:44Hostinger UABC=US, O=Let’s Encrypt, CN=R3 
protectitbase[.]com2023/05/03 09:07:33NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
webcatalogpro[.]com2023/05/04 09:47:19NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
infoformdata[.]com2023/05/04 13:13:56NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
keydatastorageunit[.]com2023/05/10 09:20:39NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
docanalizergate[.]com2023/05/10 15:23:14NameCheap, IncC=US, O=Let’s Encrypt, CN=R3Yes
docanalizerhub[.]com2023/05/10 15:23:21NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
hubdatapage[.]com2023/05/10 16:07:31NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
skyinformdata[.]com2023/05/11 11:10:35NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
docsaccessdata[.]com2023/05/11 12:35:02NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
datacryptosafe[.]com2023/05/11 16:46:00NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
cloudsetupprofi[.]com2023/05/12 15:35:42NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
setupprofi[.]com2023/05/12 15:35:52NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
analyzedatainfo[.]com2023/05/15 15:30:04NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
infocryptodata[.]com2023/05/15 16:41:42NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
datadocsview[.]com2023/05/16 13:23:38NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
gatedocsview[.]com2023/05/16 13:23:42NameCheap, IncC=US, O=Let’s Encrypt, CN=R3Yes
hubinfodocs[.]com2023/05/16 13:27:07NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
proffsolution[.]com2023/05/16 14:20:42NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
proffitsolution[.]com2023/05/16 14:20:44NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
defproresults[.]com2023/05/16 14:20:49NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
greatnotifyinfo[.]com2023/05/16 14:55:49NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
topnotifydata[.]com2023/05/16 14:55:53NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
topinformdata[.]com2023/05/16 14:55:58NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
defoffresult[.]com2023/05/16 15:23:49NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
cloudinfodata[.]com2023/05/16 15:23:52NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
webpartdata[.]com2023/05/16 15:23:57NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
infostoragegate[.]com2023/05/17 14:41:37NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
wardenstoragedoorway[.]com2023/05/17 15:17:10NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
myposcheck[.]com2023/05/25 08:52:50NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
poscheckdatacenter[.]com2023/05/25 08:52:51NameCheap, IncC=US, O=Let’s Encrypt, CN=R3Yes
checkdatapos[.]com2023/05/25 08:52:55NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
docdatares[.]com2023/05/26 13:42:10NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
datawebhub[.]com2023/05/26 16:28:34NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
cloudithub[.]com2023/05/26 16:28:35NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
secitweb[.]com2023/05/26 16:28:39NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
documentitsolution[.]com2023/05/29 13:21:44NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
keeperinformation[.]com2023/05/29 13:21:48NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
webprodata[.]com2023/05/29 14:28:00NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
clouditprofi[.]com2023/05/29 14:28:01NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
cryptoinfostorage[.]com2023/05/29 14:34:41NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
rootinformationgateway[.]com2023/05/29 14:34:41NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
gatewaydocumentdata[.]com2023/06/01 14:49:07NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
gatewayitservices[.]com2023/06/01 14:49:17NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
infoviewerdata[.]com2023/06/01 14:59:51NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
infoviewergate[.]com2023/06/01 14:59:51NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
webitresourse[.]com2023/06/02 19:35:46NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
homedocsdata[.]com2023/06/05 16:05:54NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
homedocsview[.]com2023/06/05 16:06:10NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
webdataproceed[.]com2023/06/08 17:29:54NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
directkeeperstorage[.]com2023/06/12 15:47:55NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
gatewaykeeperinformation[.]com2023/06/12 15:48:01NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
rootgatestorage[.]com2023/06/12 16:46:02NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
documentinformationsolution[.]com2023/06/12 16:46:04NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
getclouddoc[.]com2023/06/14 10:56:38NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
statusfiles[.]com2023/06/16 09:49:55NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
webstaticdata[.]com2023/06/16 09:49:55NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
cloudwebfile[.]com2023/06/16 09:49:59NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
statuswebcert[.]com2023/06/16 10:29:57NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
nextgenexp[.]com2023/06/16 10:29:57NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
informationkeeper[.]com2023/06/16 14:48:40NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
documentgatekeeper[.]com2023/06/16 14:48:44NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
cryptogatesolution[.]com2023/06/16 15:32:31NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
rootgatewaystorage[.]com2023/06/16 15:32:34NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
infoviewstorage[.]com2023/06/22 12:34:10NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
infoconnectstorage[.]com2023/06/22 12:34:18NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
infolookstorage[.]com2023/06/22 13:53:04NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
judicialliquidators[.]com2023/06/25 11:28:05NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
safetyagencyservice[.]com2023/06/25 11:28:08NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
dynamiclnk[.]com2023/06/27 13:20:10NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
temphoster[.]com2023/06/27 13:20:10NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
documententranceintelligence[.]com2023/06/27 17:13:49NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
documentgateprotector[.]com2023/06/27 17:13:51NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
readinfodata[.]com2023/06/28 16:09:46NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
readdatainform[.]com2023/06/28 16:09:50NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
webcryptoinfo[.]com2023/06/29 12:41:50NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
storageinfodata[.]com2023/06/29 12:41:50NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
keeperdatastorage[.]com2023/07/03 17:40:16NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
keepinformationroot[.]com2023/07/03 17:40:21NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
keyservicebar[.]com2023/07/05 13:25:41PDR Ltd.C=US, O=Let’s Encrypt, CN=R3 
bitespacedev[.]com2023/07/05 13:25:43PDR Ltd.C=US, O=Let’s Encrypt, CN=R3 
cryptodocumentinformation[.]com2023/07/05 15:04:46PDR Ltd.C=US, O=Let’s Encrypt, CN=R3 
directdocumentinfo[.]com2023/07/05 15:04:48PDR Ltd.C=US, O=Let’s Encrypt, CN=R3 
techpenopen[.]com2023/07/05 15:49:13NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
loginformationbreakthrough[.]com2023/07/06 16:01:36NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
alldocssolution[.]com2023/07/06 16:01:39NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
documentkeepersolutionsystems[.]com2023/07/06 18:45:01NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
docholdersolution[.]com2023/07/06 18:45:10NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
infodocitsolution[.]com2023/07/07 11:00:59NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
securebrowssolution[.]com2023/07/07 11:00:59NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
secbrowsingate[.]com2023/07/07 11:18:09NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
secbrowsingsystems[.]com2023/07/07 11:18:14NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
docguardmaterial[.]com2023/07/10 11:38:40NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
dockeeperweb[.]com2023/07/10 11:38:44NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
docsecgate[.]com2023/07/11 13:27:59NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
documentsecsolution[.]com2023/07/11 13:28:01NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
cryptogatehomes[.]com2023/07/11 17:51:38NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
topcryptoprotect[.]com2023/07/12 13:03:36NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
safedocumentgatesolution[.]com2023/07/12 13:17:15NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
safedocitsolution[.]com2023/07/12 13:17:23NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
docscontentview[.]com2023/07/12 15:05:10NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
docscontentgate[.]com2023/07/12 15:05:10NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
openprojectgate[.]com2023/07/12 15:30:44NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
infowardendoc[.]com2023/07/12 15:30:49NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
wardensecbreakthrough[.]com2023/07/12 15:41:10NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
lawsystemjudgement[.]com2023/07/12 15:41:10NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
explorewebdata[.]com2023/07/13 08:12:07NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
doorwayseclaw[.]com2023/07/13 13:22:18NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
entryloginpoint[.]com2023/07/13 13:22:22NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
wardenlawsec[.]com2023/07/13 14:12:32NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
entrygatebreak[.]com2023/07/13 14:12:32NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
digitalworkdata[.]com2023/07/13 15:00:44NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
digitalhubdata[.]com2023/07/13 15:00:45NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
craftfilelink[.]com2023/07/13 15:31:00NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
createtempdoc[.]com2023/07/13 15:31:00NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
provideexplorer[.]com2023/07/13 16:25:33NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
reviewopenfile[.]com2023/07/13 16:25:34NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
govsafebreakthrough[.]com2023/07/13 16:26:44NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
govlawentrance[.]com2023/07/13 16:26:55NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
storagekeepdirect[.]com2023/07/13 17:36:39NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
storageguarddirect[.]com2023/07/13 17:36:44NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
storagekeeperexpress[.]com2023/07/14 13:27:26NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
onestorageprotectordirect[.]com2023/07/14 13:27:27NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
lawwardensafety[.]com2023/07/14 13:41:52NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
entrancequick[.]com2023/07/14 13:41:53NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
seclawdoorway[.]com2023/07/14 15:28:39NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
wardengovermentlaw[.]com2023/07/14 15:28:43NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
getvaluepast[.]com2023/07/14 16:14:41NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
transferlinkdata[.]com2023/07/14 16:14:41NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
remcemson[.]com2023/07/26 11:25:48NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
osixmals[.]com2023/07/26 11:25:56NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
entranceto[.]com2023/07/28 12:26:15NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
govermentsecintro[.]com2023/07/28 12:26:17NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
itbugreportbeta[.]com2023/07/28 13:06:49NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
theitbugreportbeta[.]com2023/07/28 13:06:49NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
sockintrodoorway[.]com2023/07/28 13:21:41NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
maxintrosec[.]com2023/07/28 13:21:42NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
doorgovcommunity[.]com2023/07/28 15:11:40NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
tarentrycommunity[.]com2023/07/28 15:11:40NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
