A Rap Beef

KC7Cyber's introductory case, serving as a basic tutorial. Players assume the role of a cybersecurity analyst working for OWL Records. One of their flagship artists, Dwake, got embroiled in a beef against a rival record label's rapper, Present. Despite its short length and simplicity, it's still a pretty good example of how phishing works and what may motivate threat actors and the people who hire their unscrupulous services.

Sections

Section 1 - Enough Beef for a Burger

Following the escalating rap feud between our lead rapper Dwake and Dollar Currency Records' (DCR) Present, a trusted cybersecurity contact alerted me that we should expect a cyberattack by threat actors related to this feud, and that they heard a rumor of IP address 18.66.52.227 being used for reconnaisance.

Using this information, I looked up any queries made against our website.

InboundNetworkEvents
| where src_ip == "18.66.52.227"
| where timestamp <= datetime(2024-04-11)
//simply because the game's case develops in roughly "real time";
//i.e. at this point of the story we should only see the things from April 10th
Query results
timestamp method src_ip user_agent url status_code
2024-04-10 00:00:00.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/search=whats+Dwake%27s+email+address%3F 200
2024-04-10 10:50:35.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/search=OWL+Records+rapper+contact+info 200
2024-04-10 10:51:10.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/search=OWL+Records+artists+contact+details 200
2024-04-10 10:51:34.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/search=how+do+i+email+Dwake%3F%3F 200
2024-04-10 10:51:55.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/search=Dwake+booking+info+pls 200
2024-04-10 10:52:00.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/search=OWL+Records+artist+email+directory 200
2024-04-10 10:52:02.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/search=can+i+book+Dwake+for+a+party%3F 200
2024-04-10 10:52:38.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/search=why+is+Dwake+music+much+soo+trasshhhh 200
2024-04-10 10:53:07.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/artists/Dwake/ 200
2024-04-10 10:53:42.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/artists/email_contacts/ 200
2024-04-10 10:54:15.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/artists/booking_info/ 200
2024-04-10 10:55:08.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/events/OWLRecords_concerts_2024/ 200
2024-04-10 10:55:56.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/marketing/artist_profiles/ 200
2024-04-10 10:56:30.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/marketing/press_releases/ 200
2024-04-10 10:57:03.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/legal/contact_us/ 200
2024-04-10 10:57:47.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/account/reset-password?username=dwaubrey&email=dwake_audrey@owl-records.com 200
2024-04-10 11:56:47.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/support/request-password-reset?username=dwaubrey&reason=Forgot+my+password 200
2024-04-10 12:53:47.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/account/security-questions?username=dwaubrey 200
2024-04-10 13:02:47.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/account/security-questions?question_1=mother's+maiden+name&answer_1=Washington&question_2=first+pet's+name&answer_2=Fluffy 200

Indeed, said IP address accessed our network on April 10th in order to execute reconnaisance search queries looking for information on artists' contact info, company press releases, concerts, and specifically info on how to book or contact Dwake.

Since Lead Rapper Dwake is evidently the focus of the threat actors' attention, I'll priorize examining him. This attack seems to be simply compromised credentials, rather than devices (e.g. installation of malware).

OWL Records' password reset process requires an email and solving previously-established static security questions. The attackers, masquerading as Dwake, requested a password reset and succesfully entered his security questions.

https://owl-records.com/account/security-questions?question_1=mother's+maiden+name&answer_1=Washington&question_2=first+pet's+name&answer_2=Fluffy

Dwake inadvertely leaked the answers in a verse dissing Present that went viral recently.

Yo, Present, you don't know where I'm from,
Got the Washington name from my mom's side, son.
It makes sense why they call you present
Cause you're so easy to beat, its pretty much a gift

Used to play with little Fluffy, now I'm runnin' with the wolves,
You say you're on top, but I'm breakin' all the rules.
I'm on that next level, you're stuck in the past,
with those weak beats you won't last.

After succesfully resetting Dwake's corporate email password, the threat actors then resetted his Instagram password, taking it over and defacing his profile with embarrassing images and statements the following day (April 11th).

Section 2 - Less Beef, More Phish

Between Present's information being made available on BreachForums if he did not retire in 30 days and/or paid up 10M USD (reports conflict) and a tip from the same trusted contact, I decided to focus on possible phishing attempts against OWL Records employees from the same threat actor, which is suspected to be related to Dollar Currency Records in some way. For this portion of the investigation, I've decided to start by looking at any new inbound network events since the first signs of reconnaisance in early April.

InboundNetworkEvents
| where src_ip == "18.66.52.227"
| where timestamp >= datetime(2024-04-11)
Query results
timestamp method src_ip user_agent url status_code
2024-04-11 10:25:28.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/mail?user=nilane/search?query=scandal 200
2024-04-11 10:25:38.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/mail?user=nilane/search?query=confidential 200
2024-04-11 10:25:50.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/mail?user=icblake/search?query=scandal 200
2024-04-11 10:25:57.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/mail?user=icblake/search?query=confidential 200
2024-04-11 10:26:17.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/mail?user=nilane/search?query=leak 200
2024-04-11 10:26:18.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/mail?user=icblake/search?query=leak 200
2024-04-11 10:26:37.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/mail?user=nilane/search?query=secret 200
2024-04-11 10:26:56.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/mail?user=icblake/search?query=secret 200
2024-04-11 10:27:18.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/mail?user=nilane/search?query=sensitive 200
2024-04-11 10:27:20.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/mail?user=icblake/search?query=sensitive 200
2024-04-11 10:28:10.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/mail?user=icblake/drafts/ 200
2024-04-11 10:28:13.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/mail?user=nilane/drafts/ 200
2024-04-11 10:28:32.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/mail?user=nilane/internal_communications/meeting_notes/ 200
2024-04-11 10:28:41.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/mail?user=icblake/internal_communications/meeting_notes/ 200
2024-04-11 10:29:20.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/mail?user=nilane/internal_communications/private_emails/ 200
2024-04-11 10:29:24.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/mail?user=icblake/internal_communications/private_emails/ 200
2024-04-11 10:29:57.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/mail?user=nilane/internal_communications/employee_complaints/ 200
2024-04-11 10:30:14.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/mail?user=icblake/internal_communications/employee_complaints/ 200
2024-04-15 14:44:25.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/mail?user=jaknight/search?query=scandal 200
2024-04-15 14:44:45.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/mail?user=jaknight/search?query=confidential 200
2024-04-15 14:44:49.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/mail?user=jaknight/search?query=leak 200
2024-04-15 14:45:34.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/mail?user=lizee/search?query=scandal 200
2024-04-15 14:45:38.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/mail?user=jaknight/search?query=secret 200
2024-04-15 14:45:39.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/mail?user=jaknight/search?query=sensitive 200
2024-04-15 14:45:45.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/mail?user=jaknight/drafts/ 200
2024-04-15 14:46:17.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/mail?user=jaknight/internal_communications/meeting_notes/ 200
2024-04-15 14:46:31.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/mail?user=lizee/search?query=confidential 200
2024-04-15 14:46:46.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/mail?user=jaknight/internal_communications/private_emails/ 200
2024-04-15 14:47:09.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/mail?user=lizee/search?query=leak 200
2024-04-15 14:47:11.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/mail?user=jaknight/internal_communications/employee_complaints/ 200
2024-04-15 14:47:26.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/mail?user=lizee/search?query=secret 200
2024-04-15 14:48:08.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/mail?user=lizee/search?query=sensitive 200
2024-04-15 14:48:21.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/mail?user=lizee/drafts/ 200
2024-04-15 14:49:20.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/mail?user=lizee/internal_communications/meeting_notes/ 200
2024-04-15 14:50:11.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/mail?user=lizee/internal_communications/private_emails/ 200
2024-04-15 14:51:06.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/mail?user=lizee/internal_communications/employee_complaints/ 200
2024-04-16 09:49:19.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/mail?user=snthompson/search?query=scandal 200
2024-04-16 09:49:30.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/mail?user=snthompson/search?query=confidential 200
2024-04-16 09:49:32.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/mail?user=dwaudrey/search?query=scandal 200
2024-04-16 09:49:33.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/mail?user=snthompson/search?query=leak 200
2024-04-16 09:50:04.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/mail?user=dwaudrey/search?query=confidential 200
2024-04-16 09:50:13.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/mail?user=dwaudrey/search?query=leak 200
2024-04-16 09:50:23.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/mail?user=dwaudrey/search?query=secret 200
2024-04-16 09:50:27.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/mail?user=dwaudrey/search?query=sensitive 200
2024-04-16 09:50:29.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/mail?user=snthompson/search?query=secret 200
2024-04-16 09:50:34.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/mail?user=snthompson/search?query=sensitive 200
2024-04-16 09:51:12.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/mail?user=dwaudrey/drafts/ 200
2024-04-16 09:51:26.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/mail?user=snthompson/drafts/ 200
2024-04-16 09:51:55.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/mail?user=snthompson/internal_communications/meeting_notes/ 200
2024-04-16 09:51:59.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/mail?user=dwaudrey/internal_communications/meeting_notes/ 200
2024-04-16 09:52:03.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/mail?user=snthompson/internal_communications/private_emails/ 200
2024-04-16 09:52:09.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/mail?user=dwaudrey/internal_communications/private_emails/ 200
2024-04-16 09:52:41.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/mail?user=dwaudrey/internal_communications/employee_complaints/ 200
2024-04-16 09:52:56.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/mail?user=snthompson/internal_communications/employee_complaints/ 200
2024-04-18 10:47:44.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/mail?user=jucole/search?query=scandal 200
2024-04-18 10:47:44.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/mail?user=chwest/search?query=scandal 200
2024-04-18 10:48:07.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/mail?user=chwest/search?query=confidential 200
2024-04-18 10:48:41.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/mail?user=jucole/search?query=confidential 200
2024-04-18 10:49:01.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/mail?user=chwest/search?query=leak 200
2024-04-18 10:49:07.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/mail?user=chwest/search?query=secret 200
2024-04-18 10:49:14.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/mail?user=jucole/search?query=leak 200
2024-04-18 10:49:27.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/mail?user=jucole/search?query=secret 200
2024-04-18 10:49:27.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/mail?user=chwest/search?query=sensitive 200
2024-04-18 10:49:55.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/mail?user=chwest/drafts/ 200
2024-04-18 10:50:15.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/mail?user=jucole/search?query=sensitive 200
2024-04-18 10:50:26.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/mail?user=chwest/internal_communications/meeting_notes/ 200
2024-04-18 10:51:01.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/mail?user=jucole/drafts/ 200
2024-04-18 10:51:10.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/mail?user=chwest/internal_communications/private_emails/ 200
2024-04-18 10:51:19.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/mail?user=jucole/internal_communications/meeting_notes/ 200
2024-04-18 10:51:21.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/mail?user=jucole/internal_communications/private_emails/ 200
2024-04-18 10:51:33.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/mail?user=chwest/internal_communications/employee_complaints/ 200
2024-04-18 10:51:51.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/mail?user=jucole/internal_communications/employee_complaints/ 200
2024-04-22 14:33:29.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/mail?user=drhill/search?query=scandal 200
2024-04-22 14:34:28.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/mail?user=drhill/search?query=confidential 200
2024-04-22 14:34:46.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/mail?user=drhill/search?query=leak 200
2024-04-22 14:35:13.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/mail?user=drhill/search?query=secret 200
2024-04-22 14:35:56.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/mail?user=drhill/search?query=sensitive 200
2024-04-22 14:36:53.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/mail?user=drhill/drafts/ 200
2024-04-22 14:37:39.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/mail?user=drhill/internal_communications/meeting_notes/ 200
2024-04-22 14:38:16.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/mail?user=drhill/internal_communications/private_emails/ 200
2024-04-22 14:38:25.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/mail?user=drhill/internal_communications/employee_complaints/ 200
2024-04-26 13:16:49.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/mail?user=lowhite/search?query=scandal 200
2024-04-26 13:17:15.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/mail?user=lowhite/search?query=confidential 200
2024-04-26 13:18:06.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/mail?user=lowhite/search?query=leak 200
2024-04-26 13:18:39.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/mail?user=lowhite/search?query=secret 200
2024-04-26 13:19:10.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/mail?user=lowhite/search?query=sensitive 200
2024-04-26 13:19:29.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/mail?user=lowhite/drafts/ 200
2024-04-26 13:19:48.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/mail?user=lowhite/internal_communications/meeting_notes/ 200
2024-04-26 13:20:21.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/mail?user=lowhite/internal_communications/private_emails/ 200
2024-04-26 13:21:00.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/mail?user=lowhite/internal_communications/employee_complaints/ 200
2024-04-30 14:23:02.0000 GET 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) https://owl-records.com/mail/readmail?user=dwaudrey%40owl-records.com&mailbox_folder=Drafts&download=true&output=DwakesDirtySecrets.zip 200

