OpRussia: Difference between revisions

From Enlace Hacktivista
Jump to navigation Jump to search
No edit summary
No edit summary
Line 20: Line 20:
== Media Coverage ==
== Media Coverage ==


* https://theintercept.com/2022/04/22/russia-hackers-leaked-data-ukraine-war/?utm_medium=social&utm_campaign=theintercept&utm_source=twitter
* https://theintercept.com/2022/04/22/russia-hackers-leaked-data-ukraine-war/
* https://meduza.io/en/feature/2022/04/13/the-hunt-for-antimilitarism
* https://www.pravda.com.ua/eng/news/2022/04/24/7341811/
* https://www.theverge.com/2022/4/22/23036079/russian-emails-leaked-ddosecrets
* https://www.theverge.com/2022/4/22/23036079/russian-emails-leaked-ddosecrets
* https://www.ibtimes.com/anonymous-affiliate-nb65-hacks-russian-state-network-leaks-900000-emails-3461648
* https://www.ibtimes.com/anonymous-affiliate-nb65-hacks-russian-state-network-leaks-900000-emails-3461648
Line 28: Line 30:


== Partners ==
== Partners ==
 
* https://twitter.com/xxNB65
* https://twitter.com/DepaixPorteur
* https://twitter.com/DepaixPorteur
* https://twitter.com/B00daMooda
* https://twitter.com/B00daMooda

Revision as of 20:58, 27 April 2022

A lot of Russian based companies have been having their servers blown wide open and emails flying out all over the place for the world to read. Leaks nearing ten MILLION files and continuing. The hacks have followed the Russia's invasion in Ukraine and the targets have included banks, government institutions, investment firms, power generation infrastructure, oil and mining companies, a weapons manufacturer in Belarus, as well as the Russian Orthodox Church.

Explanation of the Hack

For Russia we realised that a lot of companies and organisations haven't yet fully patched their exchange servers and many are still vulnerable to proxyshell! We then went out and tried to find as many high profile targets who were vulnerable as possible and then leak their emails to ddosecrets [1].

For a lot (not all) of the Russian email leaks the recon process was:

  • 1. Shodan dorks: country:"RU", http.title:"outlook", http.title:"OWA", http.title:"Autodiscovery", http.title:"Microsoft Exchange" and then download the results (You may also search for the CVE).
  • 2. Parse out the IP's from the list: grep -E -o "(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)" file1 > file2
  • 3. Then parse out vulnerable to non-vulnerable, exploitable to non-exploitable: nmap --script http-vuln-exchange-proxyshell.nse -iL file2 -oA file3 -p 443 [2]

From here we then used [3] to exploit the vulnerable servers and proceed with downloading as many if not all the emails as possible. The leaks will continue to be published until Russia has completely pulled out of Ukraine!

Media Coverage

Partners