**tr1adx.net/intel/TIB-00002.html** tr1adx Intelligence Bulletin (TIB) 00002: The "Digital Plagiarist" Campaign: TelePorting the Carbanak Crew to a New Dimension [January 1, 2017] Summary Over the past few months, the tr1adx team has been tracking a Threat Actor which we codenamed "TelePort Crew". We believe the "TelePort Crew" Threat Actor is operating out of Russia or Eastern Europe with the group's major motivations appearing to be financial in nature through cybercrime and/or corporate espionage. [We have dubbed the group's latest campaign "Digital Plagiarist" for its signature practice of mirroring legitimate sites (using Tenmax's TelePort Pro and](http://www.tenmax.com/pro.html) [TelePort Ultra site mirroring software) onto similarly named domains, on which the TelePort Crew would host and serve up malware laden Office](http://www.tenmax.com/teleport/ultra/home.htm) documents. The Threat Actor would then craft specific spear phishing emails to direct their targets to visit the malicious web sites and open the malware laden documents. Corerrelation of the TelePort Crew's TTPs and infrastructure leads us to believe the group is closely affiliated with, and may in fact be, the Carbanak Threat Actor. At this time, we are able to disclose that we have seen activity associated with the "Digital Plagiarist" campaign in the following countries: Australia United Kingdom United States Ireland Switzerland Bahamas Focused Industries for the "Digital Plagiarist" campaign include: Hospitality Restaurant Chains Food Production Nutritional Supplements Agriculture / BioTechnology Marketing / Public Relations Manufacturing Logistics Software Development (including Point-of-Sale solutions) Utilities & Electric Government Analysis Activity attributed to the "Digital Plagiarist" campaign first came on tr1adx's radar in the fall of 2016, when the TelePort Crew threat actor was seen registering a number of domain names which raised flags due to the suspicious nature of the domain names, attributes associated with the domain registration, and content served on these domains. Further research indicates that the "Digital Plagiarist" campaign has been active since at least July 2016, and possibly earlier, with very rapid turn around times between the provisioning of attack/C2 infrastructure and execution of the actual attacks. Based on our observations, we believe the TelePort Crew threat actor has performed considerable research on their targets, including mapping out business/customer relationships between the targets as well as understanding other geographic and target "trust" specific attributes often seen in cases of [watering hole attacks.](https://en.wikipedia.org/wiki/Watering_hole_attack) Overview of Attack Methodology and TTP's Domain Registration The TelePort Crew would start off by registering domain names, which closely resemble those of legitimate web sites. These web sites would be designed to either mimic the group's intended target, or a third party trusted by the intended target. The majority of these domain registrations appear to use a single registrar, "PDR Ltd. d/b/a PublicDomainRegistry.com", and in some cases the Threat Actor would recycle the same Registrant Information. We also noted a number of specific differentiators when it comes to comparing the Registrant Information and the types of malicious websites that were used. The following table summarizes some of the more interesting domains we have seen the TelePort Crew threat actor register as part of the "Digital Plagiarist" campaign. While some of these domains are used for malware delivery, others are used for email domain spoofing, and C2 communications. A full list of (disclosable) domains suspected to be associated with the TelePort Crew's "Digital Plagiarist" campaign is provided in the Indicators of Compromise section: Domain Creation Registrant Registrar Org Mimicked Org Domain Mimicked Industry Date Country microfocus-official[.]com 2016- Andrey PDR Ltd. Micro Focus United microfocus.com Software |Domain|Creation Date|Registrant|Registrar|Org Mimicked|Org Country|Domain Mimicked|Industry| |---|---|---|---|---|---|---|---| ----- |ornuafood[.]com|2016- 10-28|Andrey Arseniev|PDR Ltd. d/b/a|Ornua Food|Ireland|ornua.com|Food Production| |---|---|---|---|---|---|---|---| |esb-energy-int[.]com|2016- 10-27|Dresde Nore|PDR Ltd. d/b/a|Electricity Supply Board|Ireland|esb.ie|Utilities & Electric| |fda-gov[.]com|2016- 12-09|Smolin Sergei|PDR Ltd. d/b/a|US Food and Drug Administration (FDA)|United States|fda.gov|Government| |treasury- government[.]com|2016- 12-09|Smolin Sergei|PDR Ltd. d/b/a|US Department of the Treasury|United States|treasury.gov|Government| |bentley-systems-ltd[.]com|2016- 10-27|Dresde Nore|PDR Ltd. d/b/a|Bentley Systems|United States|bentley.com|Software Development| |zynga-ltd[.]com|2016- 10-27|Dresde Nore|PDR Ltd. d/b/a|Zynga|United States|zynga.com|Software Development| |syngenta-usa[.]com (*)|2016- 10-27|Dresde Nore|PDR Ltd. d/b/a|Syngenta|Switzerland|syngenta-us.com|Agriculture/BioTech| |ai0ha[.]com|2016- 11-29|Garry Torp|PDR Ltd. d/b/a|Aloha, Inc.