There's some deeply troubling activity; it seems the threat actor managed to compromise multiple employee accounts, including Dwake's. Most troubling is a sign of data exfiltration from Dwake's account on April 30th. In order to confirm who was affected, I ran this query:

InboundNetworkEvents
| where src_ip == "18.66.52.227"
| where parse_url(url).['Query Parameters'] has "user"
| project user = extract( //see https://learn.microsoft.com/en-us/kusto/query/extract-function
    "^([a-zA-Z]+)", //regex pattern
    0, //capture group to extract
    tostring(parse_url(url).['Query Parameters'].["user"]), //source string
    typeof(string) //convert the extracted element to a string
)
//this extracts the username from the query parameters
//"https://owl-records.com/mail?user=lowhite[...]"
//becomes "lowhite[...]" via parse_url
//which becomes just "lowhite" via extract()
| distinct user
| lookup Employees on $left.user == $right.username
Query results:
user hire_date name user_agent ip_addr email_addr company_domain role hostname
chwest 2021-07-24 00:00:00.0000 Chance West Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/86.0.4240.110 Safari/537.36 10.10.0.18 chance_west@owl-records.com owl-records.com Rapper GJDR-DESKTOP
drhill 2021-05-31 00:00:00.0000 Drake Hill Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/85.0.4183.101 Safari/537.36 10.10.0.14 drake_hill@owl-records.com owl-records.com Rapper XWR2-LAPTOP
dwaudrey 2022-06-22 00:00:00.0000 Dwake Audrey Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/86.0.4240.183 Safari/537.36 10.10.0.5 dwake_audrey@owl-records.com owl-records.com Lead Rapper 8GZI-DESKTOP
icblake 2023-09-25 00:00:00.0000 Ice Blake Mozilla/5.0 (compatible; MSIE 8.0; Windows NT 5.1; Win64; x64; Trident/4.0) 10.10.0.24 ice_blake@owl-records.com owl-records.com Rapper IH9V-LAPTOP
jaknight 2022-05-29 00:00:00.0000 Jay Knight Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0) 10.10.0.8 jay_knight@owl-records.com owl-records.com Rapper HUVN-DESKTOP
jucole 2023-07-23 00:00:00.0000 Justin Cole Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/86.0.4240.183 Safari/537.36 10.10.0.29 justin_cole@owl-records.com owl-records.com Rapper 5HUM-MACHINE
lizee 2022-01-03 00:00:00.0000 Lil Zee Mozilla/5.0 (compatible; MSIE 8.0; Windows NT 6.3; Trident/4.0) 10.10.0.16 lil_zee@owl-records.com owl-records.com Rapper OIHK-LAPTOP
lowhite 2023-01-24 00:00:00.0000 Logic White Mozilla/5.0 (compatible; MSIE 8.0; Windows NT 5.1; Win64; x64; Trident/4.0) 10.10.0.20 logic_white@owl-records.com owl-records.com Rapper CUWN-MACHINE
nilane 2021-10-16 00:00:00.0000 Nikki Lane Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/85.0.4183.102 Safari/537.36 10.10.0.26 nikki_lane@owl-records.com owl-records.com Rapper UCVH-MACHINE
snthompson 2022-02-16 00:00:00.0000 Snoop Thompson Mozilla/5.0 (Windows NT 10.0; WOW64; rv:47.0) Gecko/20100101 Firefox/47.0 10.10.0.21 snoop_thompson@owl-records.com owl-records.com Rapper QGAC-LAPTOP

In order to retrace the threat actors' steps, I've decided to examine the known threat actor IP:

PassiveDns
| where ip == "18.66.52.227"
| distinct domain
Query results betterlyrics4u.com

This domain could be used for malicious purposes, such as stealing credentials or delivering malware via phishing emails. Looking up IP addresses associated with this domain reveals that the threat actors only made use of a single domain and a single IP addresses for this operation.

Email
| where * has "betterlyrics4u.com"
Query results
timestamp sender reply_to recipient subject verdict link
2024-04-10 14:45:28.0000 ghostwritersanonymous@protonmail.com ghostwritersanonymous@protonmail.com ice_blake@owl-records.com [EXTERNAL] Get FREE beats from the best hip hop writers in the game!!!! CLEAN https://betterlyrics4u.com/search/published/public/signin
2024-04-10 14:45:28.0000 ghostwritersanonymous@protonmail.com ghostwritersanonymous@protonmail.com nikki_lane@owl-records.com [EXTERNAL] Get FREE beats from the best hip hop writers in the game!!!! CLEAN https://betterlyrics4u.com/search/published/public/signin
2024-04-11 08:50:10.0000 wemakebeatz@gmail.com wemakebeatz@gmail.com jay_knight@owl-records.com [EXTERNAL] FW: Get FREE beats from the best hip hop writers in the game!!!! BLOCKED https://betterlyrics4u.com/modules/files/login.html
2024-04-11 08:50:10.0000 wemakebeatz@gmail.com wemakebeatz@gmail.com jay_knight@owl-records.com [EXTERNAL] FW: Get FREE beats from the best hip hop writers in the game!!!! BLOCKED https://betterlyrics4u.com/modules/files/login.html
2024-04-12 13:37:39.0000 ghostwritersanonymous@protonmail.com ghostwritersanonymous@protonmail.com lil_zee@owl-records.com [EXTERNAL] Need a ghostwriter for your next hit? CLEAN https://betterlyrics4u.com/share/files/auth
2024-04-12 13:37:39.0000 ghostwritersanonymous@protonmail.com ghostwritersanonymous@protonmail.com jay_knight@owl-records.com [EXTERNAL] Need a ghostwriter for your next hit? CLEAN https://betterlyrics4u.com/share/files/auth
2024-04-15 11:07:12.0000 ghostwritersanonymous@protonmail.com ghostwritersanonymous@protonmail.com dwake_audrey@owl-records.com [EXTERNAL] RE: Need a ghostwriter for your next hit? CLEAN http://betterlyrics4u.com/share/online/published/enter
2024-04-15 11:07:12.0000 ghostwritersanonymous@protonmail.com ghostwritersanonymous@protonmail.com snoop_thompson@owl-records.com [EXTERNAL] RE: Need a ghostwriter for your next hit? CLEAN http://betterlyrics4u.com/share/online/published/enter
2024-04-17 09:46:37.0000 ghostwritersanonymous@protonmail.com ghostwritersanonymous@protonmail.com justin_cole@owl-records.com [EXTERNAL] RE:RE: Need a ghostwriter for your next hit? CLEAN https://betterlyrics4u.com/online/modules/share/auth
2024-04-17 09:46:37.0000 ghostwritersanonymous@protonmail.com ghostwritersanonymous@protonmail.com chance_west@owl-records.com [EXTERNAL] RE:RE: Need a ghostwriter for your next hit? CLEAN https://betterlyrics4u.com/online/modules/share/auth
2024-04-19 13:45:27.0000 ghostwritersanonymous@protonmail.com ghostwritersanonymous@protonmail.com drake_hill@owl-records.com [EXTERNAL] Need a ghostwriter for your next hit? CLEAN http://betterlyrics4u.com/published/search/login
2024-04-19 13:45:27.0000 ghostwritersanonymous@protonmail.com ghostwritersanonymous@protonmail.com drake_hill@owl-records.com [EXTERNAL] Need a ghostwriter for your next hit? CLEAN http://betterlyrics4u.com/published/search/login
2024-04-25 14:36:33.0000 ghostwritersanonymous@protonmail.com ghostwritersanonymous@protonmail.com logic_white@owl-records.com [EXTERNAL] Get FREE beats from the best hip hop writers in the game!!!! CLEAN https://betterlyrics4u.com/files/modules/online/online/enter

Of 13 emails, only 2 intended for rapper Jay Knight, sent April 11th, were blocked. Jay Knight was eventually compromised by a third email sent April 12th.

    Email addresses:
  • ghostwritersanonymous@protonmail.com
  • wemakebeatz@gmail.com
    Sender:
  • Ghost Writer (sender name)
  • GhostWriter (signature)
    Subjects:
  • Need a ghostwriter for your next hit?
  • Get FREE beats from the best hip hop writers in the game!!!!
    Dates: 2024-04-10 to 2024-04-25
  • Dwake received the emails on 2024-04-19
  • Recipients: See [3]
  • Since all recipients had their accounts compromised, we can surmise that they clicked the malicious links and input their credentials. We can confirm dates and times with:

    InboundNetworkEvents
    | where src_ip == "18.66.52.227"
    | where parse_url(url).['Query Parameters'] has "user"
    | project user = extract( //see https://learn.microsoft.com/en-us/kusto/query/extract-function
        "^([a-zA-Z]+)", //regex pattern
        0, //capture group to extract
        tostring(parse_url(url).['Query Parameters'].["user"]), //source string
        typeof(string) //convert the extracted element to a string
    )
    | distinct user
    | lookup Employees on $left.user == $right.username
    | distinct name, ip_addr
    | lookup OutboundNetworkEvents on $left.ip_addr == $right.src_ip
    | where url has "betterlyrics4u.com"
    Query results
    name ip_addr timestamp method user_agent url
    Ice Blake 10.10.0.24 2024-04-10 15:00:28.0000 GET Mozilla/5.0 (compatible; MSIE 8.0; Windows NT 5.1; Win64; x64; Trident/4.0) https://betterlyrics4u.com/search/published/public/signin
    Nikki Lane 10.10.0.26 2024-04-10 15:07:28.0000 GET Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/85.0.4183.102 Safari/537.36 https://betterlyrics4u.com/search/published/public/signin
    Lil Zee 10.10.0.16 2024-04-12 13:43:39.0000 GET Mozilla/5.0 (compatible; MSIE 8.0; Windows NT 6.3; Trident/4.0) https://betterlyrics4u.com/share/files/auth
    Jay Knight 10.10.0.8 2024-04-12 13:46:39.0000 GET Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0) https://betterlyrics4u.com/share/files/auth
    Snoop Thompson 10.10.0.21 2024-04-15 11:53:12.0000 GET Mozilla/5.0 (Windows NT 10.0; WOW64; rv:47.0) Gecko/20100101 Firefox/47.0 http://betterlyrics4u.com/share/online/published/enter
    Dwake Audrey 10.10.0.5 2024-04-15 12:03:12.0000 GET Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/86.0.4240.183 Safari/537.36 http://betterlyrics4u.com/share/online/published/enter
    Justin Cole 10.10.0.29 2024-04-17 12:28:11.0000 GET Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/86.0.4240.183 Safari/537.36 https://betterlyrics4u.com/online/modules/share/auth
    Chance West 10.10.0.18 2024-04-17 12:38:39.0000 GET Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/86.0.4240.110 Safari/537.36 https://betterlyrics4u.com/online/modules/share/auth
    Drake Hill 10.10.0.14 2024-04-19 14:20:27.0000 GET Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/85.0.4183.101 Safari/537.36 http://betterlyrics4u.com/published/search/login
    Drake Hill 10.10.0.14 2024-04-19 14:26:27.0000 GET Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/85.0.4183.101 Safari/537.36 http://betterlyrics4u.com/published/search/login
    Logic White 10.10.0.20 2024-04-25 15:26:33.0000 GET Mozilla/5.0 (compatible; MSIE 8.0; Windows NT 5.1; Win64; x64; Trident/4.0) https://betterlyrics4u.com/files/modules/online/online/enter

    Since Dwake has been the focus of the feud with DCR's Present and is the sole lead rapper among the affected, I've decided to focus on his account. As previously noted, the sole sign of data exfiltration is from his account.

    Lead Rapper Dwake Audrey clicked on the malicious link on 2024-04-15.

    The phishing page requested OWL Records credentials to "Login to speak with GHOST WRITER". There is also, rather mysteriously, a "forgot password" button, and a SSO button if one is "already upgraded".

    To see when the threat actors sucessfully logged in to the employee accounts, I used:

    AuthenticationEvents
    | where src_ip == "18.66.52.227"
    | where result =~ "successful login"
    Query results
    timestamp hostname src_ip user_agent username result password_hash description
    2024-04-11 08:19:45.0000 MAIL-SERVER01 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) icblake Successful Login 890b6247b239c508db7d37b55cde5100 A user attempted to log in to their email
    2024-04-11 09:20:10.0000 MAIL-SERVER01 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) nilane Successful Login db06b7b9f5225709985fc2eb5383c19e A user attempted to log in to their email
    2024-04-15 08:35:12.0000 MAIL-SERVER01 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) lizee Successful Login 57ea3b202c25b045793c2abd4c76c772 A user attempted to log in to their email
    2024-04-15 09:48:20.0000 MAIL-SERVER01 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) jaknight Successful Login 527f871eafecb8b1284c75efc8635afb A user attempted to log in to their email
    2024-04-15 13:03:12.0000 MAIL-SERVER01 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) dwaudrey Successful Login 8f8d7baf48abc18667315891d4c6a507 A user attempted to log in to their email
    2024-04-15 13:53:12.0000 MAIL-SERVER01 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) snthompson Successful Login 11893432808689e6c50bb263a484c422 A user attempted to log in to their email
    2024-04-18 08:23:02.0000 MAIL-SERVER01 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) chwest Successful Login 5a6658825951a45e4e088fef51b32748 A user attempted to log in to their email
    2024-04-18 09:21:45.0000 MAIL-SERVER01 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) jucole Successful Login 4fdeed23399f09b969114110d4cd2fd8 A user attempted to log in to their email
    2024-04-22 09:47:47.0000 MAIL-SERVER01 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) drhill Successful Login b20ae54302e41dc9269996cfbf38b4e9 A user attempted to log in to their email
    2024-04-22 10:51:54.0000 MAIL-SERVER01 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) drhill Successful Login b20ae54302e41dc9269996cfbf38b4e9 A user attempted to log in to their email
    2024-04-26 08:54:38.0000 MAIL-SERVER01 18.66.52.227 Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 6.2; Trident/5.0) lowhite Successful Login d69e5e92f6b0acac7e6cba5e93d3e20d A user attempted to log in to their email

    Lead Rapper Dwake Audrey's account specifically was accessed once, on 2024-04-15 at 13:53:12.

    After compromising the artists, the threat actors searched for information stored in each compromised email account (see [2]); they made search queries for "secret", "confidential", "scandal", "leak", and "sensitive", along with looking through each artists' email drafts, the internal communications email folder and its meeting notes, private emails and employee complaints subfolders.

    In Dwake's case, they exfiltrated his private emails in a zip archive named "DwakesDirtySecrets.zip", downloaded directly to the attacker's device.

    In brief:

    1. The threat actor engaged in recon using IP address 18.66.52.227, focusing on Dwake's contact information.
    2. Having found his email address, the threat actor successfully answers the two static security questions, their answers having been inadvertely leaked by Dwake himself in his lyrics.
    3. The threat actor resets his password and uses his email account to "recover" and reset his Instagram's password, enabling defacement.
    4. The threat actor sends phishing emails offering "ghostwriting services" to 10 of DCR's rappers and a link to a fake login page; all ten click the links and submit their credentials.
    5. With unfettered access to the mailboxes, the threat actor exfiltrates information from Lead Rapper Dwake; there are no signs of exfiltration from the other compromised employees.

    The exfiltrated emails could be used for blackmail and extortion in the future; the immediate aftermath is that the feud--allegedly the source of these attacks--is resolved peacefully for the time being.

    While one can question Dwake's wisdom to include private information in his lyrics--lyrics dissing a rival, no less--I would argue the greater failure was OWL Records' deeply flawed knowledge-based authentication (KBA; security questions) for password resets.

    Despite the fact that KBA remains widespread, specially "static KBA" (shared secrets), the NIST no longer recommends their use. Furthermore, the questions given to OWL Records employees do not meet some important minimum standards such as requiring a minimum of four questions (Dwake got compromised with only two). While those standards might not necessarily apply to the specific case of a record label's internal corporate network, I think it's a good idea to consider them when evaluating this case.

    A great flaw of this system is that the questions given are frequenly a matter of public record that anyone can look up, are frequently lacking in specificity (so users probably set the answer to something generic and easily-guessable), or are things people may be compelled to share for one reason or another (should Dwake never speak of his dear childhood pet Fluffy?)

    Better than KBA/KBV would be if requesting a password reset required a MFA token, such as TOTP, PINs, or URL tokens sent through additional communication channels, such as their personal email account. Further, OWASP's Forgot Password Cheat Sheet recommends only using security questions as an extra layer complementing more robust verification methods, if at all; OWASP also has a legacy Security Questions Cheat Sheet that starts with a giant warning about how security questions are a terrible idea in this day and age. [...] there are no acceptable uses of security questions in secure software [...].

    In the case of Dwake's phish in section 2, there does not seem to be any form of MFA; much like the first time Dwake got compromised, the threat actor only needed access to basic details of his account in order to gain access. If there had been another factor to authenticate and if such a measure were enforced across all accounts, then the threat actor would've been stopped in their tracks, unable to compromise Dwake's (and other artists') accounts for espionage and data exfiltration.