Independent Contractor. Bitcoin: 15Zvie1j8CjSR52doVSZSjctCDSx3pDjKZ Email: dancho.danchev@hush.com OMEMO: ddanchev@conversations.im | OTR: danchodanchev@xmpp.jp | TOX ID: 2E6FCA35A18AA76B2CCE33B55404A796F077CADA56F38922A1988AA381AE617A15D3D3E3E6F1
Saturday, August 06, 2022
Massive Supply Chain Malware Campaign Affects Thousands of Github Repositories Drops Malware - An OSINT Analysis

Exposing GCHQ's URL Shortening Service - An OSINT Analysis
I've recently decided to come up with a proper analysis on a well known GCHQ URL shortening service used for monitoring purposes where the ultimate goal would be to provide additional insights into its Internet-connected infrastructure and try to find additional links and connections between related campaigns courtesy of the GCHQ
Sample URL known to have been involved in the campaign:
hxxp://lurl.me
Related domains known to have been involved in the campaign include:
hxxp://mhhiuag.com
hxxp://lhgeesp.biz
hxxp://ciwcesp.com
hxxp://lhgeesp.net
hxxp://ciwcesp.biz
Sample related responding IPs known to have been involved in the campaign include:
hxxp://198.105.254.11
hxxp://37.220.34.116
hxxp://109.235.48.3
hxxp://64.74.223.47
hxxp://198.105.244.11
Sample screenshots include:

In Retrospective - A New Malware Bot Vector Spotted in the Wild - An OSINT Analysis
I'll continue monitoring the development of this malicious software release and I'll post updates as soon as new developments take place.
