Skip to main content

OSINT - New campaign targeting security researchers

Medium
Published: Tue Jan 26 2021 (01/26/2021, 00:00:00 UTC)
Source: CIRCL
Vendor/Project: type
Product: osint

Description

OSINT - New campaign targeting security researchers

AI-Powered Analysis

AILast updated: 07/02/2025, 07:10:05 UTC

Technical Analysis

This threat describes a new campaign targeting security researchers through OSINT (Open Source Intelligence) techniques. The campaign involves creating fake social media profiles, pages, and groups to build credible social network personas. These personas are then used to conduct social engineering attacks aimed at deceiving security researchers. The attackers leverage misinformation patterns to manipulate targets into divulging sensitive information or performing actions that compromise their security posture. The campaign is characterized by external analysis and network activity that facilitates payload delivery, although no specific payload details or exploits in the wild have been reported. The campaign's technical details indicate a moderate threat level and analysis rating, with no direct vulnerabilities or software exploits involved. The campaign relies heavily on psychological manipulation and trust exploitation rather than technical vulnerabilities, making it a sophisticated social engineering threat vector.

Potential Impact

For European organizations, especially those involved in cybersecurity research and defense, this campaign poses a significant risk to confidentiality and operational security. Security researchers targeted by these fake personas may inadvertently disclose sensitive research data, internal methodologies, or credentials, which could be leveraged by threat actors for further attacks or espionage. The campaign could also lead to reputational damage if compromised researchers unknowingly propagate misinformation or become vectors for malware delivery. Given the reliance on social engineering, the threat can bypass traditional technical defenses, making it particularly dangerous for organizations that do not have strong awareness and training programs. Additionally, the campaign could disrupt collaborative research efforts and trust within the European infosec community, potentially hindering collective defense initiatives.

Mitigation Recommendations

European organizations should implement targeted countermeasures beyond generic advice. First, enhance security awareness training specifically focused on recognizing sophisticated social engineering tactics, including the identification of fake social media personas and misinformation campaigns. Encourage verification of new contacts through multiple channels before sharing sensitive information. Employ OSINT tools and threat intelligence platforms to monitor for suspicious social media activity related to the organization or its researchers. Implement strict policies on information sharing and social media use among security teams. Use multi-factor authentication and robust access controls to limit the impact of any potential credential compromise. Regularly review and update incident response plans to include scenarios involving social engineering and misinformation. Collaboration with trusted cybersecurity communities and sharing indicators of compromise can also help in early detection and mitigation of such campaigns.

Need more detailed analysis?Get Pro

Technical Details

Threat Level
2
Analysis
2
Uuid
e82f98b7-0734-44f9-99c4-1ac38805dbad
Original Timestamp
1611668896

Indicators of Compromise

Link

ValueDescriptionCopy
linkhttps://blog.google/threat-analysis-group/new-campaign-targeting-security-researchers/
linkhttps://www.virustotal.com/gui/file/68e6b9d71c727545095ea6376940027b61734af5c710b2985a628131e47c6af7/detection/f-68e6b9d71c727545095ea6376940027b61734af5c710b2985a628131e47c6af7-1611658982
linkhttps://www.virustotal.com/gui/file/4c3499f3cc4a4fdc7e67417e055891c78540282dccc57e37a01167dfe351b244/detection/f-4c3499f3cc4a4fdc7e67417e055891c78540282dccc57e37a01167dfe351b244-1611658909
linkhttps://www.virustotal.com/gui/file/a4fb20b15efd72f983f0fb3325c0352d8a266a69bb5f6ca2eba0556c3e00bd15/detection/f-a4fb20b15efd72f983f0fb3325c0352d8a266a69bb5f6ca2eba0556c3e00bd15-1611659060
linkhttps://www.virustotal.com/gui/file/25d8ae4678c37251e7ffbaeddc252ae2530ef23f66e4c856d98ef60f399fa3dc/detection/f-25d8ae4678c37251e7ffbaeddc252ae2530ef23f66e4c856d98ef60f399fa3dc-1611659011
linkhttps://www.virustotal.com/gui/file/a75886b016d84c3eaacaf01a3c61e04953a7a3adf38acf77a4a2e3a8f544f855/detection/f-a75886b016d84c3eaacaf01a3c61e04953a7a3adf38acf77a4a2e3a8f544f855-1611659026

Domain

ValueDescriptionCopy
domainangeldonationblog.com
C2 Domains: Attacker-Owned
domaincodevexillium.org
C2 Domains: Attacker-Owned
domaininvestbooking.de
C2 Domains: Attacker-Owned
domainkrakenfolio.com
C2 Domains: Attacker-Owned
domainopsonew3org.sg
C2 Domains: Attacker-Owned
domaintransferwiser.io
C2 Domains: Attacker-Owned
domaintransplugin.io
C2 Domains: Attacker-Owned
domaintrophylab.com
C2 Domains: Legitimate but Compromised
domainwww.colasprint.com
C2 Domains: Legitimate but Compromised
domainwww.dronerc.it
C2 Domains: Legitimate but Compromised
domainwww.edujikim.com
C2 Domains: Legitimate but Compromised
domainwww.fabioluciani.com
C2 Domains: Legitimate but Compromised

