NordVPN Promotion

Home / Blogs

What Are the Connections to Identified Hafnium Malicious IP Addresses?

Cyber attackers are very skilled at infiltration. They’d find ways into a house through cracks and holes that the homeowner doesn’t know about. Analogically speaking, that’s what the new cyber attack group dubbed “Hafnium” did when they identified several zero-day Microsoft Exchange vulnerabilities to get into target networks.

With thousands of users for every Microsoft Exchange server, the attack has far-reaching implications. First, it establishes the presence of a new threat actor group in town. What else could they be up to?

Second, the zero-day attack calls for immediate patches for affected organizations. Finally, it brought to light another essential question: What other zero-day vulnerabilities are there?

A Deep Look into the Hafnium IP Addresses

Several cybersecurity experts and organizations, including Malwarebytes and Info Tech, released the attack’s technical details. VirusTotal also mapped out several nodes related to the Hafnium threat actor group.

From all these sources, we extracted 92 malicious IP addresses, then used domain and IP intelligence sources to glean insights into the following:

  • IP netblock ownership
  • IP geolocation
  • Domain associations
IP Netblock Ownership

Tracing which IP netblock a malicious IP address belongs to can help identify the entities administering it. Such knowledge could make the takedown process easier.

The Autonomous System (AS) names and NETNAMEs of the Hafnium IP addresses indicate most of them are owned by cloud service providers and telecommunications companies.

In fact, eight of the top 10 entities associated with the 92 IP addresses are part of the telecommunications industry. One is a cloud computing company, Digital Ocean, which also manages 26% of the blacklisted IP addresses in this study. Another owner is a tech solutions company.

IP Geolocation

The Hafnium group is believed to be from China, although they lease servers in the U.S. as well. IP geolocation details support this, as 21 of the IP addresses are geolocated in China, and several of the top 10 geolocations are neighboring countries. Still, attributing the attack to threat actors from a particular country is not straightforward.

Domain Associations

Passive Domain Name System (DNS) data suggests that at least 25% of the IP addresses are dedicated, having only 1-11 associated domains each.

One noteworthy IP address is 211[.]56[.]98[.]146, which has been identified as an indicator of compromise (IoC) related to the Microsoft Exchange Server zero-day attack. Only one subdomain resolves to the IP address—c3kr[.]simonxu[.]cc.

While this subdomain and its root domain have been tagged “malicious” on VirusTotal, some simonxu[.]cc subdomains are still deemed clean. The following are a few of the subdomains, along with the IP addresses returned by DNS lookups:

SubdomainIP Address from DNS LookupIP Netblock
dzhsh[.]simonxu[.]cc114[.]80[.]157[.]59114[.]80[.]0[.]0 – 114[.]80[.]255[.]255
hongkong[.]simonxu[.]cc119[.]8[.]100[.]78119[.]8[.]96[.]0 – 119[.]8[.]127[.]255
japan[.]simonxu[.]cc180[.]149[.]230[.]45180[.]149[.]230[.]0 – 180[.]149[.]230[.]255
ocservjp[.]simonxu[.]cc180[.]149[.]230[.]45180[.]149[.]230[.]0 – 180[.]149[.]230[.]255
proxy[.]simonxu[.]cc180[.]149[.]230[.]45180[.]149[.]230[.]0 – 180[.]149[.]230[.]255
proxy[.]east2south[.]simonxu[.]cc122[.]112[.]205[.]150122[.]112[.]200[.]0 – 122[.]112[.]207[.]255

These IP addresses and their netblocks are not among the initial Hafnium-related addresses under study, but they seem to share similar characteristics, such as being dedicated and assigned to telecommunications companies.


Aside from applying vulnerability patches as they are made available, security teams could, if applicable, limit or altogether prevent network communications with unknown and suspicious IP addresses. Such an action may be prudent, especially since the Hafnium cyber attack group could have more IP addresses and domains in their arsenal, besides those already published.

BLACK FRIDAY DISCOUNT - CircleID x NordVPN
Get NordVPN  [74% +3 extra months, from $2.99/month]
By Jonathan Zhang, Founder and CEO of WhoisXMLAPI & ThreatIntelligencePlatform.com

Filed Under

Comments

Comment Title:

  Notify me of follow-up comments

We encourage you to post comments and engage in discussions that advance this post through relevant opinion, anecdotes, links and data. If you see a comment that you believe is irrelevant or inappropriate, you can report it using the link at the end of each comment. Views expressed in the comments do not represent those of CircleID. For more information on our comment policy, see Codes of Conduct.

CircleID Newsletter The Weekly Wrap

More and more professionals are choosing to publish critical posts on CircleID from all corners of the Internet industry. If you find it hard to keep up daily, consider subscribing to our weekly digest. We will provide you a convenient summary report once a week sent directly to your inbox. It's a quick and easy read.

Related

Topics

IPv4 Markets

Sponsored byIPv4.Global

Domain Names

Sponsored byVerisign

DNS

Sponsored byDNIB.com

Threat Intelligence

Sponsored byWhoisXML API

Cybersecurity

Sponsored byVerisign

Brand Protection

Sponsored byCSC

New TLDs

Sponsored byRadix

NordVPN Promotion