Overview
Episode 2 includes extensive attack reports documenting Department 40’s cyberattack operations against various organizations across multiple countries. These reports demonstrate systematic targeting of government entities, civilian companies, and media organizations.Attack Infrastructure
AMEEN ALKHALIJ Server
The department operated the AMEEN ALKHALIJ server (ameen-alkhalij.nu) as part of their infrastructure:- Purpose: Recruitment website targeting former government and security employees from the United Arab Emirates
- Evidence: Complete server logs showing access patterns and operations
- Activity Period: Server logs from January 2025 showing ongoing operations
- Attack Vector: WordPress installation used as infrastructure component
Server Log Analysis
The server logs reveal:- Persistent scanning for WordPress vulnerabilities
- Multiple access attempts from global IP addresses
- Infrastructure setup for recruitment operations
- Coordination with other attack servers
ProxyShell Exploitation Campaign
Attack Method
The department extensively exploited ProxyShell vulnerabilities (CVE-2021-34473, CVE-2021-34523, CVE-2021-31207) in Microsoft Exchange servers to:- Gain initial access to target networks
- Deploy webshells for persistent access
- Extract sensitive information
- Establish command and control infrastructure
Webshell Deployment
Successful shell deployments were documented across multiple organizations:- Webshells deployed in
/owa/auth/directories - Webshells in
/aspnet_client/directories - Custom-named ASPX files for obfuscation
- Persistent backdoor access maintained
Attack Methodology
Initial Access
- Vulnerability Scanning: Identification of vulnerable Exchange servers
- Exploitation: ProxyShell exploitation to gain access
- Webshell Deployment: Installation of custom webshells
- Persistence: Maintaining access through multiple backdoors
Attack Tools
Evidence shows the use of:- Metasploit Framework: Modified ProxyShell exploit modules
- Custom Webshells: ASPX-based backdoors
- Password Brute-forcing: RDP and SMB credential attacks
- Network Scanning: Infrastructure reconnaissance
Command History Evidence
Thezsh_history.txt file reveals attacker operations:
Failed Attack Attempts
TheShell failed.txt file documents unsuccessful webshell deployments, showing:
- Attempted attacks across Austria, Australia, Azerbaijan, Germany, France, India, Israel, Korea, Turkey, and UK
- Multiple webshell deployment attempts that failed
- URLs to attempted webshell locations
- Evidence of wide-ranging attack campaigns
Examples of Failed Deployments
Austria:https://185.50.235.189/owa/auth/msfuj.aspxhttps://80.109.157.74/owa/auth/webclient.aspx
https://webmail.binagadioil.com/owa/auth/Vw8q1tdLy.aspxhttps://mail.karasuopco.com/owa/auth/fUMBz0mwHC.aspx
https://37.24.200.74/aspnet_client/system_web/webclient.aspxhttps://185.40.175.36/aspnet_client/spryc.aspx
https://192.116.238.153/owa/auth/dYeuy3CETD.aspxhttps://mail.prizma-hakirot.co.il/owa/auth/k0OaRqmtco7.aspx
Daily Work Reports
MJD Team Reports
Extensive daily work reports from the MJD team document:- Daily activity logs from September-October 2024 (Persian calendar 1403)
- Systematic tracking of work hours
- Attack progress documentation
- Monthly performance summaries
1403-06-25_MJD_DailyReport.pdfthrough1403-07-23_MJD_DailyReport.pdf- Monthly summary:
گزارش کار مهر- MJD.pdf - Entry/exit tracking:
entry_exit_form.pdf
HSN2 Team Reports
The HSN2 team also maintained daily reports:- Reports from August-September 2024 (1403-05-27 through 1403-06-03)
- Similar tracking methodology to MJD team
- Coordinated operations with other teams
CVE Analysis Reports
Department 40 conducted analysis of new vulnerabilities:CVE-2024-1709 Analysis
Two reports documenting analysis and exploitation:CVE-2024-1709 - گزارش بررسی و_REDACTED.pdf(4.2 MB)CVE-2024-1709 - (امارت - ترکی_REDACTED.pdf(966 KB)
- Active vulnerability research capabilities
- Target planning for UAE and Turkey
- Weaponization of recent CVEs
Monthly Performance Reports
Three monthly performance reports from February 2023 (Bahman 1401):02120dcf3b263702028a0441881d339ee4ff8e15_گزارش عملکرد ماهانه4037e9382a99fdd96fe93eb0fd4380eea695bd3a_گزارش عملکرد ماهانهe8ed42d00168744e408dd53c795008c76ee788e6_گزارش عملکرد ماهانه
Additional Reports
Winter Operations Summary
گزارش عملکرد زمستان - 1403 Final.pdf(3.8 MB)- Comprehensive summary of winter 2024 operations
Initial Access Report
گزارش اولیه دسترسی (wise.pdf(822 KB)- Documentation of initial access operations
Services Documentation
services.pdf(2.4 MB)- Infrastructure and services documentation
Key Findings
The attack reports reveal:- Systematic Operations: Highly organized attack campaigns with daily reporting
- Multi-Country Targeting: Coordinated attacks across dozens of countries
- Professional Infrastructure: Dedicated servers for recruitment and attacks
- Vulnerability Research: Active analysis of new CVEs for exploitation
- Persistent Access: Multiple webshell deployments for long-term access
- Team Coordination: Multiple teams (MJD, HSN2) working in parallel