I was alerted to this ESET paper ( https://www.welivesecurity.com/wp-content/uploads/2018/03/ESET_OceanLotus.pdf) On page 15 (see screenshot) you can see that #OceanLotus uses DNS-based requests and encodes the name of the computer right there.
With access to a PassiveDNS database (thank you, @FarsightSecInc) you start with one domain, grab all IP-addresses it was hosted on. Look for new domains on those IPs. Try to find the pattern. Rinse and repeat. @MichaelKreil wrote the script. Resulted in more than 1000 names.
Sidenote: #Oceanlotus/ #APT32 has a somewhat weird anomaly when setting up their DNS infrastructure, specifically in the SOA-record. It should increment after changes, but doesn’t. Makes it easier to be sure you’re dealing with them.
So, we got more than 1000 names. Many of those are from researchers or sandboxes (e.g. “tequilaboomboom” from VT). But a huge chunk are Vietnamese first and last names. Nice for us as reporters to be able to verify the claim who this group is targeting by looking at PassiveDNS.
We also found names like “asean”. ASEAN has been targeted successfully back in 2017, as laid out in this blogpost by @Volexity https://www.volexity.com/blog/2017/11/06/oceanlotus-blossoms-mass-digital-surveillance-and-exploitation-of-asean-nations-the-media-human-rights-and-civil-society/ To be sure, we reached out to ASEAN but never heard back.
While I was able to find out that #OceanLotus successfully targeted government entities in the Philippines in 2018, we just don’t know if these ASPACs are connected to those cases. Gov of Philippines never got back to us.
Finishing this thread.
Two options
If you’re interested in another technical tidbit, check out this thread, where you’ll come across a mistake (maybe!) that OceanLotus made jump right here
https://twitter.com/hatr/status/1314169879885471746
go back where you left off https://twitter.com/hatr/status/1314170667319910400
You can follow @hatr.
Tip: mention @twtextapp on a Twitter thread with the keyword “unroll” to get a link to it.

Latest Threads Unrolled: