KeyBase first came to my attention in mid 2015, a favoured tool of those with little technical capability, and those known as ' skidz'. I first wrote about in July 2015, noting some of the basic capabilities here http://www.brycampbell.co.uk/new-blog/2015/7/14/keybase-malware
Palo Alto have recently produced excellent research together with IOC's which go in to great detail, you should read it. http://researchcenter.paloaltonetworks.com/2016/02/keybase-threat-grows-despite-public-takedown-a-picture-is-worth-a-thousand-words/
In essence it steals sensitive credentials, here is some of the PHP used to steal the data:
A lot of thanks should go to the great work that @malwarehunterteam, @James_MHT and @Techhelplist are doing to promote the discovery and takedowns of these panels. I have privately and legally, observed some of the content that is being stolen by the criminals and it's extremely sensitive material.
KeyBase, as mentioned is a infostealer, and the Palo Alto write up discusses its capabilities in much greater detail than i will.
KeyBase arrives by spoofed mails, often as disguised as office documents, or with double extensions, here is an example.
Hash & sample available here - courtesy of Invincea
So, the research and analysis went on, the content became richer.Researchers in certain circles are critically aware of a known bug in KeyBase and further bugs add to the information being less than secure, this is highlighted in the Palo Alto article, and all information is secured was done so legally.
The comical aspect which prompted this post was the fact that KeyBase itself is not advanced, it is very noisy, it does not encrypt data in network communications, perimeter security will detect its patterns as it attempts to exfiltrate any sensitive information demonstrated by the image above with 'Window title' in the packet.
The panels themselves are usually not configured correctly, they are almost 'plug and play', and this is confirmed by the research done by Palo Alto, the screenshots below are all taken from a panel which was completely unsecured and available to view on the open web.
We quickly discovered that the 'miscreants' behind these panels had infected themselves, the reason for this is clear. The interesting screenshots including Facebook profiles, and messages between the gangs.
So, critically. You'll note i have not obscured any content. Joseph Ikems - we've extracted content which was captured from his own panel, or the friend he's discussing the 'problems with the panel' with.
However, it's probably more likely it was jeffjeff, as the panel was closely named to this in terms of domain registration. The reasons for this are shown in part by the content below.
We have email. So, we've managed, or should i say he has given us his email. The above screenshot shows the miscreant logged into a yahoo mail account under the name ' dixion.tony', lets assume its firstname.lastname@example.org.
The most advanced threat intelligence platform in the world agrees, this is potentially our guy, he has history and people are complaining about being scammed.
This begun to get interesting as the exposed screenshots yielded more information, this time as the criminals begun to actively target industries, setting up fake domains and fake businesses in an attempt to extort legitimate businesses once they had been compromised.
The targets included in the spam campaigns had been crafted to appear from a fake company as shown below, 'Jinatrading LLC'
Looks to be having some 'issues'.
As the content begun to become more peculiar so did the screenshots captured from the panel. At one point Tony decided to log into Facebook.
The total number of screenshots from Tony's own machines exceed 90, and the total of screenshots is over 200. Attempting to alert the victims proved fruitless sadly, a lot of them never responded.
The lessons learned, and not published here are that the criminals behind this enterprise persisted to infect themselves with their own stealer, and fail to understand the technology they worked with, the details here are approximately 20% of what was extracted, including fake company registrations to appear legitimate.
An aggressive financial motive was clear, and some element of muling was involved. The screenshots below show searches for how to clear money or 'cash out'.
Detailed IOCs are available upon request, some of the artefacts are available to search via Hash and are listed on VT.