<p><em>revised on August 22, 2019</em></p><p>Anomali researchers recently observed a site masquerading as a login page for a diplomatic portal linked to the French government. Further analysis of the threat actor’s infrastructure uncovered a broader phishing campaign targeting three different countries’ Ministry of Foreign Affairs agencies. Also targeted were four research-oriented organisations including: Stanford University, the Royal United Services Institute (RUSI), a United Kingdom-based think tank, Congressional Research Service (CRS), a United States-based think tank, and five different email service providers. There is an overlap of infrastructure with known North Korean actors, including the same domain and shared hosting provider. Because of the links between one of the victims and their work on North Korean sanctions, we expect to see malicious actors continue to target the international staff involved in a similar official capacity.</p><p>Prior to the release of this blog post, we have submitted the phishing sites to Google Safebrowsing and Microsoft for blacklist consideration.</p><h2>Targeting of French Ministry of Europe and Foreign Affairs</h2><p>On August 9, 2019, The Anomali Threat Research Team discovered a web page impersonating the French Ministry for Europe and Foreign Affairs (MEAE) online portal. The malicious host “portalis.diplomatie.gouv.fr.doc-view[.]work”<sup>[1]</sup> bears a strong resemblance to the legitimate site “diplomatie.gouv.fr”. When navigating to the suspicious subdomain, users are displayed with a phishing site mimicking the MEAE portal. According to the legitimate site, access is restricted to “MEAE agents”. The legitimate website for “France Diplomatie”, describes MEAE agents as potentially working for one of 12 agencies for the “Ministry for Europe and Foreign Affairs”. If an official from any of these agencies is able to login to the portal, then it is possible that all twelve of these agencies are potential victims, which includes:</p><ul><li>Agence Française de Développement (AFD)</li><li>Agency for French Education Abroad (AEFE)</li><li>Agricultural Research Centre for International Development (CIRAD)</li><li>Atout France</li><li>Business France</li><li>Campus France and France Médias Monde</li><li>Canal France International (CFI)</li><li>Expertise France</li><li>France Volontaires</li><li>Institut Français</li><li>Research Institute for Development (IRD)</li></ul><p style="text-align: center;"><em><img alt="Faux login page for the portal of the Ministry of Europe and Foreign Affairs (MEAE)" src="https://cdn.filestackcontent.com/fIkwQz4QzeyR7499rVHl"/><br/> Figure 1 - Faux login page for the portal of the Ministry of Europe and Foreign Affairs (MEAE)</em></p><p>The screenshot above shows the webpage designed to look like the MEAE portal. The screenshot shows a session timeout popup window for the victim who has attempted to login. In this instance, although not visibly clear, the page source shows the intended victim. This person was most likely targeted in a phishing campaign.</p><p style="text-align: center;"><em><img alt="Page source code for MEAE portal and victim email address" src="https://cdn.filestackcontent.com/Q8Fyh3ygS6CSmoQ7yEoO"/><br/> Figure 2 - Page source code for MEAE portal and victim email address</em></p><p>The email in the page source code is for an employee of the target organisation. According to delegefrance[.]org, the email address in the page source code belongs to a senior official assigned to the French Mission Team to the United Nations in New York. Moreover, this French diplomat works in the “Disarmament, Non-Proliferation, Sanctions committees: Iran, North Korea, 1st Committee”.<sup>[2]</sup></p><h2>Threat Infrastructure Analysis</h2><p>The malicious URL “portalis.diplomatie.gouv.fr.doc-view[.]work” is mimicking a diplomatic portal on the malicious domain “doc-view[.]work”. This domain is hosted on the IP 157.7.184[.]15 and has several subdomains that appear to be designed to impersonate email providers. The IP address also appears to have several similar domains and URLs that share some patterns in naming conventions.</p><p style="text-align: center;"><em><img alt="Similar named domains hosted on the same IP address" src="https://cdn.filestackcontent.com/i1YuoGraTmvXlO1DMRow"/><br/> Figure 3 - Similar named domains hosted on the same IP address</em></p><p>The IP address 157.7.184[.]15 is hosted by the Asia Pacific Network Information Centre (APNIC). There are multiple unrelated domains hosted on the same IP address because the IP address is shared. The IP is based in Japan and registered under the Japan Network Information Centre located in Tokyo.</p><p>The most recently used domains on this IP address that share the same naming conventions are the following four domains:</p><h3>Domain 1 - doc-view[.]work</h3><p>The domain doc-view[.]work is hosted on IP 157.7.184[.]15. The domain has 32 subdomains.<sup>[3]</sup> Most of the subdomains appear to be spoofing email service providers Yahoo, Outlook, Ymail and Google services. Both the domain and some of the subdomains appear to have been set up to look like they will allow the victim to access documents; the use of Microsoft OneDrive for example.</p><p style="text-align: center;"><em><img alt="An overview of high profile phishing sites on domain doc-view[.]work" src="https://cdn.filestackcontent.com/RBwCo1bQSiKYjIZcwXqn"/><br/> Figure 4 - An overview of high profile phishing sites on domain doc-view[.]work</em></p><p>Figure 4 above depicts the most interesting subdomains created for the domain doc-view[.]work to include two subdomains set up to impersonate the MEAE login. We also identified a subdomain “securemail.stanford.doc-view[.]work” created by the malicious actor to mimic Stanford University’s Secure Email service.<sup>[4]</sup> According to Stanford University IT Department’s website, the Secure Email service is designed for faculty and staff who need to use email to send moderate or high risk data. Of note, Stanford University hosts the Centre for International Security and Cooperation (CISAC) and the Asia Pacific Research Centre (APARC) - both of which are part of the Freeman Spogli Institute for International Studies. These research centres host a number of talks and deliver research on a variety of international issues including ongoing developments in North Korea.</p><p style="text-align: center;"><em><img alt="Screenshot of Stanford University’s Secure Email-themed phishing site securemail.stanford.doc-view[.]work" src="https://cdn.filestackcontent.com/e5MBUr62RmaRdX2kJliO"/><br/> Figure 5 - Screenshot of Stanford University’s Secure Email-themed phishing site securemail.stanford.doc-view[.]work</em></p><p>The submitted URL in URLScan.io, an online service for scanning and analyzing websites, shows the potential victim in the screenshot available, confirms the target institute as being Stanford University. A search in the Stanford Directory did not reveal anyone associated with this email address at Stanford University.</p><p>When investigating SSL/TLS certificates issued for the domain doc-view[.]work, there were five other fraudulent subdomains spoofing two think tanks, two foreign government agencies, and a United Nations organization.</p><ul><li>Congressional Research Service, a United States-based think tank</li><li>Ministry of Foreign and European Affairs of the Slovak Republic</li><li>Ministry of Foreign Affairs - Unknown country</li><li>Royal United Services Institute (RUSI), a United Kingdom-based think tank</li><li>South African Department of International Relations and Cooperation</li><li>United Nations delegation</li></ul><h3>Domain 2. app-support[.]work</h3><p>The domain app-support[.]work is hosted on the same IP address 157.7.184[.]15. The domain has a number of subdomains that look like they are attempting to impersonate popular email providers such as Yahoo and Gmail. The use of the domain “app-support” suggests the campaigns associated with this domain may be targeting smart-phones or Apple devices, because of the use of the word “app”.</p><p style="text-align: center;"><em><img alt="An overview of phishing sites associated with the domain app-support[.]work" src="https://cdn.filestackcontent.com/gCAeuljcRKGumriiivrC"/><br/> Figure 6 - An overview of phishing sites associated with the domain app-support[.]work</em></p><p>High profile targets in the above diagram include:</p><ul><li>Sina - A Chinese technology company</li></ul><h3>Domain 3. web-line[.]work</h3><p>The domain web-line[.]work is hosted on the IP 157.7.184[.]15. The domain has a number of subdomains that appear to be mimicking well-known online services such as Google’s Gmail and Microsoft’s OneDrive. Interestingly, the domain owner also created a seemingly identical MEAE-themed subdomain “portalis.diplomatie.gouv.web-line[.]work” that presumably attempts to mimic the MEAE portal. At the time of this report, the website was unresponsive; therefore, we were unable to obtain a screenshot of the page or analyze the site’s source code. Due to the domain name and infrastructure similarities of the original discovery, we judge with moderate confidence that the second subdomain was most likely created to target MEAE using the same techniques discussed above.</p><p style="text-align: center;"><em><img alt="An overview of phishing sites associated with the domain web-line[.]work" src="https://cdn.filestackcontent.com/y3hdHBHnSMGKr2BCUlI8"/><br/> Figure 7 - An overview of phishing sites associated with the domain web-line[.]work</em></p><p>In Figure 7, we highlight several high profile organizations targeted by the attackers. The following list reflects the most interesting targets in the overview of subdomains:</p><ul><li>Mail.fed.be - possible attempt to target the Federal government of Belgium</li><li>Ministry of Europe and Foreign Affairs - France (MEAE)</li><li>Ministry of Foreign Affairs (MOFA) - unknown country</li><li>Sina - a Chinese technology company</li><li>The Department of International Relations and Cooperation - The foreign ministry of the South African government</li></ul><h3>Domain 4. sub-state[.]work</h3><p>When investigating passive DNS results on the same IP address 157.7.184[.]15, the domain “sub-state[.]work” was discovered. This domain has ten subdomains that follow the same naming conventions as the ones mentioned already.</p><p style="text-align: center;"><em><img alt="An overview of phishing sites hosted on domain sub-state[.]work" src="https://cdn.filestackcontent.com/zEPb1jvITS63nnDIlBIo"/><br/> Figure 8 - An overview of phishing sites hosted on domain sub-state[.]work</em></p><p>In Figure 8 it is possible to see subdomains impersonating the following organisations:</p><ul><li>Asahi News organisation - one of five major newspapers in Japan</li><li>Ministry of Foreign Affairs - South Korea</li></ul><h2>Who’s Behind These Attacks?</h2><p>The IP address 157.7.184[.]15 is shared and therefore home to both legitimate and malicious activity. However, there is an overlap in infrastructure in a recent North Korean campaign called “Smoke Screen” reported on by ESTSecurity in April 2019<sup>[5]</sup>. The domain “bigwnet[.]com” was reportedly used as a command and control (C2) for the Kimsuky Babyshark network trojan, which is also hosted on the same IP address. Kimsuky Babyshark network trojan is associated with North Korea.</p><p>According to DomainWatch, an online service that collects domain registrant information, there is a registrant email address that appears to link a number of the aforementioned domains: ringken1983[at]gmail.com.<sup>[6]</sup></p><p style="text-align: center;"><em><img alt="Whois information for the domain doc-view[.]work" src="https://cdn.filestackcontent.com/a7RaaACBRQOedZm2EdRB"/><br/> Figure 9 - Whois information for the domain doc-view[.]work</em></p><p>DomainWatch also shows that the following domains are also registered with the same email address:</p><p style="text-align: center;"><em><img alt="Domains registered with the email address ringken1983[at]gmail[.]com" src="https://cdn.filestackcontent.com/C62iE6RSQWC4mpyfwfEp"/><br/> Figure 10 - Domains registered with the email address ringken1983[at]gmail[.]com</em></p><p>There are two other registrant emails identified for two related domains; “web-line[.]work” and “drog-service[.]com”.</p><p style="text-align: center;"><em><img alt="Domains registered with email address dragon1988[at]india[.]com" src="https://cdn.filestackcontent.com/6v4eq4GKTEOiYG77rLgs"/><br/> Figure 11 - Domains registered with email address dragon1988[at]india[.]com</em></p><p style="text-align: center;"><em><img alt="Domains registered with email address okonoki_masao[at]yahoo[.]co.jp" src="https://cdn.filestackcontent.com/KjBbjQfBRGykObUqi1m0"/><br/> Figure 12 - Domains registered with email address okonoki_masao[at]yahoo[.]co.jp</em></p><p>The domain “Dauum[.]net” appears to be mimicking the South Korean web portal, Daum, which is an email provider among other services. In January 2019, North Korean actors were reported to have been targeting the Daum, Naver, and kakaoTalk services (all popular South Korean services), registering a number of similar-looking domains.<sup>[7]</sup></p><h2>Conclusion</h2><p>Many of the organisations targeted in this campaign offer insight for strategic direction and goals of a particular country (South Korea for example). The targeting of foreign ministries for four different countries, and the persistent attempt to masquerade as email or online document services is most likely to gain access to the victim’s sensitive communications and/or information. The purpose of this campaign is likely to gain access to the information, but it is difficult to know exactly what the end goal is for the adversary. After gaining access to the internal email service of an organisation, it is possible to compromise the organisation in many other ways. Whilst researching this campaign, many of the domains were not active, although most were registered this year. It might be that the adversary has been waiting to use the infrastructure for a future attack. There is an overlap with North Korean indicators in this research, and similar targeting to previous campaigns already reported.</p><h2>Endnotes</h2><p><sup>[1]</sup> URLScan, “portalis.diplomatie.gouv.web-line[.]work,” urlscan.io, accessed August 9, 2019, submitted July 23, 2019, <a href="https://urlscan.io/result/7e347bdc-8e0e-485b-93b2-6df2b919d768/" target="_blank">https://urlscan.io/result/7e347bdc-8e0e-485b-93b2-6df2b919d768/</a>.</p><p><sup>[2]</sup> The French Mission Team, “Permanent mission of France to the United Nations in New York,” Ministry of Europe and Foerign Affairs, accessed August 12, 2019, <a href="https://onu.delegfrance.org/The-French-Mission-Team-8786" target="_blank">https://onu.delegfrance.org/The-French-Mission-Team-8786</a>.</p><p><sup>[3]</sup> Censys, “doc-view[.]work,” Censys Certificate Search, accessed August 9, 2019, <a href="https://censys.io/certificates?q=%22doc-view.work%22" target="_blank">https://censys.io/certificates?q=%22doc-view.work%22</a>.</p><p><sup>[4]</sup> Stanford University, “Email:Secure Email: Email for Moderate and High Risk Data,” accessed August 14, 2019, published November 8, 2018, <a href="https://uit.stanford.edu/service/secureemail" target="_blank">https://uit.stanford.edu/service/secureemail</a>.</p><p><sup>[5]</sup> Alyac, “Kimsuky’s APT Campaign ‘Smoke Screen’ Revealed for Korea and US,” ESTsecurity, accessed August 14, 2019, published April 17, 2019, <a href="https://blog.alyac.co.kr/2243" target="_blank">https://blog.alyac.co.kr/2243</a>.</p><p><sup>[6]</sup> DomainWatch, “doc-view[.]work,” DomainWatch WhoIs, accessed August 12, 2019, <a href="https://domainwat.ch/whois/doc-view.work" target="_blank">https://domainwat.ch/whois/doc-view.work</a>.</p><p><sup>[7]</sup> BRI, “#1267555: Konni Campaign Targetting Mobiles - Additional IOCs,” BRI Alert, accessed August 14, 2019, published July 15, 2019, <a href="https://brica.de/alerts/alert/public/1267555/konni-campaign-targetting-mobiles-additional-iocs/" target="_blank">https://brica.de/alerts/alert/public/1267555/konni-campaign-targetting-mobiles-additional-iocs/</a>.</p><h2>Appendix A - Indicators of Compromise</h2><p>The table below represents the malicious infrastructure and basic description of each indicator of compromise observed in the phishing campaign:</p><table class="table table-striped"><tbody><tr><th>Indicators of Compromise</th><th>Description</th></tr><tr><td>157.7.184[.]15</td><td>Shared hosting server with multiple suspicious and phishing sites</td></tr><tr><td>doc-view[.]work</td><td>Malicious domain</td></tr><tr><td>web-line[.]work</td><td>Malicious domain</td></tr><tr><td>app-support[.]work</td><td>Malicious domain</td></tr><tr><td>login-confirm[.]work</td><td>Malicious domain</td></tr><tr><td>member-service[.]work</td><td>Malicious domain</td></tr><tr><td>short-line[.]work</td><td>Malicious domain</td></tr><tr><td>alone-service[.]work</td><td>Malicious domain</td></tr><tr><td>minner[.]work</td><td>Malicious domain</td></tr><tr><td>com-main[.]work</td><td>Malicious domain</td></tr><tr><td>sub-state[.]work</td><td>Malicious domain</td></tr><tr><td>check-up[.]work</td><td>Malicious domain</td></tr><tr><td>portalis.diplomatie.gouv.web-line[.]work</td><td>Phishing site mimicking the Ministry of Europe and Foriegn Affairs (MEAE) portal</td></tr><tr><td>account.googlie.com.doc-view[.]work</td><td>Phishing site</td></tr><tr><td>crsreports.congress.doc-view[.]work</td><td>Phishing site mimicking the Congressional Research Service</td></tr><tr><td>delegate.int.doc-view[.]work</td><td>Phishing site likely to be mimicking the United Nations delegate login</td></tr><tr><td>drive.google.doc-view[.]work</td><td>Phishing site</td></tr><tr><td>drive.storage.com.doc-view[.]work</td><td>Phishing site</td></tr><tr><td>drives.google.doc-view[.]work</td><td>Phishing site</td></tr><tr><td>hostmaster.doc-view[.]work</td><td>Phishing site</td></tr><tr><td>login-history.doc-view[.]work</td><td>Phishing site</td></tr><tr><td>login-onedrive.doc-view[.]work</td><td>Phishing site</td></tr><tr><td>login.live.doc-view[.]work</td><td>Phishing site</td></tr><tr><td>login.outlook.doc-view[.]work</td><td>Phishing site</td></tr><tr><td>login.yahoo-sec.doc-view[.]work</td><td>Phishing site</td></tr><tr><td>login.yahoo.doc-view[.]work</td><td>Phishing site</td></tr><tr><td>login.ymail.doc-view[.]work</td><td>Phishing site</td></tr><tr><td>mail.doc-view[.]work</td><td>Phishing site</td></tr><tr><td>mail.mofa.gov.doc-view[.]work</td><td>Phishing site mimicking the Ministry of Foriegn Affairs (MOFA) - unknown country</td></tr><tr><td>mail.preview.doc-view[.]work</td><td>Phishing site</td></tr><tr><td>mail.sec.doc-view[.]work</td><td>Phishing site</td></tr><tr><td>mail.view.doc-view[.]work</td><td>Phishing site</td></tr><tr><td>mail.xmailgateway.doc-view[.]work</td><td>Phishing site</td></tr><tr><td>myaccount.google.doc-view[.]work</td><td>Phishing site</td></tr><tr><td>myaccount.protect.doc-view[.]work</td><td>Phishing site</td></tr><tr><td>myaccount.setting.doc-view[.]work</td><td>Phishing site</td></tr><tr><td>mzv.sk.doc-view[.]work</td><td>Phishing site mimicking the Ministry of Foreign and European Affairs of the Slovak Republic</td></tr><tr><td>one-drive.storage.doc-view[.]work</td><td>Phishing site</td></tr><tr><td>onedrive.com.doc-view[.]work</td><td>Phishing site</td></tr><tr><td>portalis.diplomatie.gouv.doc-view[.]work</td><td>Phishing site mimicking the Ministry of Europe and Foriegn Affairs (MEAE) portal</td></tr><tr><td>portalis.diplomatie.gouv.fr.doc-view[.]work</td><td>Phishing site mimicking the Ministry of Europe and Foriegn Affairs (MEAE) portal</td></tr><tr><td>rusi.org.doc-view[.]work</td><td>Phishing site mimicking the UK think tank RUSI</td></tr><tr><td>securemail.stanford.doc-view[.]work</td><td>Phishing site mimicking Stanford University</td></tr><tr><td>ubmail.dirco.gov.doc-view[.]work</td><td>Phishing site mimicking the Department of International Relations and Cooperation of the Foreign Ministry of the South African government</td></tr><tr><td>www.str8-creative.com.doc-view[.]work</td><td>Phishing site</td></tr><tr><td>rive.storage.com.doc-view[.]work</td><td>Phishing site</td></tr><tr><td>login.yalnoo-sec.doc-view[.]work</td><td>Phishing site</td></tr><tr><td>login.onedrive-storage.doc-view[.]work</td><td>Phishing site</td></tr><tr><td>david.gizmodo.com.doc-view[.]work</td><td>Phishing site</td></tr><tr><td>drive.storage.login-confirm[.]work</td><td>Phishing site</td></tr><tr><td>share.doc.login-confirm[.]work</td><td>Phishing site</td></tr><tr><td>accounts.live.com.member-service[.]work</td><td>Phishing site</td></tr><tr><td>accounts.msn.com.member-service[.]work</td><td>Phishing site</td></tr><tr><td>accounts.outlooks.com.member-service[.]work</td><td>Phishing site</td></tr><tr><td>ccounts.outlooks.com.member-service[.]work</td><td>Phishing site</td></tr><tr><td>edit.accounts.member-service[.]work</td><td>Phishing site</td></tr><tr><td>maii.ocn-accounts.member-service[.]work</td><td>Phishing site</td></tr><tr><td>mail.ocn-accounts.member-service[.]work</td><td>Phishing site</td></tr><tr><td>login.outlook.short-line[.]work</td><td>Phishing site</td></tr><tr><td>1drv.ms.web-line[.]work</td><td>Phishing site</td></tr><tr><td>drive.storage.com.web-line[.]work</td><td>Phishing site</td></tr><tr><td>hostingemail.digitalspace.web-line[.]work</td><td>Phishing site</td></tr><tr><td>login.live.web-line[.]work</td><td>Phishing site</td></tr><tr><td>mail.fed.be.web-line[.]work</td><td>Phishing site</td></tr><tr><td>mail.mofa.gov.web-line[.]work</td><td>Phishing site</td></tr><tr><td>mail.xmailgateway.web-line[.]work</td><td>Phishing site</td></tr><tr><td>portalis.diplomatie.gouv.web-line[.]work</td><td>Phishing site</td></tr><tr><td>ubmail.dirco.gov.web-line[.]work</td><td>Phishing site</td></tr><tr><td>edit-accounts.ntt-ocn.alone-service[.]work</td><td>Phishing site</td></tr><tr><td>login-accounts.yahoojp.minner[.]work</td><td>Phishing site</td></tr><tr><td>login-accounts.yaoojp.minner[.]work</td><td>Phishing site</td></tr><tr><td>login.live.com-main[.]work</td><td>Phishing site</td></tr><tr><td>login.ymail.com-main[.]work</td><td>Phishing site</td></tr><tr><td>mail.mofa.go.kr.sub-state[.]work</td><td>Phishing site</td></tr><tr><td>accounts.ocn-setting.app-support[.]work</td><td>Phishing site</td></tr><tr><td>login-accounts.view.app-support[.]work</td><td>Phishing site</td></tr><tr><td>login.yahoo.app-support[.]work</td><td>Phishing site</td></tr><tr><td>loing-accounts.view.app-support[.]work</td><td>Phishing site</td></tr><tr><td>myaccount.google-monitor.app-support[.]work</td><td>Phishing site</td></tr><tr><td>myaccounts.google-set.app-support[.]work</td><td>Phishing site</td></tr><tr><td>vip-sina.com.cn.app-support[.]work</td><td>Phishing site</td></tr><tr><td>accounts.lives.com.check-up[.]work</td><td>Phishing site</td></tr><tr><td>accounts.msn.com.check-up[.]work</td><td>Phishing site</td></tr><tr><td>accounts.outlookes.check-up[.]work</td><td>Phishing site</td></tr><tr><td>accounts.outlooks.check-up[.]work</td><td>Phishing site</td></tr><tr><td>lh.yahoojp.check-up[.]work</td><td>Phishing site</td></tr><tr><td>mail.ocn-accounts.check-up[.]work</td><td>Phishing site</td></tr><tr><td>ringken1983[at]gmail[.]com</td><td>Adversary email address used to register domains</td></tr><tr><td>dragon1988[at]india[.]com</td><td>Adversary email address used to register domains</td></tr><tr><td>okonoki_masao[at]yahoo[.]co[.]jp</td><td>Adversary email address used to register domains</td></tr></tbody></table><p>For more information, contact Joe Franscella: <a href="mailto:jfranscella@anomali.com">jfranscella@anomali.com</a></p>