|United States|aloha.com|Nutritional Supplements| |iris-woridwide[.]com|2016- 11-29|Garry Torp|PDR Ltd. d/b/a|iris Worldwide|United Kingdom|iris-worldwide.com|Marketing/Public Relations| |---|---|---|---|---|---|---|---| |strideindustrialusa[.]com|2015- 12-21|Andrew Zavok|PDR Ltd. d/b/a|Stride Industrial Group Ltd|United Kingdom|strideindustrialgroup.com|Manufacturing| |waldorfs-astoria[.]com|2016- 12-11|Fred Hesl|PDR Ltd. d/b/a|Waldorf- Astoria|United States|waldorf-astoria.com|Hospitality| |atlantis-bahamas[.]com|2016- 12-11|Fred Hesl|PDR Ltd. d/b/a|Atlantis Bahamas|Bahamas|atlantisbahamas.com|Hospitality| |sizzier[.]com|2016- 12-01|Egor Danilkin|PDR Ltd. d/b/a|Sizzler Family Restaurants|United States|sizzler.com|Restaurant Chain| |taskretaiitechnology[.]com|2016- 12-01|Egor Danilkin|PDR Ltd. d/b/a|Task Retail Technology|Australia|taskretailtechnology.com|Software Development| |dhl-service-au[.]com|2016- 09-27|Remin Vladmiri|PDR Ltd. d/b/a|DHL Australia|Australia|dhl.com.au|Logistics| |prsnewwire[.]com|2016- 08-30|Remin Vladmiri|PDR Ltd. d/b/a|PR Newswire|United States|prnewswire.com|Marketing/Public Relations| (*) Legitimate organization reclaimed the mimicked/spoofed domain. Once the malicious domain had been registered, the group would point it to one of the following IP addresses: Domain Mirroring The Threat Actor would then use the TelePort Pro or TelePort Ultra software to mirror the content of the legitimate organization's web site to the newly registered domain. While in the majority of cases the TelePort Pro software would "flawlessly" mirror the web sites, if the web page contains links to external pages which are outside the scope of the TelePort site mirroring configuration, the software will rewrite some of the links in the mirrored HTML files as follows: Traces of TelePort Ultra seen on irisworidwide[.]com domain:
  • Twitter
  • Traces of TelePort Pro seen on prsnewwire[.]com domain: "mailto:sizzier_company@yahoo.com" From: barry_frith@shoneys.com Sent: Wednesday, December 14, 2016 10:33 AM To: R_bgt, Briargate 0186 Subject: catering Hello, My name is George Thon and I'm an Project Manager with Sizzier Ltd. We have composed a list of services we require and interested in. Enclosed link contains all catering informatiom - http://www.sizzier.com/docs/order.docx Click on edit anyway at the top of the page and than double click to unlock content Sincerely, George Thon Sizzier Ltd. Campaign and Infrastructure Clean Up At the time of this writing, at least one of the malicious documents is still being served on one of the above listed domains. While all of the above listed domains are still active, only a few are still serving up mirrored content. When we started investigating this threat actor a few months ago, we were able to observe that almost all of the above listed domains were, at one time, serving up mirrored page content. Based on all elements of our research, we believe the TelePort Crew threat actor will remove malicious and non-malicious content once successful execution of the malware on the target has been achieved. At the same time, our analysis leads us to suggest that the TelePort Crew may also delete or rename malicious content when the Threat Actor believes their operation has been compromised. Targeted Industry / Organizations Interrelations As we started investigating the Teleport Crew threat actor and the "Digital Plagiarist" campaign, it became apparent fairly quickly that the group has spent a considerable effort in understanding and mapping out affinities and business/customer relationships between their targets and the domains they would register. A good example of that is the relationship between Sizzler Family Restaurants (TelePort Crew registered "sizzier[.]com") and Task Retail Technology (TelePort Crew registered "taskretaiitechnology[.]com"): Sizzler Family Restaurants is a restaurant chain operating in the United States and abroad (including Australia). [Task Retail Technology is a software development company based in Australia, who develop the](http://www.taskretailtechnology.com/software) xchangexec Enterprise Point-of-Sale (POS) software. [The Task Retail Technology web site lists Sizzler as one of their customers.](http://www.taskretailtechnology.com/our-work/sizzler) Another, yet less obvious example, is that of the "relationship" between Perrigo (TelePort Crew registered "perrigointernational[.]com") and Syngenta (TelePort Crew registered "syngenta-usa[.]com"): Perrigo is a US based Pharmaceutical