In this analysis I'll provide actionable intelligence on the whereabouts of the individuals behind these campaigns and offer an in-depth technical discussion on their online whereabouts.
Based on a variety of publicly accessible sources including the use of WhoisXML API's WHOIS database I've managed to find the following domains which are known to have been involved in the campaign including one personally identifiable email address which could lead to possible cyber campaign attribution campaigns.
Sample domains known to have been involved in the HKLeaks information warfare propaganda campaign:
hxxp://hkleaks.ru
hxxp://hkleaks.pk
hxxp://hkleaks.tj
hxxp://hkleaks.ml - Email: spiker@elude.in
hxxp://hkleaks.af
hxxp://hkleaks.cc
hxxp://hkleaks.pw
hxxp://hkleaks.kz
hxxp://hkleaks.kg
hkleaks@yandex.com
hongkongmob@163.com
Hongkongmob@protonmail.com
hongkongmob@yandex.com
No comments:
Post a Comment