Hacker Newsnew | past | comments | ask | show | jobs | submit | haxrob's commentslogin

Can attest, having searched through literally thousands of pages of documentation in an attempt to attribute the payment processing switch vendor when analysing the ATM jackpotting malware ‘fast cash for Linux’[1]. The best I could do was determine the currency used for the fraudulent transactions, which may imply the country of the target financial institution.

Would be curious if anyone else has further insights.

[1] https://haxrob.net/fastcash-for-linux/


"CrowdStrike cash on hand for the quarter ending April 30, 2024 was $3.702B, a 26.38% increase year-over-year." [1]

[1] https://www.macrotrends.net/stocks/charts/CRWD/crowdstrike/c...


That's just one class-action judgment from being $0.00.

I don't think it will happen, but we're not talking about a "just restore from backup" situation. When you look at the fact that, statistically, at least one person likely died (or will die) from this due to the problems hospitals had, and that some customers are still dealing with the fallout... I think they're significantly financially compromised after all of the dust settles.


> Not to downplay it but at least this requires users to download the Onavo app, which isn’t so common.

10 million installs on Android, according to AndroidRank[1]. What we don't know (yet) is what % of those installs had the FB competitor traffic MITM'd.

[1] https://www.androidrank.org/application/onavo_protect_from_f...


Thanks, I have modified the wording and also quoted you and linked this HN post on the blog page.


> This wasn’t simply Facebook hijacking random people’s traffic because they accepted the ToS or used the Facebook app

Do you have further insights or references on what was the "trigger condition"? This is a new case, separate to the previous litigation related to the VPN app.


The analytics domain was "sc-analytics.appspot.com" in which the lack of pinning is described at the tail end of the blog post.


> Victims that were being paid to participate

I believe you might be referring to what happened in 2019? [1] This is a separate issue. [2]

I do clarify this in the blog post, although it might be better to move the relevant text near the introduction rather then in the middle of the post.

EDIT: I have also added a remark to the post that it is not clear if all users were MITM'd or just a subset

[1] https://techcrunch.com/2019/01/29/facebook-project-atlas/

[2] https://techcrunch.com/2024/03/26/facebook-secret-project-sn...


I think what is missing is a timeline and clarity about the actual steps users had to take.

1) Onavo was a (free?) VPN app acquired by FB in 2014. Facebook used it to collect “market research data.” People chose to download this, but thought it was a security product.

2) At some point (it looks like 2016?) they launched an iOS app called Research, using the same tech, which required users to install a certificate meant for internal Facebook employees. They paid these users to monitor their traffic.

Are you saying that the MITM was happening for users of (1) or (2) or both?


> from what I can tell FB paid SC users to participate in “market research” and install the proxy.

The app was available on both the Google Play and Apple App stores for anyone to download.

> The way most of the writeups make it sound is that it’s some sort of hack, but this doesn’t seem to be the case.

It could be that you are confused with a previous case. From the blog post:

> The wiretapping claim is new and perhaps not to be confused with the prior controversy and litigation: In 2023, two subsidiaries of Facebook was ordered to pay a total of $20M by the Australian Federal Court for "engaging in conduct liable to mislead in breach of the Australian Consumer Law", according to the ACCC ... Facebook had shutdown Onavo in 2019 after an investigation revealed they had been paying teenagers to use the app to track them. Also that year, Apple went as far as to revoke Facebook's developer program certificates, sending a clear message.

> If this is wiretapping, is it also wiretapping for me to use a local SSL proxy to decrypt and analyze traffic to a service’s API

If by "local" on your own network/machine with your own traffic then obviously no.


Recommend taking a read of CrowdStrike's write up on this [1].

The threat actor maintains a presence on the roaming exchange through compromising "at least 13 telecommunication companies".

> If it's the former, then it seems very un-stealthy

In this article there is one example where the outbound connectivity to the Internet was via a "SGSN emulator in a loop, attempting to connect to a set of nine pairs of International Mobile Subscriber Identity (IMSI) and Mobile Subscriber Integrated Services Digital Network (MSISDN) numbers."

In this example, the transit traffic before egress to the Internet would appear to be legitimate subscriber traffic - user payload encapsulated in a PDP context / GTP tunnel to another telco's GGSN / packet gateway.

> Which, maybe they don't care, but it seems like they're risking blacklisting.

By compromising so many telcos, there are many points of redundancy for persistence on the roaming exchange. This threat actor has remained on telco networks for many years undetected - their techniques are apparently are quite effective.

[1] https://www.crowdstrike.com/blog/an-analysis-of-lightbasin-t...


Thanks for the shout out Rob :) Great writeup yourself!


For those wondering, danielwmayer is one of the authors of the CrowdStrike article linked in the parent.


holy mackerel, I had no idea their operation was so large. that's terrifying; I hope their network has been rolled up following Crowdstrike's article. in any event, it sounds like they don't have any shortage of outbound connectivity options.


> I believe them to be an adjacent team to the more well known Mustang Panda

This is interesting - the attribution for this actor has remained elusive for quite some time due to their consistent operational security.

Could you elaborate on how you came to this attribution? And to what confidence?


Don't think of a specific named actor as a tight knit group of hackers that own a project start to finish like you'd see in the movies. Really what we are identifying is a specific team within a multi-thousand person organization (or cooperating organizations). Just like any other big organization projects get handed off between teams based on their specializations.

LightBasin is a group that is highly experienced in telecommunications that is able to identify specific hardware from vendors and probably has the same gear sitting in a lab to test on. They are focused on COMINT collection and exploitation. There has been no evidence of them doing initial access work (establishing a foothold within specific networks), so they are likely being given access and then using their domain knowledge to pivot between different telcom providers on shared networks.

Mustang Panda on the other hand focuses on initial access to organizations and then stealing credentials, intellectual property, and most importantly internal documentation. You can start to see how these two groups would work hand-in-hand.

Based on victimology I believe the two to be within an organizational structure where information passes from one to the other. It is impossible to definitively state one way or the other without having information from within the Chinese government.

If you want further info, my email is in my profile.

https://www.mcafee.com/blogs/other-blogs/mcafee-labs/operati...


Thanks Mike for sharing your insights.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: