The Fidelis Threat Research team is comprised of expert security researchers whose sole focus is generating accurate and actionable intelligence to better secure customers. Together, they represent over... Read More
Following news reports that the Democratic Congressional Campaign Committee (DCCC) was breached via a spoofed donation website, the ThreatConnect Research team and Fidelis Cybersecurity teamed up to collaborate and take a look at the associated domain to ferret out additional details on the activity.
The initial indications from the DCCC breach suggest FANCY BEAR pawprints based on the following:
The following would strengthen our assessment of FANCY BEAR’s involvement:
Both of our companies respectively researched the domain secure.actblues[.]com, which spoofs the DCCC’s legitimate donation site secure.actblue[.]com. FANCY BEAR actors previously used the same technique with the domain misdepatrment[.]com, which spoofed the legitimate domain belonging to MIS Department, a Democratic National Committee IT contractor. The actblues[.]com domain, which is hosted on a Netherlands IP Address 191.101.31[.]112 (Host1Plus, a division of Digital Energy Technologies Ltd.), was registered using a privacy protection service through the I.T. Itch registrar.
This fisterboks@email[.]com email address has previously registered three other domains, intelsupportcenter[.]com (hosted on a dedicated server at 81.95.7[.]11), intelsupportcenter[.]net (not active), and fastcontech[.]com, all of which have been attributed to FANCY BEAR activity in an official German Intelligence (BfV) report Cyber Brief Nr. 01/2016. It should also be noted that fastcontech[.]com is hosted at the same ISP as one of the IP’s listed by Crowdstrike for FANCY BEAR (185.86.148[.]227).
Upon further review of the actblues[.]com domain using the ThreatConnect Farsight Passive DNS integration, we were able to identify the date and time when the domain first resolved.
The actblues[.]com domain was initially registered on June 14th and resolved to the 191.101.31[.]112 IP shortly thereafter. This indicates that the domain was operationalized in less than a day. Stepping out and looking at additional context related to the DNC activity, we identified that CrowdStrike’s initial report on the DNC hack was also published on June 14th. This suggests that, after being outed, FANCY BEAR actors shifted their operation immediately to another target that might allow them to continue collection against Democratic figures involved in the U.S. election.
The surrounding infrastructure around the secure[.]actblues[.]com host in the 22.214.171.124/24 network merited a closer look. In one example, we identified that the suspicious domain geopoliticsmonitor[.]com resolved to IP Address 191.101.31[.]116. According to DomainTools, the WHOIS information for geopoliticsmonitor[.]com lists boltini_sandy@post[.]com as the domain registrant and I.T. Itch as providing administrative and name services.
This domain appears to be a spoof of the legitimate domain geopoliticalmonitor.com. Geopolitical Monitor lists itself as a Canadian “international intelligence publication and consultancy”. This aligns with the suspicious domain stratforglobal[.]net, which uses the the Xtra Orbit name services (xtraorbit[.]com / xo.*.orderbox-dns.com) and registrant idolbreaker@mail[.]com detailed in our previous blog. Stratfor lists itself as a “geopolitical intelligence firm that provides strategic analysis and forecasting to individuals and organizations around the world.” Targeting of either of these organizations and or their customers might yield strategic insights or facilitate secondary operations.
In reviewing the peripheral networks associated with FANCY BEAR infrastructure, we saw correlation to the following hosts identified in PricewaterhouseCoopers’s Sofacy II– Same Sofacy, Different Day:
As well as other suspicious domains such as:
The fisterboks@email[.]com surfaced in our previous post on FANCY BEAR’s use of a bitcoin name server. At the time, we were interested in the two domains intelsupportcenter[.]com and intelsupportcenter[.]net because they looked like domain spoofs of the Intel Corporation, not necessarily because they were registered by fisterboks@email[.]com.
The name services in question – .bitcoin-dns[.]hosting – were also used by misdepatrment[.]com, a spoofed domain (of the legitimate misdepartment.com) that resolved to a FANCY BEAR command and control IP address used in the DNC breach. The same name servers have been used by other FANCY BEAR-linked domains as well as a long list of other suspicious domains that have not been attributed to any particular threat actor.
The domains actblues[.]com and fastcontech[.]com – the two fisterboks@email[.]com domains we identified from the SOA records – were registered through a different name server called I.T. Itch. fastcontech[.]com was also identified in the German Intelligence report on FANCY BEAR and is hosted on a dedicated server at the 185.61.149[.]198 IP address.
When we looked to see who else was using the I.T. Itch name server, we found httpconnectsys[.]com. This domain is notable as the SOA record indicates that it was initially registered by frank_merdeux@europe[.]com, the same email address that was used to register the misdepatrment[.]com domain. At the time of this writing, we have not identified any other name servers used by either registrant.
I.T. Itch (ititch[.]com) bills itself as an anonymous web hosting, bitcoin hosting, private domain registration company with a “100% non-compliance rate” aiming to help entities maintain an anonymous digital presence. The company allegedly accomplishes this by “actively ignoring and impeding digital data requests and take-down notices”. Websites on the company’s infrastructure purportedly leverage “web servers located in secret locations on three different continents,” further protecting customers’ private information and freedom of speech, essentially making the site owners anonymous.
Naturally, this promise of anonymity is attractive to cyber threat actors. However, it is this proclivity for anonymous infrastructure, coupled with available SOA records, that led the ThreatConnect Research team to identify additional APT-related infrastructure using I.T. Itch name servers, despite the use of Privacy Protect services to mask registrant data.
We took a look at all of the domains that were registered this year that currently use the same name server (ititch[.]com) as actblues[.]com. From there, we attempted to identify those domains that were hosted on dedicated servers and stood out the most with respect to their name, and potentially what domains or topics they spoofed. Malicious actors from a variety of APT groups will often host their malicious domains on dedicated IP addresses. While this is NOT indicative of malicious activity, it can help us prioritize domains for additional review.
It is important to note that name server co-location does not definitively associate suspicious domains with previous malicious activity. Furthermore, we cannot immediately confirm that the domains listed below are hosting malware or are otherwise attributable to malicious APT activity; however, they deserve additional scrutiny due to the patterns identified above, and the fact that they were registered using a service like I.T. Itch.
This is an initial review of the 1,000+ domains registered this year that use the name server. A more thorough review of the domains may help identify additional, suspicious domains. The table below captures those that stood out the most to us based on our initial review. The table details the domain, registrant email addresses, registration date, hosting IP, and the number of domains hosted at that IP.
|Domain||Registrant Email||Create Date||Hosting IP||Number of Domains at IP|
As we highlighted above, the suspicious domains are not immediately attributable to any malicious activity; however, their nature and use of these name servers suggest that they merit additional review. Some of the more suspicious domains from the above list are:
Ebiqiuty[.]com – This domain appears to spoof the legitimate domain ebiquity[.]com which belongs to Ebiquity — a company that specializes in marketing analytics for customers around the world. This domain is also notable because it was registered the same day as actblues[.]com. Malicious actors will occasionally register multiple domains at a time to reduce the number of registrar transactions they have to be involved with. This domain currently redirects to Ebiquity’s legitimate site; however, we have yet to confirm whether it is in fact owned by Ebiquity. No available registration or hosting information indicates that Ebiquity registered this domain.
Bbcupdatenews[.]com – This domain spoofs the BBC News website. Spoofing news and media domains like this one is a common tactic for FANCY BEAR.
Symantecupdates[.]com – This domain stands out as it clearly spoofs anti-virus company Symantec. Further review of this domain identifies that it was previously registered using the email address li2384826402@yahoo[.]com, which was used to register domains used in the Anthem and OPM attacks.
Social-microsoft[.]com – The other domains hosted at the same IP also spoof technology-related services, including proxysys-config[.]com, system-proxy[.]info, and telemetry-akadns[.]net.
Actblues[.]com’s intended target, SOA record, registrant, and name server information probably point toward an association with recent Russian FANCY BEAR activity. The registration of the actblues[.]com domain on the same date FANCY BEAR’s compromise of the DNC was publicly reported further suggests that the group may be attempting to maintain access to systems used by those in the U.S. Democratic Party. Finally, these efforts would certainly be consistent with Russia’s recent activity targeting the DNC and their historic use of spoofed domains. If Russia is, in fact, responsible for the spoofed actblues[.]com domain and leveraging it against the DCCC, the question that naturally follows is…when does Guccifer 2.0 show up to take credit?