<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://enlacehacktivista.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Mango</id>
	<title>Enlace Hacktivista - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://enlacehacktivista.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Mango"/>
	<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php/Special:Contributions/Mango"/>
	<updated>2026-04-22T17:43:10Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.43.8</generator>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=User:Mango&amp;diff=475</id>
		<title>User:Mango</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=User:Mango&amp;diff=475"/>
		<updated>2022-05-17T13:24:52Z</updated>

		<summary type="html">&lt;p&gt;Mango: Created page with &amp;quot;Senior Cyber Intelligence Analyst at CyberCX&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Senior Cyber Intelligence Analyst at CyberCX&lt;/div&gt;</summary>
		<author><name>Mango</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Nauru_Police_Force&amp;diff=454</id>
		<title>Nauru Police Force</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Nauru_Police_Force&amp;diff=454"/>
		<updated>2022-05-06T19:42:02Z</updated>

		<summary type="html">&lt;p&gt;Mango: /* Media Coverage */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Hack of 285,635 emails from the Nauru Police Force, documenting conditions of the island and abuses endured by asylum-seekers and refugees at the immigration detention centre operated by the Australian government.&lt;br /&gt;
&lt;br /&gt;
* [https://enlacehacktivista.org/nauru.txt Statement from the hackers]&lt;br /&gt;
* [https://enlacehacktivista.org/nauru.torrent Torrent]&lt;br /&gt;
* [https://nauru.enlacehacktivista.org/ Direct Download]&lt;br /&gt;
&lt;br /&gt;
== Media Coverage ==&lt;br /&gt;
&lt;br /&gt;
* https://www.crikey.com.au/2022/05/03/nauru-police-email-hack-australia-immigration-detention-offshore-processing/&lt;br /&gt;
* https://12ft.io/proxy?q=http://www.afr.com/policy/foreign-affairs/hacktivists-steal-300k-police-emails-to-protest-offshore-detention-20220503-p5ai1q&lt;br /&gt;
* https://www.crikey.com.au/2022/05/05/nauru-police-force-emails-refugees-asylum-seeker-self-harm-suicide/&lt;br /&gt;
* https://www.crikey.com.au/2022/05/06/nauru-police-email-leak-facebook-cybercrime/&lt;br /&gt;
* https://www.cyberscoop.com/australian-police-ask-website-pull-leak-data-nauru/&lt;br /&gt;
&lt;br /&gt;
== Police Response ==&lt;br /&gt;
&lt;br /&gt;
=== Nauru Police: ===&lt;br /&gt;
&amp;lt;blockquote&amp;gt;&lt;br /&gt;
Dear Secretary,&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We are in contact with our network system provider from Australia Mr. Ashnil through our counterpart AFP, for an inquiry involving AFP Cyber crime unit to check whether our system has been hacked. We are waiting for confirmation from Mr. Ashnil to determined if its hacked or not from his platform, We are pretty confidence that our system integrity is secure.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The other second party who deals with our system here is Nauru ICT, we will also work with ICT to see if the hacker are able to access through that platform.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Once confirmation is received from Mr. Ashnil we will provide further update.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Crikey is online publication platform that can throw any story in the public arena, and we strongly believed that the intention is against the Australian government, to course damage for the upcoming general election with the offshore processing center here in Nauru.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kind regards&lt;br /&gt;
&lt;br /&gt;
ComPol&lt;br /&gt;
&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
=== Australian Police: ===&lt;br /&gt;
&amp;lt;blockquote&amp;gt;&lt;br /&gt;
My name is Jim Astley and I am a cybercrime investigator from the Australian Federal Police (AFP). We are currently investigating allegations that a hacktivist syndicate gained unauthorised access to Nauruan Police email servers, and posted the details on a website hosted by Flokinet.&lt;br /&gt;
&lt;br /&gt;
More specifically, the website is hosted at:&lt;br /&gt;
&lt;br /&gt;
enlacehacktivista[.]org – IP address 185.165.170.180&lt;br /&gt;
&lt;br /&gt;
We’d be grateful if you could take the website down on the basis that material published on this website originated from unlawful activity (specifically unauthorised access to ICT platforms). I am aware that Icelandic laws protect anonymity, and we are not asking for any information to further this investigation. We also understand the need for whistle-blower protections and free media, which are supported under Icelandic (and Australian) law. However we believe that this website is enabling criminal activity, and therefore believe it is appropriate to take the website down. We’d be grateful if you took action to take down the website: enlacehacktivista[.]org hosted at IP address 185.165.170.180.&lt;br /&gt;
&lt;br /&gt;
If you have any questions, please don’t hesitate to contact me.&lt;br /&gt;
&lt;br /&gt;
Thanks,&lt;br /&gt;
&lt;br /&gt;
Jim&lt;br /&gt;
&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
[[Category:Hacks]]&lt;/div&gt;</summary>
		<author><name>Mango</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Nauru_Police_Force&amp;diff=453</id>
		<title>Nauru Police Force</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Nauru_Police_Force&amp;diff=453"/>
		<updated>2022-05-05T08:17:22Z</updated>

		<summary type="html">&lt;p&gt;Mango: /* Media Coverage */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Hack of 285,635 emails from the Nauru Police Force, documenting conditions of the island and abuses endured by asylum-seekers and refugees at the immigration detention centre operated by the Australian government.&lt;br /&gt;
&lt;br /&gt;
* [https://enlacehacktivista.org/nauru.txt Statement from the hackers]&lt;br /&gt;
* [https://enlacehacktivista.org/nauru.torrent Torrent]&lt;br /&gt;
* [https://nauru.enlacehacktivista.org/ Direct Download]&lt;br /&gt;
&lt;br /&gt;
== Media Coverage ==&lt;br /&gt;
&lt;br /&gt;
* https://www.crikey.com.au/2022/05/03/nauru-police-email-hack-australia-immigration-detention-offshore-processing/&lt;br /&gt;
* https://12ft.io/proxy?q=http://www.afr.com/policy/foreign-affairs/hacktivists-steal-300k-police-emails-to-protest-offshore-detention-20220503-p5ai1q&lt;br /&gt;
* https://www.crikey.com.au/2022/05/05/nauru-police-force-emails-refugees-asylum-seeker-self-harm-suicide/&lt;br /&gt;
&lt;br /&gt;
== Police Response ==&lt;br /&gt;
&lt;br /&gt;
=== Nauru Police: ===&lt;br /&gt;
&amp;lt;blockquote&amp;gt;&lt;br /&gt;
Dear Secretary,&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We are in contact with our network system provider from Australia Mr. Ashnil through our counterpart AFP, for an inquiry involving AFP Cyber crime unit to check whether our system has been hacked. We are waiting for confirmation from Mr. Ashnil to determined if its hacked or not from his platform, We are pretty confidence that our system integrity is secure.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The other second party who deals with our system here is Nauru ICT, we will also work with ICT to see if the hacker are able to access through that platform.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Once confirmation is received from Mr. Ashnil we will provide further update.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Crikey is online publication platform that can throw any story in the public arena, and we strongly believed that the intention is against the Australian government, to course damage for the upcoming general election with the offshore processing center here in Nauru.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kind regards&lt;br /&gt;
&lt;br /&gt;
ComPol&lt;br /&gt;
&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
=== Australian Police: ===&lt;br /&gt;
&amp;lt;blockquote&amp;gt;&lt;br /&gt;
My name is Jim Astley and I am a cybercrime investigator from the Australian Federal Police (AFP). We are currently investigating allegations that a hacktivist syndicate gained unauthorised access to Nauruan Police email servers, and posted the details on a website hosted by Flokinet.&lt;br /&gt;
&lt;br /&gt;
More specifically, the website is hosted at:&lt;br /&gt;
&lt;br /&gt;
enlacehacktivista[.]org – IP address 185.165.170.180&lt;br /&gt;
&lt;br /&gt;
We’d be grateful if you could take the website down on the basis that material published on this website originated from unlawful activity (specifically unauthorised access to ICT platforms). I am aware that Icelandic laws protect anonymity, and we are not asking for any information to further this investigation. We also understand the need for whistle-blower protections and free media, which are supported under Icelandic (and Australian) law. However we believe that this website is enabling criminal activity, and therefore believe it is appropriate to take the website down. We’d be grateful if you took action to take down the website: enlacehacktivista[.]org hosted at IP address 185.165.170.180.&lt;br /&gt;
&lt;br /&gt;
If you have any questions, please don’t hesitate to contact me.&lt;br /&gt;
&lt;br /&gt;
Thanks,&lt;br /&gt;
&lt;br /&gt;
Jim&lt;br /&gt;
&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
[[Category:Hacks]]&lt;/div&gt;</summary>
		<author><name>Mango</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Nauru_Police_Force&amp;diff=450</id>
		<title>Nauru Police Force</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Nauru_Police_Force&amp;diff=450"/>
		<updated>2022-05-03T08:42:22Z</updated>

		<summary type="html">&lt;p&gt;Mango: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Hack of 285,635 emails from the Nauru Police Force, documenting conditions of the island and abuses endured by asylum-seekers and refugees at the immigration detention centre operated by the Australian government.&lt;br /&gt;
&lt;br /&gt;
* [https://enlacehacktivista.org/nauru.txt Statement from the hackers]&lt;br /&gt;
* [https://enlacehacktivista.org/nauru.torrent Torrent]&lt;br /&gt;
* [https://nauru.enlacehacktivista.org/ Direct Download]&lt;br /&gt;
&lt;br /&gt;
== Media Coverage ==&lt;br /&gt;
&lt;br /&gt;
* https://www.crikey.com.au/2022/05/03/nauru-police-email-hack-australia-immigration-detention-offshore-processing/&lt;br /&gt;
* https://12ft.io/proxy?q=http://www.afr.com/policy/foreign-affairs/hacktivists-steal-300k-police-emails-to-protest-offshore-detention-20220503-p5ai1q&lt;br /&gt;
&lt;br /&gt;
[[Category:Hacks]]&lt;/div&gt;</summary>
		<author><name>Mango</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Hacker_History&amp;diff=449</id>
		<title>Hacker History</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Hacker_History&amp;diff=449"/>
		<updated>2022-05-03T08:41:50Z</updated>

		<summary type="html">&lt;p&gt;Mango: /* 2022 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==2008==&lt;br /&gt;
* [[Sarah Palin emails]]&lt;br /&gt;
&lt;br /&gt;
== 2010 ==&lt;br /&gt;
* [[SRS Electronic Declaration System]]&lt;br /&gt;
* [[Operation Payback]]&lt;br /&gt;
&lt;br /&gt;
== 2011 ==&lt;br /&gt;
* [[Chinga la Migra]]&lt;br /&gt;
* [[CorruptBrazil]]&lt;br /&gt;