webfigmadesignershop[.]com2023/07/28 16:09:07NameCheap, IncC=US, O=Let’s Encrypt, CN=R3Yes
webfigmadesigner[.]com2023/07/28 16:09:11NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
logincontrolway[.]com2023/07/28 16:35:44NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
vertransmitcontrol[.]com2023/07/28 16:35:44NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
everyinit[.]com2023/08/09 13:56:51NameCheap, IncC=US, O=Let’s Encrypt, CN=R3Yes
aliceplants[.]com2023/08/09 17:22:26NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
countingtall[.]com2023/08/09 17:22:30NameCheap, IncC=US, O=Let’s Encrypt, CN=R3Yes
silenceprotocol[.]com2023/08/10 12:32:10NameCheap, IncC=US, O=Let’s Encrypt, CN=R3Yes
mintwithapples[.]com2023/08/10 12:32:15NameCheap, IncC=US, O=Let’s Encrypt, CN=R3Yes
winterholds[.]com2023/08/10 12:53:29NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
ziplinetransfer[.]com2023/08/10 16:47:53NameCheap, IncC=US, O=Let’s Encrypt, CN=R3Yes
translatesplit[.]com2023/08/10 16:47:53NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
getfigmacreator[.]com2023/08/11 13:13:20NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
postrequestin[.]com2023/08/11 13:13:23NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
tarifjane[.]com2023/08/17 14:05:41NameCheap, IncC=US, O=Let’s Encrypt, CN=R3Yes
configlayers[.]com2023/08/17 14:05:48NameCheap, IncC=US, O=Let’s Encrypt, CN=R3Yes
winterhascometo[.]com2023/08/17 16:21:43NameCheap, IncC=US, O=Let’s Encrypt, CN=R3Yes
inyourheadexp[.]com2023/08/17 16:21:43NameCheap, IncC=US, O=Let’s Encrypt, CN=R3Yes
glorybuses[.]com2023/08/18 15:27:40NameCheap, IncC=US, O=Let’s Encrypt, CN=R3Yes
janeairintroduction[.]com2023/08/18 15:27:40NameCheap, IncC=US, O=Let’s Encrypt, CN=R3Yes
vikingonairplane[.]com2023/08/18 16:19:48NameCheap, IncC=US, O=Let’s Encrypt, CN=R3Yes
marungame[.]com2023/08/18 16:19:49NameCheap, IncC=US, O=Let’s Encrypt, CN=R3Yes
victorinwounder[.]com2023/08/21 16:14:48NameCheap, IncC=US, O=Let’s Encrypt, CN=R3Yes
paneindestination[.]com2023/08/21 16:15:02NameCheap, IncC=US, O=Let’s Encrypt, CN=R3Yes
trastamarafamily[.]com2023/08/22 11:20:22NameCheap, IncC=US, O=Let’s Encrypt, CN=R3Yes
territoryedit[.]com2023/08/22 11:20:24NameCheap, IncC=US, O=Let’s Encrypt, CN=R3Yes
vectorto[.]com2023/08/24 09:40:49NameCheap, IncC=US, O=Let’s Encrypt, CN=R3Yes
johnysadventure[.]com2023/08/24 09:40:54NameCheap, IncC=US, O=Let’s Encrypt, CN=R3Yes
paternenabler[.]com2023/08/25 14:40:31NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
fastnamegenerator[.]com2023/08/25 14:40:35NameCheap, IncC=US, O=Let’s Encrypt, CN=R3Yes
literallyandme[.]com2023/08/28 13:21:33NameCheap, IncC=US, O=Let’s Encrypt, CN=R3Yes
andysalesproject[.]com2023/08/28 13:21:34NameCheap, IncC=US, O=Let’s Encrypt, CN=R3Yes
pandawithrainbow[.]com2023/08/28 17:08:58NameCheap, IncC=US, O=Let’s Encrypt, CN=R3Yes
natalyincity[.]com2023/08/29 15:25:02NameCheap, IncC=US, O=Let’s Encrypt, CN=R3Yes
machinerelise[.]com2023/09/01 16:29:09NameCheap, IncC=US, O=Let’s Encrypt, CN=R3Yes
industrialcorptruncate[.]com2023/09/01 16:30:07NameCheap, IncC=US, O=Let’s Encrypt, CN=R3Yes
constructionholdingnewlife[.]com2023/09/07 14:00:55NameCheap, IncC=US, O=Let’s Encrypt, CN=R3Yes
adventuresrebornpanda[.]com2023/09/07 14:00:55NameCheap, IncC=US, O=Let’s Encrypt, CN=R3Yes
cryingpand[.]com2023/09/13 13:10:40NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
industrialwatership[.]com2023/09/13 13:10:41NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
olohaisland[.]com2023/09/13 14:25:35NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
voodoomagician[.]com2023/09/13 14:25:36NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
newestchairs[.]com2023/09/14 11:24:47NameCheap, IncC=US, O=Let’s Encrypt, CN=R3Yes
cpuisocutter[.]com2023/09/14 12:37:53NameCheap, IncC=US, O=Let’s Encrypt, CN=R3Yes
incorpcpu[.]com2023/09/14 12:37:57NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
gulperfish[.]com2023/09/14 14:00:25NameCheap, IncC=US, O=Let’s Encrypt, CN=R3Yes
leviathanfish[.]com2023/09/14 14:00:25NameCheap, IncC=US, O=Let’s Encrypt, CN=R3Yes
truncationcorp[.]com2023/09/14 14:05:41NameCheap, IncC=US, O=Let’s Encrypt, CN=R3Yes
gzipinteraction[.]com2023/09/14 14:05:42NameCheap, IncC=US, O=Let’s Encrypt, CN=R3Yes
ghostshowing[.]com2023/09/14 16:10:42NameCheap, IncC=US, O=Let’s Encrypt, CN=R3Yes
hallowenwitch[.]com2023/09/14 16:10:43NameCheap, IncC=US, O=Let’s Encrypt, CN=R3Yes
certificatentrance[.]com2023/09/19 08:18:39NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
apiwebdata[.]com2023/10/02 14:59:14NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
apidatahook[.]com2023/10/04 15:45:19NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
apireflection[.]com2023/10/04 15:45:25NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
protectionoffice[.]tech2023/10/05 11:33:46Hostinger UABC=US, O=Let’s Encrypt, CN=R3 
lazyprotype[.]com2023/10/11 11:52:18NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
angelicfish[.]com2023/10/13 17:57:29NameCheap, IncC=US, O=Let’s Encrypt, CN=R3Yes
globalyfish[.]com2023/10/13 17:57:31NameCheap, IncC=US, O=Let’s Encrypt, CN=R3Yes
medicprognosis[.]com2023/10/16 14:36:32NameCheap, IncC=US, O=Let’s Encrypt, CN=R3Yes
medicoutpatient[.]com2023/10/16 14:36:41NameCheap, IncC=US, O=Let’s Encrypt, CN=R3Yes
krakfish[.]com2023/10/17 17:09:29NameCheap, IncC=US, O=Let’s Encrypt, CN=R3Yes
stingrayfish[.]com2023/10/17 17:09:31NameCheap, IncC=US, O=Let’s Encrypt, CN=R3Yes
incorpreview[.]com2023/10/17 18:27:09NameCheap, IncC=US, O=Let’s Encrypt, CN=R3Yes
truncatetrim[.]com2023/10/17 18:27:11NameCheap, IncC=US, O=Let’s Encrypt, CN=R3Yes
corporatesinvitation[.]com2023/10/18 14:48:54NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
triminget[.]com2023/10/18 17:31:40NameCheap, IncC=US, O=Let’s Encrypt, CN=R3Yes
firewitches[.]com2023/10/19 10:40:51NameCheap, IncC=US, O=Let’s Encrypt, CN=R3Yes
solartemplar[.]com2023/10/19 10:40:52NameCheap, IncC=US, O=Let’s Encrypt, CN=R3Yes
encryptionrenewal[.]com2023/10/20 13:36:24NameCheap, IncC=US, O=Let’s Encrypt, CN=R3Yes
sslkeycert[.]com2023/10/20 13:36:24NameCheap, IncC=US, O=Let’s Encrypt, CN=R3Yes
barbarictruths[.]com2023/10/23 07:37:30NameCheap, IncC=US, O=Let’s Encrypt, CN=R3Yes
castlefranks[.]com2023/10/23 07:37:33NameCheap, IncC=US, O=Let’s Encrypt, CN=R3Yes
comintroduction[.]com2023/10/24 14:01:11NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 
corpviewer[.]com2023/10/31 13:10:38NameCheap, IncC=US, O=Let’s Encrypt, CN=R3 

Star Blizzard HubSpot campaign domains:

  • djs53104[.]eu1[.]hubspotlinksfree[.]com – used in August 2023
  • djr6t104[.]eu1[.]hubspotlinksfree[.]com – used in August 2023
  • djrzf704[.]eu1[.]hubspotlinksfree[.]com – used in August 2023
  • djskzh04[.]eu1[.]hubspotlinksfree[.]com – used in August 2023
  • djslws04[.]eu1[.]hubspotlinksfree[.]com – used in August 2023
  • djs36c04[.]eu1[.]hubspotlinksfree[.]com – used in August 2023
  • djt47x04[.]eu1[.]hubspotlinksfree[.]com – used in September 2023
  • djvcl404[.]eu1[.]hubspotlinksfree[.]com – used in October 2023
  • d5b74r04[.]na1[.]hubspotlinksfree[.]com – used in October 2023
  • djvxqp04[.]eu1[.]hubspotlinksfree[.]com – used in October 2023

Star Blizzard MailerLite campaign domain:

  • ydjjja[.]clicks[.]mlsend[.]com – used in September 2023

References

Further reading

For the latest security research from the Microsoft Threat Intelligence community, check out the Microsoft Threat Intelligence Blog: https://aka.ms/threatintelblog.

To get notified about new publications and to join discussions on social media, follow us on X (formerly Twitter) at https://twitter.com/MsftSecIntel.

To hear stories and insights from the Microsoft Threat Intelligence community about the ever-evolving threat landscape, listen to the Microsoft Threat Intelligence podcast: https://thecyberwire.com/podcasts/microsoft-threat-intelligence.

The post Star Blizzard increases sophistication and evasion in ongoing attacks appeared first on Microsoft Security Blog.

]]>
Disrupting SEABORGIUM’s ongoing phishing operations http://approjects.co.za/?big=en-us/security/blog/2022/08/15/disrupting-seaborgiums-ongoing-phishing-operations/ Mon, 15 Aug 2022 16:00:00 +0000 http://approjects.co.za/?big=en-us/security/blog/?p=119759 The Microsoft Threat Intelligence Center (MSTIC) has observed and taken actions to disrupt campaigns launched by SEABORGIUM in campaigns involve persistent phishing and credential theft campaigns leading to intrusions and data theft.

The post Disrupting SEABORGIUM’s ongoing phishing operations appeared first on Microsoft Security Blog.

]]>
April 2023 update – Microsoft Threat Intelligence has shifted to a new threat actor naming taxonomy aligned around the theme of weather. SEABORGIUM is now tracked as Star Blizzard and ACTINIUM is now tracked as Aqua Blizzard.

To learn about how the new taxonomy represents the origin, unique traits, and impact of threat actors, and to get a complete mapping of threat actor names, read this blog: Microsoft shifts to a new threat actor naming taxonomy.


The Microsoft Threat Intelligence Center (MSTIC) has observed and taken actions to disrupt campaigns launched by SEABORGIUM, an actor Microsoft has tracked since 2017. SEABORGIUM is a threat actor that originates from Russia, with objectives and victimology that align closely with Russian state interests. Its campaigns involve persistent phishing and credential theft campaigns leading to intrusions and data theft. SEABORGIUM intrusions have also been linked to hack-and-leak campaigns, where stolen and leaked data is used to shape narratives in targeted countries. While we cannot rule out that supporting elements of the group may have current or prior affiliations with criminal or other nonstate ecosystems, MSTIC assesses that information collected during SEABORGIUM intrusions likely supports traditional espionage objectives and information operations as opposed to financial motivations.

This blog provides insights into SEABORGIUM’s activities and technical methods, with the goal of sharing context and raising awareness about a significant threat to Microsoft customers. MSTIC would like to acknowledge the Google Threat Analysis Group (TAG) and the Proofpoint Threat Research Team for their collaboration on tracking and disrupting this actor. Microsoft’s ability to detect and track SEABORGIUM’s abuse of Microsoft services, particularly OneDrive, has provided MSTIC sustained visibility into the actor’s activities and enabled us to notify impacted customers. As an outcome of these service abuse investigations, MSTIC partnered with abuse teams in Microsoft to disable accounts used by the actor for reconnaissance, phishing, and email collection. Microsoft Defender SmartScreen has also implemented detections against the phishing domains represented in SEABORGIUM’s activities.

Who is SEABORGIUM?

SEABORGIUM is a highly persistent threat actor, frequently targeting the same organizations over long periods of time. Once successful, it slowly infiltrates targeted organizations’ social networks through constant impersonation, rapport building, and phishing to deepen their intrusion. SEABORGIUM has successfully compromised organizations and people of interest in consistent campaigns for several years, rarely changing methodologies or tactics. Based on known indicators of compromise and actor tactics, SEABORGIUM overlaps with the threat groups tracked as Callisto Group (F-Secure), TA446 (Proofpoint) and COLDRIVER (Google). Security Service of Ukraine (SSU) has associated Callisto with Gamaredon Group (tracked by Microsoft as ACTINIUM); however, MSTIC has not observed technical intrusion links to support the association. 

Since the beginning of 2022, Microsoft has observed SEABORGIUM campaigns targeting over 30 organizations, in addition to personal accounts of people of interest. SEABORGIUM primarily targets NATO countries, particularly the US and the UK, with occasional targeting of other countries in the Baltics, the Nordics, and Eastern Europe. Such targeting has included the government sector of Ukraine in the months leading up to the invasion by Russia, and organizations involved in supporting roles for the war in Ukraine. Despite some targeting of these organizations, Microsoft assesses that Ukraine is likely not a primary focus for this actor; however, it is most likely a reactive focus area for the actor and one of many diverse targets.

Within the target countries, SEABORGIUM primarily focuses operations on defense and intelligence consulting companies, non-governmental organizations (NGOs) and intergovernmental organizations (IGOs), think tanks, and higher education. SEABORGIUM has a high interest in targeting individuals as well, with 30% of Microsoft’s nation-state notifications related to SEABORGIUM activity being delivered to Microsoft consumer email accounts. SEABORGIUM has been observed targeting former intelligence officials, experts in Russian affairs, and Russian citizens abroad. As with any observed nation-state actor activity, Microsoft directly notifies customers of Microsoft services that have been targeted or compromised, providing them with the information they need to secure their accounts.

Observed actor activity

Over many years of tracking, Microsoft has observed a consistent methodology from SEABORGIUM with only slight deviations in their social engineering approaches and in how they deliver the initial malicious URL to their targets. In this section, we provide detailed analysis of SEABORBIUM’s operational tactics as well as several examples of their campaigns.

Impersonation and establishing contact

Before starting a campaign, SEABORGIUM often conducts reconnaissance of target individuals, with a focus on identifying legitimate contacts in the targets’ distant social network or sphere of influence. Based on some of the impersonation and targeting observed, we suspect that the threat actor uses social media platforms, personal directories, and general open-source intelligence (OSINT) to supplement their reconnaissance efforts. MSTIC, in partnership with LinkedIn, has observed fraudulent profiles attributed to SEABORGIUM being used sporadically for conducting reconnaissance of employees from specific organizations of interest. In accordance with their policies, LinkedIn terminated any account (including the one shown below) identified as conducting inauthentic or fraudulent behavior.

A screenshot of a LinkedIn profile identified for fraudulent behavior. The fake profile uses the name Westley Dyck, who allegedly identifies as a research assistant.
Figure 1: Example profile used by SEABORGIUM to conduct industry-specific reconnaissance

SEABORGIUM also registers new email accounts at various consumer email providers, with the email address or alias configured to match legitimate aliases or names of impersonated individuals. While the creation of new consumer accounts is common, we have also observed SEABORGIUM returning to and reusing historical accounts that match the industry of the ultimate target. In one case, we observed SEABORGIUM returning to an account it had not used in a year, indicating potential tracking and reusing of accounts if relevant to targets’ verticals.

After registering new accounts, SEABORGIUM proceeds to establish contact with their target. In cases of personal or consumer targeting, MSTIC has mostly observed the actor starting the conversation with a benign email message, typically exchanging pleasantries before referencing a non-existent attachment while highlighting a topic of interest to the target. It’s likely that this additional step helps the actor establish rapport and avoid suspicion, resulting in further interaction. If the target replies, SEABORGIUM proceeds to send a weaponized email.

A screenshot of an email exchange between the SEABORGIUM actors and their target. The initial email from the actors mentions a file attachment, but there is no file attached to the message. Subsequent replies involve the target asking for the file, and then actors sending back a weaponized email.
Figure 2: Example email showing the multi-email approach and rapport building frequently used by the actors.

MSTIC has also documented several cases where the actor focuses on a more organizational approach to phishing. In these cases, the actor uses an authoritative approach in their social engineering and typically goes to directly sending malicious content.

A screenshot of a phishing email sent by SEABORGIUM to their target. The email impersonates the lead of an organization and informs the recipient of possible attackers against their organization. The email then tells the recipient to open an attached PDF file, disguised as analytical material for safety and informational awareness.
Figure 3: Example phishing email from 2022 where the actor impersonates the lead of an organization and emails select members of the organization with a cybersecurity themed lure.

These examples serve to demonstrate the actors’ capability to be dynamic and to adapt their social engineering approach to gain the trust of their victims.

Delivery of malicious content

Microsoft has identified several variations in the way that SEABORGIUM delivers a link that directs targets to their credential stealing infrastructure. 

URL in body of email

In the simplest case, SEABORGIUM directly adds a URL to the body of their phishing email. Occasionally, the actor leverages URL shorteners and open redirects to obfuscate their URL from the target and inline protection platforms. The email varies between fake personal correspondence with a hyperlinked text and fake file sharing emails that imitate a range of platforms.

A screenshot of a fake OneDrive email notification sent by SEABORGIUM to their target. The email informs the recipient of a file shared with them, followed by a link. The link leads to a phishing URL controlled by SEABORGIUM actors.
Figure 4: Example follow-up email impersonating a OneDrive share. The link embedded takes the user to actor-controlled infrastructure.

PDF file attachment that contains a URL

MSTIC has observed an increase in the use of attachments in SEABORGIUM campaigns. These attachments typically imitate a file or document hosting service, including OneDrive, and request the user to open the document by clicking a button.

A screenshot of an email sent by SEABORGIUM which used the Ukraine conflict as a social engineering lure. The email contains a PDF file, which the email sender mentions as a new paper about Ukraine they’d like the recipient to check.
Figure 5: Campaign from 2022 using the war in Ukraine as a ruse. Example of SEABORGIUM directly attaching a PDF file to the email.
A screenshot of the content of the PDF file mentioned in figure 5. The PDF file displays a PDF file icon, a message saying that the file can’t be previewed, and a rectangular box with the text “open in OneDrive”. The box with the text contains a hyperlink to a URL controlled by SEABORGIUM.
Figure 6: Example PDF file used in campaigns. The PDF files appear to be a failed preview, redirecting the users to click a link which takes the user to actor-controlled infrastructure.

OneDrive link to PDF file that contains a URL

SEABORGIUM also abuses OneDrive to host PDF files that contain a link to the malicious URL. This activity does not represent any security issues or vulnerabilities on the OneDrive platform. The actors include a OneDrive link in the body of the email that when clicked directs the user to a PDF file hosted within a SEABORGIUM-controlled OneDrive account. As seen in the previous example, the victim is presented with what appears to be a failed preview message, enticing the target to click the link to be directed to the credential-stealing infrastructure. Occasionally, SEABORGIUM makes use of open redirects within the PDF file to further disguise their operational infrastructure. In the example below, SEABORGIUM uses a Google URL for redirection.

A screenshot of a PDF file hosted on a OneDrive account controlled by SEABORGIUM, like the one mentioned on figure 6. A box with the text “try again” is displayed, which is hyperlinked to a Google redirect link, further leading to a phishing page.
Figure 7: Example document hosted on OneDrive that uses a Google redirect link to send users to actor-controlled infrastructure.

Credential theft

Regardless of the method of delivery, when the target clicks the URL, the target is directed to an actor-controlled server hosting a phishing framework, most often EvilGinx. On occasion, Microsoft has observed attempts by the actor to evade automated browsing and detonation by fingerprinting browsing behavior. Once the target is redirected to the final page, the framework prompts the target for authentication, mirroring the sign-in page for a legitimate provider and intercepting any credentials. After credentials are captured, the target is redirected to a website or document to complete the interaction.  

A screenshot of a phishing page used by SEABORGIUM. The phishing page impersonates a victim organization and asks the target to sign in with their account details.
Figure 8: Example cloned phishing portal used by SEABORGIUM to directly impersonate a victim organization.

Data exfiltration and impact

SEABORGIUM has been observed to use stolen credentials and directly sign in to victim email accounts. Based on our experience responding to intrusions from this actor on behalf of our customers, we have confirmed that the following activities are common:

  • Exfiltration of intelligence data: SEABORGIUM has been observed exfiltrating emails and attachments from the inbox of victims.
  • Setup of persistent data collection: In limited cases, SEABORGIUM has been observed setting up forwarding rules from victim inboxes to actor-controlled dead drop accounts where the actor has long-term access to collected data. On more than one occasion, we have observed that the actors were able to access mailing-list data for sensitive groups, such as those frequented by former intelligence officials, and maintain a collection of information from the mailing-list for follow-on targeting and exfiltration.
  • Access to people of interest: There have been several cases where SEABORGIUM has been observed using their impersonation accounts to facilitate dialog with specific people of interest and, as a result, were included in conversations, sometimes unwittingly, involving multiple parties. The nature of the conversations identified during investigations by Microsoft demonstrates potentially sensitive information being shared that could provide intelligence value.

Based on the specific victimology, documents stolen, conversations fostered, and sustained collection observed, we assess that espionage is likely a key motivation of the actor.

Sporadic involvement with information operations

In May 2021, MSTIC attributed an information operation to SEABORGIUM based on observations and technical overlaps with known phishing campaigns. The operation involved documents allegedly stolen from a political organization in the UK that were uploaded to a public PDF file-sharing site. The documents were later amplified on social media via known SEABORGIUM accounts, however MSTIC observed minimal engagement or further amplification. Microsoft was unable to validate the authenticity of the material.  

In late May 2022, Reuters along with Google TAG disclosed details about an information operation, specifically using hack and leak, that they attributed to COLDRIVER/SEABORGIUM. Microsoft independently linked SEABORGIUM to the campaign through technical indicators and agrees with the assessment by TAG on the actor responsible for the operation. In the said operation, the actors leaked emails/documents from 2018 to 2022, allegedly stolen from consumer Protonmail accounts belonging to high-level proponents of Brexit, to build a narrative that the participants were planning a coup. The narrative was amplified using social media and through specific politically themed media sources that garnered quite a bit of reach.

While we have only observed two cases of direct involvement, MSTIC is not able to rule out that SEABORGIUM’s intrusion operations have yielded data used through other information outlets. As with any information operation, Microsoft urges caution in distributing or amplifying direct narratives, and urges readers to be critical that the malicious actors could have intentionally inserted misinformation or disinformation to assist their narrative. With this in mind, Microsoft will not be releasing the specific domain or content to avoid amplification.  

The techniques used by the actor and described in the “Observed actor activity” section can be mitigated by adopting the security considerations provided below:

  • Check your Office 365 email filtering settings to ensure you block spoofed emails, spam, and emails with malware.
  • Configure Office 365 to disable email auto-forwarding.
  • Use the included indicators of compromise to investigate whether they exist in your environment and assess for potential intrusion.
  • Review all authentication activity for remote access infrastructure, with a particular focus on accounts configured with single factor authentication, to confirm authenticity and investigate any anomalous activity.
  • Require multifactor authentication (MFA) for all users coming from all locations including perceived trusted environments, and all internet-facing infrastructure–even those coming from on-premises systems.
  • Leverage more secure implementations such as FIDO Tokens, or Microsoft Authenticator with number matching. Avoid telephony-based MFA methods to avoid risks associated with SIM-jacking.

For Microsoft Defender for Office 365 Customers:

  • Use Microsoft Defender for Office 365 for enhanced phishing protection and coverage against new threats and polymorphic variants.
  • Enable Zero-hour auto purge (ZAP) in Office 365 to quarantine sent mail in response to newly acquired threat intelligence and retroactively neutralize malicious phishing, spam, or malware messages that have already been delivered to mailboxes.
  • Configure Defender for Office 365 to recheck links on click. Safe Links provides URL scanning and rewriting of inbound email messages in mail flow, and time-of-click verification of URLs and links in email messages, other Office applications such as Teams, and other locations such as SharePoint Online. Safe Links scanning occurs in addition to the regular anti-spam and anti-malware protection in inbound email messages in Exchange Online Protection (EOP). Safe Links scanning can help protect your organization from malicious links that are used in phishing and other attacks.
  • Use the Attack Simulator in Microsoft Defender for Office 365 to run realistic, yet safe, simulated phishing and password attack campaigns within your organization. Run spear-phishing (credential harvest) simulations to train end-users against clicking URLs in unsolicited messages and disclosing their credentials.

Indicators of compromise (IOCs)

The below list provides IOCs observed during our investigation. We encourage our customers to investigate these indicators in their environments and implement detections and protections to identify past related activity and prevent future attacks against their systems.

