TT Security Log

セキュリティ一般に関する「個人」の調査・研究・参照ログ (政府動向・仮想通貨など)

ファイア・アイの研究者にサイバー攻撃、情報暴露か

【概要】

  • #LeakTheAnalyst
  • 暴露者: 31337 hackers
  • 2016年からMandiantの内部に潜入していると主張
  • 暴露内容
    • 研究者の氏名やプロフィールなどの個人情報
    • サイバー攻撃事件の概要

【ニュース】

◆ファイア・アイの研究者にサイバー攻撃、情報暴露か (ZDNet, 2017/08/01)
https://japan.zdnet.com/article/35105092/

【公開情報】

◆Mandiant Leak: Op. #LeakTheAnalyst (Pastbin, 2017/07/31)
https://pastebin.com/6HugrWH4
https://archive.fo/8LfwY#selection-307.0-307.34

https://ufile.io/u7n5g
http://www.megafileupload.com/1qrbo/FireEye_Mandiant_AdiPeretz_Leak.7z
pass: leaktheanalyst@mandiant

  • =--=--=- Section #1: Mandiant and Adi Peretz Leaks Part #1 -=--=--=-

It was fun to be inside a giant company named “Mandiant” we enjoyed watching how they try to protect their clients and how their dumb analysts are trying to reverse engineer malwares and stuffs.
Now that “Mandiant” knows how deep we breached into its infrastructure its so-called threat analysts are trying to block us. Let's see how successful they are going to be :D

Mandiant Internal Leaks:
Target: Mandiant, FireEye, High Profile Personels
Initial Access: 2016
Final Access: 2017

Victim #1 Profile:

      • Name: Adi Peretz
      • Op. Nickname: Mr. Muscle AKA FatFuck
      • Position: Senior Threat Intelligence Analyst at Mandiant
      • Layer #1 Targets: Chrome, Firefox, Windows (What kind of a dumb security specialist uses windows anyway??? FUCKIN’ IDIOT...)


Potential Layer #2 Targets:

      • Outlook Contacts (HVT)
      • Prime Ministry Office of Israel
      • Mandiant
      • FireEye Internal
        • Hapoalim Bank
      • Linked-in Contacts
      • 3rd Party Contractors


Upcomming Event:

      • Jul/25 – Adi has HR Interview with Novartis (might be canceled :)))) )


Depth of the Breach:

      • Mandiant Internal networks and its clients data has been compromised (might be leaked separately)
      • Credentials (Mandiant-FireEye Docs, Mandiant-FireEye WebEx, Mandiant -FireEye JIRA, Staffs Emails, Amazon Account, Linkedin Account, And much more which we might leak after using them for our benefit! :D )
      • Full access over victim's Linkedin profile
      • Full access over victim's live account (including full control over his private windows machine, online GPS tracking of the victim for a year (2016-2017), OneDrive, official calendar events, contacts, billing address (both Ireland and Israel))
      • Paypal invoices


Leaks:

      • Geo Locations of the victim
      • Top Secret Document
      • Credentials
      • Favorite Password Patterns
      • Compelete Business and Personal emails dump
      • FireEye Licenses
      • Private Contracts
      • FireEye Worksheets
      • Network Topology Drawings (Probably FireEye’s Core Analysis Lab)
      • Linked-in contacts (potential layer #2 targets)


Final words:
This leak was just a glimpse of how deep we breached into Mandiant, we might publish more critical data in the future. So DO NOT FUCK WITH US!

Special Thanks To:

      • APT29
      • APT32
      • DragonOK
      • The Shadow Brokers
      • APT1
      • WebEx :D
      • Microsoft Windows :))))))))


link: https://ufile.io/u7n5g
Mirror: http://www.megafileupload.com/1qrbo/FireEye_Mandiant_AdiPeretz_Leak.7z
pass: leaktheanalyst@mandiant

Hack locally, Leak globally,
Expect Us.

  • =--=--=- Section #2: Op. #LeakTheAnalyst -=--=--=--=-

Operation #LeakTheAnalyst:

In Blackhats we trust,

Nobody understands the amount of dedication it takes to break into a highly secured network, to bypass every state of the art security measure installed to make a targeted network unbreakable, to code and hack not for the money but for the pleasure of being somewhere no one can be in, to be addicted to pain.

From time to time there is a know-it-all security professional tries to read your sick mind and blow your breach plan up to hell.

For a long time we - the 31337 hackers - tried to avoid these fancy ass "Analysts" whom trying to trace our attack footprints back to us and prove they are better than us. In the #LeakTheAnalyst operation we say fuck the consequence let’s track them on Facebook, Linked-in, Tweeter, etc. let’s go after everything they’ve got, let’s go after their countries, let’s trash their reputation in the field. If during your stealth operation you pwned an analyst, target him and leak his personal and professional data, as a side job of course ;).

In the operation #LeakTheAnalyst our motto is:
If they are going to send us back to hell, Let’s unleash hell upon them; Before it’s too late...

Join us @ Op. #LeakTheAnalyst.