* [[Fuck FBI Friday]]&lt;br /&gt;
* [[HBGary]]&lt;br /&gt;
* [[LeakyMails]]&lt;br /&gt;
* [[Shooting Sheriffs Saturday]]&lt;br /&gt;
* [[Sownage]]&lt;br /&gt;
* [[Stratfor]]&lt;br /&gt;
&lt;br /&gt;
== 2012 ==&lt;br /&gt;
* [[Apple UDIDs]]&lt;br /&gt;
* [[CSLEA]]&lt;br /&gt;
* [[Norton AntiVirus]]&lt;br /&gt;
* [[Syria emails]]&lt;br /&gt;
* [[Bureau Of Justice]]&lt;br /&gt;
&lt;br /&gt;
== 2013 ==&lt;br /&gt;
* [[Project AIG]]&lt;br /&gt;
&lt;br /&gt;
== 2014 ==&lt;br /&gt;
* [[LulzSecPeru]]&lt;br /&gt;
* [[Gamma Group]]&lt;br /&gt;
* [[Russian Interior Ministry]]&lt;br /&gt;
&lt;br /&gt;
== 2015 ==&lt;br /&gt;
* [[wikipedia:Football Leaks]]&lt;br /&gt;
* [[Hacking Team]]&lt;br /&gt;
&lt;br /&gt;
== 2016 ==&lt;br /&gt;
* [[Berat Albayrak Emails]]&lt;br /&gt;
* [[Panama Papers]]&lt;br /&gt;
* [[Surkov Leaks]]&lt;br /&gt;
&lt;br /&gt;
== 2017 ==&lt;br /&gt;
* [[Bob Otto emails]]&lt;br /&gt;
* [[Cellebrite]]&lt;br /&gt;
* [[Flexispy]]&lt;br /&gt;
* [[Freedom Hosting II]]&lt;br /&gt;
&lt;br /&gt;
== 2018 ==&lt;br /&gt;
* [[Salvini emails]]&lt;br /&gt;
* [[Doxxing-Adventskalender]]&lt;br /&gt;
&lt;br /&gt;
== 2019 ==&lt;br /&gt;
* [[GorraLeaks]]&lt;br /&gt;
* [[Paco Leaks]]&lt;br /&gt;
* [[Milico Leaks]]&lt;br /&gt;
* [[Capital One]]&lt;br /&gt;
* [[Perceptics]]&lt;br /&gt;
* [[Cayman National Bank and Trust (Isle of Man)]]&lt;br /&gt;
* [[Iron March]]&lt;br /&gt;
* [[Varela Leaks]]&lt;br /&gt;
&lt;br /&gt;
== 2020 ==&lt;br /&gt;
* [[Luanda Leaks]]&lt;br /&gt;
* [[BlueLeaks]]&lt;br /&gt;
* [[Intel exconfidential Lake]]&lt;br /&gt;
&lt;br /&gt;
== 2021 ==&lt;br /&gt;
* [[Gab]]&lt;br /&gt;
* [[Myanmar Investments]]&lt;br /&gt;
* [[American Patriots Three Percent‎]]&lt;br /&gt;
* [[Verkada]]&lt;br /&gt;
* [[Sons of Confederate Veterans]]&lt;br /&gt;
* [[MagaCoin]]&lt;br /&gt;
* [[Electronic Arts]]&lt;br /&gt;
* [[Tea Party Patriots]]&lt;br /&gt;
* [[Cyber Partisans]]&lt;br /&gt;
* [[HART]]&lt;br /&gt;
* [[Policía Nacional Civil de El Salvador]]&lt;br /&gt;
* [[Epik]]&lt;br /&gt;
* [[Oath Keepers]]&lt;br /&gt;
* [[America&#039;s Frontline Doctors]]&lt;br /&gt;
* [[Twitch]]&lt;br /&gt;
* [[Attila Hildmann‎]]&lt;br /&gt;
* [[Metropolitan Police Department D.C.]]&lt;br /&gt;
* [[Academy of Public Administration (Belarus)]]&lt;br /&gt;
* [[AnibalLeaks]]&lt;br /&gt;
&lt;br /&gt;
== 2022 ==&lt;br /&gt;
* [[Patriot Front]]&lt;br /&gt;
* [[Belarusian Railway]]&lt;br /&gt;
* [[Pronico]]&lt;br /&gt;
* [[Roskomnadzor]]&lt;br /&gt;
* [[OpRussia]]&lt;br /&gt;
* [[Nauru Police Force]]&lt;/div&gt;</summary>
		<author><name>Mango</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Nauru_Police_Force&amp;diff=448</id>
		<title>Nauru Police Force</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Nauru_Police_Force&amp;diff=448"/>
		<updated>2022-05-03T08:41:23Z</updated>

		<summary type="html">&lt;p&gt;Mango: Created page with &amp;quot;Hack of 285,635 emails from the Nauru Police Force, documenting conditions of the island and abuses endured by asylum-seekers and refugees at the immigration detention centre operated by the Australian government.  * [https://enlacehacktivista.org/nauru.txt Statement from the hackers] * [https://enlacehacktivista.org/nauru.torrent Torrent] * [https://nauru.enlacehacktivista.org/ Direct Download]  == Media Coverage ==  * https://www.crikey.com.au/2022/05/03/nauru-police-e...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Hack of 285,635 emails from the Nauru Police Force, documenting conditions of the island and abuses endured by asylum-seekers and refugees at the immigration detention centre operated by the Australian government.&lt;br /&gt;
&lt;br /&gt;
* [https://enlacehacktivista.org/nauru.txt Statement from the hackers]&lt;br /&gt;
* [https://enlacehacktivista.org/nauru.torrent Torrent]&lt;br /&gt;