IndicatorTypeConfidencePublic References (if Applicable)
cache-dns[.]comDomain nameHighGoogle TAG, Sekoia.io
cache-dns-forwarding[.]comDomain nameHigh 
cache-dns-preview[.]comDomain nameHigh 
cache-docs[.]comDomain nameHighSekoia.io
cache-pdf[.]comDomain nameHigh 
cache-pdf[.]onlineDomain nameHigh 
cache-services[.]liveDomain nameHigh 
cloud-docs[.]comDomain nameHighSekoia.io
cloud-drive[.]liveDomain nameHigh 
cloud-storage[.]liveDomain nameHigh 
docs-cache[.]comDomain nameHighSekoia.io
docs-forwarding[.]onlineDomain nameHigh 
docs-info[.]comDomain nameHighSekoia.io
docs-shared[.]comDomain nameHighGoogle TAG, Sekoia.io
docs-shared[.]onlineDomain nameHigh 
docs-view[.]onlineDomain nameHigh 
document-forwarding[.]comDomain nameHigh 
document-online[.]liveDomain nameHigh 
document-preview[.]comDomain nameHigh 
documents-cloud[.]comDomain nameHighSekoia.io
documents-cloud[.]onlineDomain nameHighSekoia.io
documents-forwarding[.]comDomain nameHighGoogle TAG
document-share[.]liveDomain nameHigh 
documents-online[.]liveDomain nameHigh 
documents-pdf[.]onlineDomain nameHighSekoia.io
documents-preview[.]comDomain nameHighGoogle TAG
documents-view[.]liveDomain nameHigh 
document-view[.]liveDomain nameHigh 
drive-docs[.]comDomain nameHighSekoia.io
drive-share[.]liveDomain nameHighGoogle TAG, Sekoia.io
goo-link[.]onlineDomain nameHigh 
hypertextteches[.]comDomain nameHighSekoia.io
mail-docs[.]onlineDomain nameHigh 
officeonline365[.]liveDomain nameHigh 
online365-office[.]comDomain nameHigh 
online-document[.]liveDomain nameHigh 
online-storage[.]liveDomain nameHigh 
pdf-cache[.]comDomain nameHigh 
pdf-cache[.]onlineDomain nameHigh 
pdf-docs[.]onlineDomain nameHighSekoia.io
pdf-forwarding[.]onlineDomain nameHigh 
protection-checklinks[.]xyzDomain nameHigh 
protection-link[.]onlineDomain nameHigh 
protectionmail[.]onlineDomain nameHighSekoia.io
protection-office[.]liveDomain nameHighGoogle TAG, Sekoia.io
protect-link[.]onlineDomain nameHighGoogle TAG, Sekoia.io
proton-docs[.]comDomain nameHighSekoia.io
proton-reader[.]comDomain nameHigh 
proton-viewer[.]comDomain nameHighGoogle TAG, Sekoia.io
relogin-dashboard[.]onlineDomain nameHigh 
safe-connection[.]onlineDomain nameHigh 
safelinks-protect[.]liveDomain nameHigh 
secureoffice[.]liveDomain nameHigh 
webresources[.]liveDomain nameHighGoogle TAG
word-yand[.]liveDomain nameHigh 
yandx-online[.]cloudDomain nameHigh 
y-ml[.]coDomain nameHigh 
docs-drive[.]onlineDomain nameModerateSekoia.io
docs-info[.]onlineDomain nameModerate 
cloud-mail[.]onlineDomain nameModerate 
onlinecloud365[.]liveDomain nameModerate 
pdf-cloud[.]onlineDomain nameModerateSekoia.io
pdf-shared[.]onlineDomain nameModerateSekoia.io
proton-pdf[.]onlineDomain nameModerate 
proton-view[.]onlineDomain nameModerateSekoia.io
office365-online[.]liveDomain nameLow 
doc-viewer[.]comDomain nameLow 
file-milgov[.]systemsDomain nameLowSekoia.io
office-protection[.]onlineDomain nameLowSekoia.io

NOTE: These indicators should not be considered exhaustive for this observed activity.

Detections

Intelligence gathered by the Microsoft Threat Intelligence Center (MSTIC) is used within Microsoft security products to provide protection against associated actor activity.

Microsoft Defender for Office 365

Microsoft Defender for Office offers enhanced solutions for blocking and identifying malicious emails. Signals from Microsoft Defender for Office inform Microsoft 365 Defender, which correlate cross-domain threat intelligence to deliver coordinated defense, when this threat has been detected. These alerts, however, can be triggered by unrelated threat activity. Example alerts:

  • A potentially malicious URL click was detected
  • Email messages containing malicious URL removed after delivery
  • Email messages removed after delivery
  • Email reported by user as malware or phish

Microsoft 365 Defender

Aside from the Microsoft Defender for Office 365 alerts above, customers can also monitor for the following Microsoft 365 Defender alerts for this attack. Note that these alerts can also be triggered by unrelated threat activity. Example alerts:

  • Suspicious URL clicked
  • Suspicious URL opened in web browser
  • User accessed link in ZAP-quarantined email

Microsoft 365 Defender customers should also investigate any “Stolen session cookie was used” alerts that would betriggered for adversary-in-the-middle (AiTM) attacks.

Microsoft Defender SmartScreen

Microsoft Defender SmartScreen has implemented detections against the phishing domains represented in the IOC section above.

Advanced hunting queries

Microsoft Sentinel

Microsoft Sentinel customers can run the following advanced hunting queries to locate IOCs and related malicious activity in their environments.

The query below identifies matches based on domain IOCs related to SEABORGIUM actor across a range of common Microsoft Sentinel data sets:

https://github.com/Azure/Azure-Sentinel/blob/master/Detections/MultipleDataSources/SEABORGIUMDomainsAugust2022.yaml

Microsoft 365 Defender

Microsoft 365 Defender customers can run the following advanced hunting queries to locate IOCs and related malicious activity in their environments.

This query identifies matches based on domain IOCs related to SEABORGIUM against Microsoft Defender for Endpoint device network connections

https://github.com/Azure/Azure-Sentinel/blob/master/Hunting%20Queries/Microsoft%20365%20Defender/Campaigns/SEABORGIUMDomainIOCsAug2022.yaml

The post Disrupting SEABORGIUM’s ongoing phishing operations appeared first on Microsoft Security Blog.

]]>