Security

Honeypot behind sold-off IP subnet shows Cyberbunker biz hosted all kinds of filth, says SANS Institute

Botnet C2, denial-of-service, phishing – and that's after filtering


Web traffic to the servers of the notorious Dutch-German Cyberbunker hosting biz was filled with all kinds of badness, including apparent botnet command-and-control and denial-of-service traffic, says SANS Institute.

Cyberbunker, aka CB3ROB, was raided last September by 600 German police gunmen who forced entry to the outfit's Traben-Trarbach HQ.

Following the raid, infosec biz SANS was able to set up a honeypot on former Cyberbunker IPs to analyse traffic passing through them – and the results shed light on just what kind of dubious traffic was passing through the servers.

CB3ROB's HQ was located inside a Cold War-era underground military bunker around 60 miles west of Frankfurt. Police boasted at the time of seizing 200 servers as well as CB3ROB's dot-org domain, which for a while after the raid bore a US-style "domain seized" banner.

After the inevitable arrests, CB3ROB's personnel had to sell some of their assets to generate a legal defence fund. Sold-off assets included three IPv4 subnets: 185.103.72.0/22; 185.35.136.0/22; and 91.209.12.0/24. Those were sold to Legaco Networks, which agreed to let SANS' Internet Storm Centre erect a honeypot behind them for one week in April 2020.

600 armed German cops storm Cyberbunker hosting biz on illegal darknet market claims

READ MORE

Karim Lalji, SANS' community instructor in the Penetration Testing curriculum, recounted in a paper about his findings: "Close to 2,000 unique computer names and over 7,000 unique source IPs that follow a similar request pattern are present in the traffic sample collected." He added that if single computer names were isolated within this traffic, "the intervals between requests were exactly 1min and 30sec – indicating automation and potential C2 [command and control]."

Lalji also observed apparent phishing traffic passing through the honeypot, with impersonated services including the Royal Bank of Canada, Apple, Paypal, Chase Bank and others. He also found traffic that appeared be linking to extreme sex abuse "involving animals", as well as what appeared to have been a criminal-oriented ad network.

His detailed findings included 171,000 TCP retransmissions "with no payload data and different sequence numbers", which Lalji concluded "likely indicates an error in crafted communication or a portion of a reflected Denial of Service (DoS) attack."

The research "explicitly filtered out" likely port-scanning traffic as well as "web directory brute forcing, SQL injection discovery, DNS zone transfer attempts, VoIP scans (primarily with SIPVicious), Telnet, SSH, FTP, and web-form brute force login attempts". Lalji added: "Several of these events can be attributed to internet-wide scans that are not specific to the IP address space under examination." Email traffic was also excluded as prosecutors were potentially interested in it.

CB3ROB's leading lights were charged last year by prosecutors in Rheinland-Pfalz with hosting: a darknet market called Cannabis Road; a drugs, stolen data and malware souk called Wall Street Market; an "underground economy forum" imaginatively named Fraudsters; a Swedish drugs marketplace called Flugsvamp; various clearnet drug-peddling websites; various "fraudulent bitcoin lotteries, darknet marketplaces for narcotics, weapons, counterfeit money, murder orders" and child abuse images; and C2 servers for the Mirai botnet.

Sven Olaf Kamphuis of CB3ROB said in a Facebook post shortly after the bunker raid last year: "ISPs do not need to know who the customer is, ISPs do not need to know what the customer does (and even if they do know, it doesn't make them liable – as long as there is no ACTIVE cooperation in the activity)." ®

Send us news
7 Comments

Prolific phishing-made-easy emporium LabHost knocked offline in cyber-cop op

Police emit Spotify Wrapped-style videos to let crims know they're being hunted

Feline firewall woke developer to declaw DDoS disaster

System alerts were pinging but cat had no way of knowing what was happening

Fraudsters abused Apple Stores' third-party pickup policy to phish for profits

Scam prevalent across Korea and Japan actually had some winners

X fixes URL blunder that could enable convincing social media phishing campaigns

Poorly implemented rule allowed miscreants to deceive users with trusted URLs

Nearly 3M people hit in Harvard Pilgrim healthcare data theft

Also, TheMoon botnet back for EoL SOHO routers, Sellafield to be prosecuted for 'infosec failures', plus critical vulns

China encouraged armed offensive against Myanmar government to protest proliferation of online scams

Report claims Beijing is most displeased by junta's failure to address slave labor scam settlements

Some 300,000 IPs vulnerable to this Loop DoS attack

Easy to exploit, not yet exploited, not widely patched – pick three

As if working at Helldesk weren't bad enough, IT helpers now targeted by cybercrims

Wave of Okta attacks mark what researchers are calling the biggest security trend of the year

French government sites disrupted by <i>très grande</i> DDoS

Russia and Sudan top the list of suspects

That home router botnet the Feds took down? Moscow's probably going to try again

Non-techies told to master firmware upgrades and firewall rules. For the infosec hardheads: have some IOCs

Iranian charged over attacks against US defense contractors, government agencies

$10M bounty for anyone with info leading to Alireza Shafie Nasab's identification or location

Crooks hook hundreds of exec accounts after phishing in Azure C-suite pond

Plenty of successful attacks observed with dangerous follow-on activity