Email: dancho.danchev@hush.com Bitcoin Donate: bc1qncspyks7uwdkyyxzxzp6zjgqlrwm3er3q88dju TOX ID: 53B409440A6DC34F1BA458869A0462D92C15B467AF6319D481CA353690C88667833A0EE82969
Saturday, August 06, 2022
Massive Supply Chain Malware Campaign Affects Thousands of Github Repositories Drops Malware - An OSINT Analysis
Exposing GCHQ's URL Shortening Service - An OSINT Analysis
I've recently decided to come up with a proper analysis on a well known GCHQ URL shortening service used for monitoring purposes where the ultimate goal would be to provide additional insights into its Internet-connected infrastructure and try to find additional links and connections between related campaigns courtesy of the GCHQ
Sample URL known to have been involved in the campaign:
hxxp://lurl.me
Related domains known to have been involved in the campaign include:
hxxp://mhhiuag.com
hxxp://lhgeesp.biz
hxxp://ciwcesp.com
hxxp://lhgeesp.net
hxxp://ciwcesp.biz
Sample related responding IPs known to have been involved in the campaign include:
hxxp://198.105.254.11
hxxp://37.220.34.116
hxxp://109.235.48.3
hxxp://64.74.223.47
hxxp://198.105.244.11
Sample screenshots include:
In Retrospective - A New Malware Bot Vector Spotted in the Wild - An OSINT Analysis
I'll continue monitoring the development of this malicious software release and I'll post updates as soon as new developments take place.











