Today’s OSINT investigation involves a talented young hacker, who slowly turned into the operator of a large-scale phishing network. What we found on the surface is a story of a happy father, who facilitates identity theft when nobody is looking. In this article, we demonstrate how we managed to track down the operator of this phishing operation called ‘Bulletproftlink’.

As usual, it all started with a phishing email impersonating a Sydney-based accounting firm. The email came from an accountant and it looked reasonable legitimate. There was no sign of broken English or a spoofed email sender, the message looked rather convincing.

The initial phishing email leading to a fake Microsoft login page.
The initial phishing email leading to a fake Microsoft login page.

The Remittance Advice receipts.pdf link took me to a downloadable HTML file hosted on Dropbox. Once we did go down the rabbit hole, the link redirections ultimately led us to a fake login page served from the Google Cloud Storage platform.

It was a password-stealing page, a pixel-perfect clone of the Microsoft login page. If a victim enters their password on this page, the login credentials are sent straight to the criminals rather than Microsoft. These passwords are usually end up on the black market for those being in the business of identity theft.

The link in the email takes to Dropbox. The HTML file on Dropbox takes the web browser to a URL shortener. The URL shortener takes the web browser to a page hosted on Google Cloud. The page hosts a fake Microsoft login page.
The phishing email takes to a fake Microsoft login page phishing for credentials.

Where did the passwords go?

The following step was the dissection of the fake login page to see where the victims’ password is transmitted.

Although the phishing page was featuring some level of code obfuscation, we did not have to fire up the Burp Suite this time. This time, the code inspector was enough to reveal that the destination of the stolen passwords was https://moneysmtp.com/email-list/office365nw/finish.php.

The developer console reveals the destination of the username and password entered on the login page.
The developer console reveals the destination of the username and password entered on the login page.

The receiving end of the passwords

The next stage was poking around on this page capturing the passwords.

When we punched the URL into a web browser, the remote end responded with a simple OK message. Unfortunately, the HTTP headers did not reveal that much either. The root page at https://moneysmtp.com/ did not show too much either apart from a reference to Vesta Control Panel, a popular application within server hosting circles.

The password collecting endpoint simply replies with an 'OK' message. The root page has a reference to the Vesta Control Panel.
The password collecting end did not reveal much first.

To make it worse, the remote end was hidden behind Cloudflare, so the IP address remained hidden for the time being.

The real IP address of 'moneysmtp.com' is hidden behind Cloudflare.
The real IP address of 'moneysmtp.com' is hidden behind Cloudflare.

Other brands impersonated

The first find was that moneysmtp.com was linked to phishing campaigns impersonating other brands and services such as OneDrive, Outlook Web Access, Jetstar and Wells Fargo according to urlscan.io. In other words, passwords are unwittingly given away on these phishing pages also end up on moneysmtp.com.

The urlscan.io results reveal that 'moneysmtp.com' is associated with over 25 phishing pages. Passwords from fake OneDrive login pages are also sent to 'moneysmtp.com'. Passwords from fake Outlook Web Application (OWA) login pages are also sent to 'moneysmtp.com'. Passwords from fake Wells Fargo bank login pages are also sent to 'moneysmtp.com'.
Examples of the various brands impersonated.

Finding the origin server

The breakthrough came when we ran an IPv4 Hosts search for the domain name on Censys. The search query returned two IP addresses associated with ‘moneysmtp.com’: 62.149.20.89 and 62.149.20.90.

A Censys search revealed the true IP address of 'moneysmtp.com'.
A Censys search revealed the true IP address of 'moneysmtp.com'.

A quick visit to http://62.149.20.89 confirmed that the page appears to be serving moneysmtp.com.

Confirming that '62.149.20.89' is linked to 'moneysmtp.com'.
Confirming that '62.149.20.89' is linked to 'moneysmtp.com'.

Similarly, visiting http://62.149.20.90 revealed that a similar password collecting service named transactionsmtp.com is also affiliated with this phishing operation.

The IP address '62.149.20.90' seems to be associated with a different subset of phishing campaigns.
The IP address '62.149.20.90' seems to be associated with a different subset of phishing campaigns.

According to the detailed search result, the IP addresses belong to a hosting provider in Kyiv, Ukraine.

The GeoIP location of the IP addresses is a no-questions-asked provider in Ukraine.
The GeoIP location of the IP addresses is a no-questions-asked provider in Ukraine.

First, we thought this was a good lead, as the two IP addresses seem to belong to 7Heaven LLC (7h.com.ua), a no-questions-asked server hosting provider in Ukraine. Little did we know, this was a dead-end, and the traces were leading to Asia instead.

Getting closer to the operator

Following a brief look into 7Heaven LLC that led nowhere, we went back to Censys to run a different query.

This time, however, we searched within the Certificates category, and voilà, there was an email address associated with our adversary: thegreenmy87@gmail.com.

A search in the Certificate Transparency logs reveals an email address.
A search in the Certificate Transparency logs reveals an email address.

That’s a warm lead! A further search using thegreenmy87@gmail.com as the search query revealed a large number of IP addresses associated with the email address.

We found that the email address is associated with a large number of endpoints also collecting passwords.
We found that the email address is associated with a large number of endpoints also collecting passwords.

What this meant is that we managed to identify a large section of the hosting infrastructure of this phishing operation. In cybersecurity terms, we managed to climb the Pyramid of Pain rather high allowing network operators stop this phishing campaign from stealing credentials on their networks (as long as the adversary does not change their tactics).

Note: The full list of domain names is published in Part 3 of this series.

Who is ‘thegreenmy87’?

An easy Google search for thegreenmy87@gmail.com found us a now-deleted hacking tutorial video on UKblow, a video sharing website. The video (available on Google webcache only) was posted by an account named ANTHRAX LINKERS, and its description was talking about email sending, spamming and login pages hosted on Google Cloud Storage.

Does it sound familiar?

Screenshot of the description of the now-deleted video. Screenshot of the description of the now-deleted video.
This video tutorial reveals the name of the associated hacking group and other leads.

The description of the video was referring to a handful of additional email addresses associated with ‘Anthrax Linkers’:

anthrax.linkers@outlook.com
anthrax.linkers@aol.com
thegreenmy87@gmail.com
anthrax@secmailbox.net
anthrax.win32@yahoo.com

There is also a reference to an ICQ handle named anthraxlinkers. The description is also referring to a website at Bulletproftink.com/shop, which appeared to be down at the time.

It is always a good practice to take the username part from an email address and run a few search queries on it.

Therefore, we took thegreenmy87 from the email address and ran it through Sherlock in an attempt to find any public profiles registered with this handle.

We found two interesting results: a Gravatar profile and a GitHub account. Both of these accounts featured a low-res profile picture of a logo some sort. Unfortunately, the text was not readable.

What do we know so far?

In summary, this is where we got so far:

  • An adversary was running a phishing campaign impersonating various brands and businesses;
  • The phishing email led to a fake Microsoft login page with the purpose of stealing login passwords;
  • The fake Microsoft login page is tied to a hosting infrastructure running in Ukraine;
  • The hosting infrastructure is run by an adversary called thegreenmy87;
  • The adversary is associated with a group named Anthrax Linkers;
  • Found low-resolution profile photos of the accounts of thegreenmy87; and
  • Found a website reference to Bulletproftink.com/shop.

In Part 2 of the series, we reveal who the adversary is and how we managed to identify the operator of this phishing operation.