Independent Contractor. Bitcoin: 15Zvie1j8CjSR52doVSZSjctCDSx3pDjKZ Email: dancho.danchev@hush.com OMEMO: ddanchev@conversations.im | OTR: danchodanchev@xmpp.jp | TOX ID: 53B409440A6DC34F1BA458869A0462D92C15B467AF6319D481CA353690C88667833A0EE82969
Saturday, August 06, 2022
Massive Supply Chain Malware Campaign Affects Thousands of Github Repositories Drops Malware - An OSINT Analysis

Exposing GCHQ's URL Shortening Service - An OSINT Analysis
I've recently decided to come up with a proper analysis on a well known GCHQ URL shortening service used for monitoring purposes where the ultimate goal would be to provide additional insights into its Internet-connected infrastructure and try to find additional links and connections between related campaigns courtesy of the GCHQ
Sample URL known to have been involved in the campaign:
hxxp://lurl.me
Related domains known to have been involved in the campaign include:
hxxp://mhhiuag.com
hxxp://lhgeesp.biz
hxxp://ciwcesp.com
hxxp://lhgeesp.net
hxxp://ciwcesp.biz
Sample related responding IPs known to have been involved in the campaign include:
hxxp://198.105.254.11
hxxp://37.220.34.116
hxxp://109.235.48.3
hxxp://64.74.223.47
hxxp://198.105.244.11
Sample screenshots include:

In Retrospective - A New Malware Bot Vector Spotted in the Wild - An OSINT Analysis
I'll continue monitoring the development of this malicious software release and I'll post updates as soon as new developments take place.