Company. Syngenta is a Swiss Agribusiness/BioTech firm, with offices in the United States. Based on multiple news reports [[1]](http://www.insidermonkey.com/blog/why-are-investors-piling-into-these-four-stocks-383983/) [[2]](http://www.law360.com/articles/726066/deals-rumor-mill-postal-savings-bank-t-mobile-syngenta) [[3]](https://www.bisnow.com/national/news/commercial-real-estate/ma-53792#3) [[4], both firms have seen similar investor profiles and were also both linked to Merger & Acquisition](https://www.bisnow.com/national/news/commercial-real-estate/ma-53792#7) activity over the past year. In a potentially more sinister, and entirely speculative twist, there may be a relationship between TrustWave and iris Worldwide Marketing (TelePort Crew registered "iris-woridwide[.]com"): iris Worldwide is marketing company responsible for marketing of some of the world's biggest brands. TrustWave is a security company who recently published [an article regarding the Carbanak / Anunak Threat Actor and their new Attack](https://www.trustwave.com/Resources/SpiderLabs-Blog/New-Carbanak-/-Anunak-Attack-Methodology/) Methodology. Apparently, iris Worlwide was responsible for a [marketing campaign around TrustWave's Global Security Report.](http://www.iris-worldwide.com/work/trustwave-global-security-report/) Attribution The tr1adx team initially started tracking this Threat Actor under the codename "TelePort Crew" as a result of some of their TTP's. As we were delving deeper into the group's activities, we were seeing increasing overlap with TTP's and infrastructure associated with the Carbanak / Anunak threat actor, which was fi d d t ith th i f ti i th T tW ti l titl d "N C b k / A k Att k M th d l " bli h d i N b ----- tr1adx s investigation, as well as the TrustWave investigation, point to a single IP address where the registered domains were hosted (192.99.14.211) tr1adx's investigation revealed that two domains we had been tracking (dhl-service-au[.]com and prsnewwire[.]com) were registered by a Registrant Name purporting to be "Remin Vladmiri". The same individual also registered "park-travels[.]com", which has been associated with the Carbanak/Anunak threat actor. The malware used in the "Digital Plagiarist" campaign appears to closely resemble that attributed to the Carbanak/Anunak threat actor, in terms of malware delivery, malware URL path, and behavior. Disclaimer The tr1adx team believes it is important to note that while we have seen this threat actor register domains similar in nature to domains belonging to legitimate organizations, we are in no way suggesting that these legitimate organizations or its customers were a direct target for the TelePort Crew threat actor. We do believe the group has leveraged the reputation and legitimacy of these organizations to give more credit to the "Digital Plagiarist" campaign, in turn potentially yielding a higher rate of success for compromising the group's victims. Indicators of Compromise **Indicators of Compromise (IOCs): Domains (25+) - Summary Table** microfocus-official[.]com iris-woridwide[.]com google3-ssl[.]com perrigointernational[.]com strideindustrialusa[.]com google4-ssl[.]com ornuafood[.]com waldorfs-astoria[.]com ssl-googles4[.]com esb-energy-int[.]com atlantis-bahamas[.]com google2-ssl[.]com fda-gov[.]com sizzier[.]com google5-ssl[.]com treasury-government[.]com taskretaiitechnology[.]com ssl-googlesr5[.]com bentley-systems-ltd[.]com dhl-service-au[.]com bols-googls[.]com zynga-ltd[.]com prsnewwire[.]com syngenta-usa[.]com google-ssls[.]com ai0ha[.]com google-stel[.]com **Indicators of Compromise (IOCs): IP Addresses - Summary Table** 192.99.14.211 31.41.41.41 144.76.61.231 **Indicators of Compromise (IOCs): File Hashes - Summary Table** order.docx MD5: 950afc52444e3b23a4923ab07c1e7d87 SHA1: 1827a7daa98c127af11318eebe23ec367f9146c9 order.docx MD5: ae8404ad422e92b1be7561c418c35fb7 SHA1: 400f02249ba29a19ad261373e6ff3488646e95fb **Indicators of Compromise (IOCs) [Downloadable Files]:** If a log search for any of these Indicators of Compromise returns positive hits, we recommend you initiate appropriate cyber investigative processes immediately and engage Law Enforcement where appropriate. |microfocus-official[.]com perrigointernational[.]com ornuafood[.]com esb-energy-int[.]com fda-gov[.]com treasury-government[.]com bentley-systems-ltd[.]com zynga-ltd[.]com syngenta-usa[.]com ai0ha[.]com|iris-woridwide[.]com strideindustrialusa[.]com waldorfs-astoria[.]com atlantis-bahamas[.]com sizzier[.]com taskretaiitechnology[.]com dhl-service-au[.]com prsnewwire[.]com google-ssls[.]com google-stel[.]com|google3-ssl[.]com google4-ssl[.]com ssl-googles4[.]com google2-ssl[.]com google5-ssl[.]com ssl-googlesr5[.]com bols-googls[.]com| |---|---|---| |192.99.14.211 31.41.41.41 144.76.61.231|Col2| |---|---| -----