Academy of Public Administration (Belarus): Difference between revisions

From Enlace Hacktivista
Jump to navigation Jump to search
(Created page with "Two hacks wiping and encrypting the internal network of the Academy of Public Administration in Belarus, by Cyber Partisans. * Video of the second hack: https://www.youtube.com/watch?v=8l4etG0YKKQ == Explanation of the Hack == According to an incident report leaked by the hackers themselves during the second hack, they gained initial access using the CVE-2019-0708 BlueKeep exploit in an unpatched Windows 2008 server that had its RDP port exposed to the internet. T...")
 
No edit summary
 
(One intermediate revision by the same user not shown)
Line 5: Line 5:
== Explanation of the Hack ==
== Explanation of the Hack ==


According to an incident report leaked by the hackers themselves during the second hack, they gained initial access using the CVE-2019-0708 BlueKeep exploit in an unpatched Windows 2008 server that had its RDP port exposed to the internet. They proceeded to dump local user credentials using [https://github.com/swisskyrepo/PayloadsAllTheThings/blob/87be30d3b286677d878f98b7f49b81844fb7f474/Methodology%20and%20Resources/Windows%20-%20Mimikatz.md#mimikatz---mini-dump mimikatz], tunneled out using [https://github.com/jpillora/chisel chisel] and [https://github.com/3proxy/3proxy 3proxy] to use RDP and [https://github.com/swisskyrepo/PayloadsAllTheThings/blob/1a3058f40c145a7c97fc71444cf3f1f38e3b4614/Methodology%20and%20Resources/Windows%20-%20Using%20credentials.md#psexecpy--smbexecpy--wmiexecpy psexec.py] for lateral movement on the internal network until landing on and taking over the domain controller. They then deleted data from both live and backup systems.
According to an incident report leaked by the hackers themselves during the second hack, they gained initial access using the CVE-2019-0708 BlueKeep exploit on an unpatched Windows 2008 server that had RDP exposed to the internet. They proceeded to dump local user credentials using [https://github.com/swisskyrepo/PayloadsAllTheThings/blob/87be30d3b286677d878f98b7f49b81844fb7f474/Methodology%20and%20Resources/Windows%20-%20Mimikatz.md mimikatz], tunneled out using [https://github.com/jpillora/chisel chisel] and [https://github.com/3proxy/3proxy 3proxy] to use RDP and [https://github.com/swisskyrepo/PayloadsAllTheThings/blob/1a3058f40c145a7c97fc71444cf3f1f38e3b4614/Methodology%20and%20Resources/Windows%20-%20Using%20credentials.md#psexecpy--smbexecpy--wmiexecpy psexec.py] for lateral movement on the internal network until landing on and taking over the domain controller. They then deleted data from both live and backup systems.


https://www.curatedintel.org/2022/01/hacktivist-group-shares-details-related.html
https://www.curatedintel.org/2022/01/hacktivist-group-shares-details-related.html


[[Category:Hacks]]
[[Category:Hacks]]

Latest revision as of 01:53, 26 January 2022

Two hacks wiping and encrypting the internal network of the Academy of Public Administration in Belarus, by Cyber Partisans.

Explanation of the Hack

According to an incident report leaked by the hackers themselves during the second hack, they gained initial access using the CVE-2019-0708 BlueKeep exploit on an unpatched Windows 2008 server that had RDP exposed to the internet. They proceeded to dump local user credentials using mimikatz, tunneled out using chisel and 3proxy to use RDP and psexec.py for lateral movement on the internal network until landing on and taking over the domain controller. They then deleted data from both live and backup systems.

https://www.curatedintel.org/2022/01/hacktivist-group-shares-details-related.html