* [https://nauru.enlacehacktivista.org/ Direct Download]&lt;br /&gt;
&lt;br /&gt;
== Media Coverage ==&lt;br /&gt;
&lt;br /&gt;
* https://www.crikey.com.au/2022/05/03/nauru-police-email-hack-australia-immigration-detention-offshore-processing/&lt;br /&gt;
* https://12ft.io/proxy?q=http://www.afr.com/policy/foreign-affairs/hacktivists-steal-300k-police-emails-to-protest-offshore-detention-20220503-p5ai1q&lt;/div&gt;</summary>
		<author><name>Mango</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=OpRussia&amp;diff=441</id>
		<title>OpRussia</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=OpRussia&amp;diff=441"/>
		<updated>2022-04-27T20:58:03Z</updated>

		<summary type="html">&lt;p&gt;Mango: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;A lot of Russian based companies have been having their servers blown wide open and emails flying out all over the place for the world to read. Leaks nearing ten MILLION files and continuing. The hacks have followed the Russia&#039;s invasion in Ukraine and the targets have included banks, government institutions, investment firms, power generation infrastructure, oil and mining companies, a weapons manufacturer in Belarus, as well as the Russian Orthodox Church.  &lt;br /&gt;
&lt;br /&gt;
== Explanation of the Hack ==&lt;br /&gt;
&lt;br /&gt;
For Russia we realised that a lot of companies and organisations haven&#039;t yet fully patched their exchange servers and many are still vulnerable to proxyshell! We then went out and tried to find as many high profile targets who were vulnerable as possible and then leak their emails to ddosecrets [1].&lt;br /&gt;
&lt;br /&gt;
For a lot (not all) of the Russian email leaks the recon process was:&lt;br /&gt;
&lt;br /&gt;
* 1. Shodan dorks: country:&amp;quot;RU&amp;quot;, http.title:&amp;quot;outlook&amp;quot;, http.title:&amp;quot;OWA&amp;quot;, http.title:&amp;quot;Autodiscovery&amp;quot;, http.title:&amp;quot;Microsoft Exchange&amp;quot; and then download the results (You may also search for the CVE).&lt;br /&gt;
* 2. Parse out the IP&#039;s from the list: grep -E -o &amp;quot;(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)&amp;quot; file1 &amp;gt; file2&lt;br /&gt;
* 3. Then parse out vulnerable to non-vulnerable, exploitable to non-exploitable: nmap --script http-vuln-exchange-proxyshell.nse -iL file2 -oA file3 -p 443 [2]&lt;br /&gt;
&lt;br /&gt;
From here we then used [3] to exploit the vulnerable servers and proceed with downloading as many if not all the emails as possible. The leaks will continue to be published until Russia has completely&lt;br /&gt;
pulled out of Ukraine!&lt;br /&gt;
&lt;br /&gt;
* [1] https://ddosecrets.com/wiki/Category:Russia &lt;br /&gt;
* [2] https://github.com/GossiTheDog/scanning/blob/main/http-vuln-exchange-proxyshell.nse&lt;br /&gt;
* [3] https://github.com/horizon3ai/proxyshell&lt;br /&gt;
&lt;br /&gt;
== Media Coverage ==&lt;br /&gt;
&lt;br /&gt;
* https://theintercept.com/2022/04/22/russia-hackers-leaked-data-ukraine-war/&lt;br /&gt;
* https://meduza.io/en/feature/2022/04/13/the-hunt-for-antimilitarism&lt;br /&gt;
* https://www.pravda.com.ua/eng/news/2022/04/24/7341811/&lt;br /&gt;
* https://www.theverge.com/2022/4/22/23036079/russian-emails-leaked-ddosecrets&lt;br /&gt;
* https://www.ibtimes.com/anonymous-affiliate-nb65-hacks-russian-state-network-leaks-900000-emails-3461648&lt;br /&gt;
* https://securityaffairs.co/wordpress/129576/hacktivism/anonymous-huge-data-dump.html&lt;br /&gt;
* https://www.ibtimes.com/anonymous-starts-huge-data-dump-will-blow-russia-away-leaks-rostproekt-emails-3452789&lt;br /&gt;
* https://www.dailymail.co.uk/news/article-10692617/Anonymous-leaks-nearly-MILLION-Russian-state-media-emails.html&lt;br /&gt;
&lt;br /&gt;
== Partners ==&lt;br /&gt;
* https://twitter.com/xxNB65&lt;br /&gt;
* https://twitter.com/DepaixPorteur&lt;br /&gt;
* https://twitter.com/B00daMooda&lt;br /&gt;
* https://twitter.com/wh1t3sh4d0w0x90&lt;br /&gt;
&lt;br /&gt;
[[Category:Hacks]]&lt;br /&gt;
[[Category:Cyberwar]]&lt;/div&gt;</summary>
		<author><name>Mango</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=OpRussia&amp;diff=440</id>
		<title>OpRussia</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=OpRussia&amp;diff=440"/>
		<updated>2022-04-27T20:55:46Z</updated>

		<summary type="html">&lt;p&gt;Mango: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;A lot of Russian based companies have been having their servers blown wide open and emails flying out all over the place for the world to read. Leaks nearing ten MILLION files and continuing. The hacks have followed the Russia&#039;s invasion in Ukraine and the targets have included banks, government institutions, investment firms, power generation infrastructure, oil and mining companies, a weapons manufacturer in Belarus, as well as the Russian Orthodox Church.  &lt;br /&gt;
&lt;br /&gt;
== Explanation of the Hack ==&lt;br /&gt;
&lt;br /&gt;
For Russia we realised that a lot of companies and organisations haven&#039;t yet fully patched their exchange servers and many are still vulnerable to proxyshell! We then went out and tried to find as many high profile targets who were vulnerable as possible and then leak their emails to ddosecrets [1].&lt;br /&gt;
&lt;br /&gt;
For a lot (not all) of the Russian email leaks the recon process was:&lt;br /&gt;
&lt;br /&gt;
* 1. Shodan dorks: country:&amp;quot;RU&amp;quot;, http.title:&amp;quot;outlook&amp;quot;, http.title:&amp;quot;OWA&amp;quot;, http.title:&amp;quot;Autodiscovery&amp;quot;, http.title:&amp;quot;Microsoft Exchange&amp;quot; and then download the results (You may also search for the CVE).&lt;br /&gt;
* 2. Parse out the IP&#039;s from the list: grep -E -o &amp;quot;(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)&amp;quot; file1 &amp;gt; file2&lt;br /&gt;
* 3. Then parse out vulnerable to non-vulnerable, exploitable to non-exploitable: nmap --script http-vuln-exchange-proxyshell.nse -iL file2 -oA file3 -p 443 [2]&lt;br /&gt;
&lt;br /&gt;
From here we then used [3] to exploit the vulnerable servers and proceed with downloading as many if not all the emails as possible. The leaks will continue to be published until Russia has completely&lt;br /&gt;
pulled out of Ukraine!&lt;br /&gt;
&lt;br /&gt;
* [1] https://ddosecrets.com/wiki/Category:Russia &lt;br /&gt;
* [2] https://github.com/GossiTheDog/scanning/blob/main/http-vuln-exchange-proxyshell.nse&lt;br /&gt;
* [3] https://github.com/horizon3ai/proxyshell&lt;br /&gt;
&lt;br /&gt;
== Media Coverage ==&lt;br /&gt;
&lt;br /&gt;
* https://theintercept.com/2022/04/22/russia-hackers-leaked-data-ukraine-war/?utm_medium=social&amp;amp;utm_campaign=theintercept&amp;amp;utm_source=twitter&lt;br /&gt;
* https://www.theverge.com/2022/4/22/23036079/russian-emails-leaked-ddosecrets&lt;br /&gt;
* https://www.ibtimes.com/anonymous-affiliate-nb65-hacks-russian-state-network-leaks-900000-emails-3461648&lt;br /&gt;
* https://securityaffairs.co/wordpress/129576/hacktivism/anonymous-huge-data-dump.html&lt;br /&gt;
* https://www.ibtimes.com/anonymous-starts-huge-data-dump-will-blow-russia-away-leaks-rostproekt-emails-3452789&lt;br /&gt;
* https://www.dailymail.co.uk/news/article-10692617/Anonymous-leaks-nearly-MILLION-Russian-state-media-emails.html&lt;br /&gt;
&lt;br /&gt;
== Partners ==&lt;br /&gt;
&lt;br /&gt;
* https://twitter.com/DepaixPorteur&lt;br /&gt;
* https://twitter.com/B00daMooda&lt;br /&gt;
* https://twitter.com/wh1t3sh4d0w0x90&lt;br /&gt;
&lt;br /&gt;
[[Category:Hacks]]&lt;br /&gt;
[[Category:Cyberwar]]&lt;/div&gt;</summary>
		<author><name>Mango</name></author>
	</entry>
</feed>