Url

ValueDescriptionCopy
urlhttps://angeldonationblog.com/image/upload/upload.php
C2 URLs
urlhttps://codevexillium.org/image/download/download.asp
C2 URLs
urlhttps://investbooking.de/upload/upload.asp
C2 URLs
urlhttps://transplugin.io/upload/upload.asp
C2 URLs
urlhttps://www.dronerc.it/forum/uploads/index.php
C2 URLs
urlhttps://www.dronerc.it/shop_testbr/Core/upload.php
C2 URLs
urlhttps://www.dronerc.it/shop_testbr/upload/upload.php
C2 URLs
urlhttps://www.edujikim.com/intro/blue/insert.asp
C2 URLs
urlhttps://www.fabioluciani.com/es/include/include.asp
C2 URLs
urlhttp://trophylab.com/notice/images/renewal/upload.asp
C2 URLs
urlhttp://www.colasprint.com/_vti_log/upload.asp
C2 URLs
urlhttps://www.linkedin.com/in/billy-brown-a6678b1b8/
LinkedIn Accounts
urlhttps://www.linkedin.com/in/guo-zhang-b152721bb/
LinkedIn Accounts
urlhttps://www.linkedin.com/in/hyungwoo-lee-6985501b9/
LinkedIn Accounts
urlhttps://www.linkedin.com/in/linshuang-li-aa696391bb/
LinkedIn Accounts
urlhttps://www.linkedin.com/in/rimmer-trajan-2806b21bb/
LinkedIn Accounts

File

ValueDescriptionCopy
file%WINDIR%\System32\Nwsapagent.sys
file%WINDIR%\System32\helpsvc.sys
file%ALLUSERSPROFILE%\USOShared\uso.bin
file%ALLUSERSPROFILE%\VMware\vmnat-update.bin
file%ALLUSERSPROFILE%\VirtualBox\update.bin

Hash

ValueDescriptionCopy
hash4c3499f3cc4a4fdc7e67417e055891c78540282dccc57e37a01167dfe351b244
hash68e6b9d71c727545095ea6376940027b61734af5c710b2985a628131e47c6af7
hash25d8ae4678c37251e7ffbaeddc252ae2530ef23f66e4c856d98ef60f399fa3dc
hasha75886b016d84c3eaacaf01a3c61e04953a7a3adf38acf77a4a2e3a8f544f855
hasha4fb20b15efd72f983f0fb3325c0352d8a266a69bb5f6ca2eba0556c3e00bd15
hashb52e05683b15c6ad56cebea4a5a54990
hashbaf97d3b9095911fb7c9c8d7152fdc32ca7b33aa
hash68e6b9d71c727545095ea6376940027b61734af5c710b2985a628131e47c6af7
hash56018500f73e3f6cf179d3b853c27912
hasha3060a3efb9ac3da444ef8abc99143293076fe32
hash4c3499f3cc4a4fdc7e67417e055891c78540282dccc57e37a01167dfe351b244
hashae17ce1eb59dd82f38efb9666f279044
hash3b3acb4a55ba8e2da36223ae59ed420f856b0aaf
hasha4fb20b15efd72f983f0fb3325c0352d8a266a69bb5f6ca2eba0556c3e00bd15
hash9e9f69ed56482fff18933c5ec8612063
hash4ff6c02140ab1daf217b6e01ec042460389e2e92
hash25d8ae4678c37251e7ffbaeddc252ae2530ef23f66e4c856d98ef60f399fa3dc
hashf5475608c0126582081e29927424f338
hash8e88fd82378794a17a4211fbf2ee2506b9636b02
hasha75886b016d84c3eaacaf01a3c61e04953a7a3adf38acf77a4a2e3a8f544f855

Text

ValueDescriptionCopy
textOver the past several months, the Threat Analysis Group has identified an ongoing campaign targeting security researchers working on vulnerability research and development at different companies and organizations. The actors behind this campaign, which we attribute to a government-backed entity based in North Korea, have employed a number of means to target researchers which we will outline below. We hope this post will remind those in the security research community that they are targets to government-backed attackers and should remain vigilant when engaging with individuals they have not previously interacted with. In order to build credibility and connect with security researchers, the actors established a research blog and multiple Twitter profiles to interact with potential targets. They've used these Twitter profiles for posting links to their blog, posting videos of their claimed exploits and for amplifying and retweeting posts from other accounts that they control.
textzhangguo
textjames50d
text24/66
text20/69
text18/66
text13/70
text15/70

Datetime

ValueDescriptionCopy
datetime2021-01-26T11:03:02+00:00
datetime2021-01-26T11:01:49+00:00
datetime2021-01-26T11:04:20+00:00
datetime2021-01-26T11:03:31+00:00
datetime2021-01-26T11:03:46+00:00

Threat ID: 682acdbebbaf20d303f0f230

Added to database: 5/19/2025, 6:20:46 AM

Last enriched: 7/2/2025, 7:10:05 AM

Last updated: 7/31/2025, 12:13:13 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats