Infrastructure Documentation
This page provides a comprehensive breakdown of the exposed infrastructure documentation maintained by CharmingKitten operatives MOHAMMAD NAJAFLOO and MOHAMMADERFAN HAMIDIAREF.Unified Infrastructure Sheets
The exposed Excel sheets contain three primary categories of infrastructure documentation:0-SERVICE-Service.csv
Comprehensive service inventory including:- Domain registrations with registrar details
- Hosting services for operational infrastructure
- VPS providers used for attack servers
- SSL certificates for phishing sites
- Email accounts used for procurement
- Payment methods including cryptocurrency
- Renewal dates and subscription periods
1-NET-Sheet1.csv
Network infrastructure details containing:- Server IP addresses and assignments
- Login credentials for root access
- Control panel credentials (aaPanel, ISPMgr, etc.)
- Network configurations and routing details
- Internal system access information
0-SERVICE-payment BTC.csv
Cryptocurrency payment tracking:- Bitcoin wallet addresses used for purchases
- Payment transaction records
- Service provider payment details
- Financial operational security practices
Key Infrastructure Components
Operational Domains
The infrastructure sheets document numerous operational domains including:Moses Staff Operations
- moses-staff.io - Primary operation domain
- moses-staff.to - Alternative TLD
- moses-staff.se - European hosting
- Hosted on: TheOnionHost (TOR infrastructure)
- IPs exposed:
95.169.196.20,95.169.196.23,95.169.196.37
Phishing Infrastructure
- cavinet.org - Registered via Namecheap
- secnetdc.com - Modernizmir hosting
- tecret.com - TOR hosting
- dreamy-jobs.com - Job-themed phishing
- wazayif-halima.org - Arabic job phishing
- israel-talent.com / israel-talent.xyz - Targeted Israeli operations
Strategic Operations
- Abrahams Ax domain and infrastructure (abrahams-ax.se)
- Termite.nu - PRQ.se hosting with TOR backend
- BBM Movement infrastructure (bbmovements.com)
Procurement Identities
The infrastructure sheets expose numerous fake identities used for service procurement:Email Accounts
ProtonMail Accounts:[email protected]:CMEPZ9WMb8difTw[email protected]:5U5v6L0s[email protected]:MXQ8GL5Xqg3yEUV[email protected]:RN8OiQ6Y(%H0[email protected]:JHg&%asjh98*&^$dI&*^fd[email protected]:jgfk&^%hngGJ54*/s+*&%$hggfaD[email protected]:GF675%$^#@6-*GH678f-G[email protected]:6EF94ELUgAKdPqH[email protected]:15aB@gd52$kD#[email protected]:n!hnuec?'9*Pb2D[email protected]:Kh74QjGDq35NtvB
[email protected]:YHJ*^&R(&FY%RE%&*
Service Provider Accounts
The sheets document accounts with numerous service providers:- Namecheap - Domain registrar
- NameSilo - Domain registrar
- PRQ.se - Privacy-focused Swedish hosting
- TheOnionHost - TOR hosting services
- Impreza.host - Dark web hosting
- Modernizmir.net - Turkish hosting provider
- PQ.hosting - Privacy hosting
- CloudNS.net - DNS services
- SuperBitHost - SSL certificates
Server Credentials
Example Exposed Credentials
From the infrastructure sheets, numerous server credentials are exposed: Abrahams Ax Host:Attack Infrastructure Details
Tunnel Servers
The infrastructure includes multiple tunnel servers used for:- Maintaining persistence in compromised networks
- Bypassing network security controls
- Establishing reverse proxies using Plink (PuTTY)
- Command and control communications
File Storage Servers
Dedicated servers for:- Storing exfiltrated data
- Malware staging and distribution
- Internal file sharing between operatives
- Backup of operational materials
Phishing Infrastructure
Comprehensive phishing operations infrastructure:- Job-themed phishing sites (dreamy-jobs, wazayif-halima, israel-talent)
- Government impersonation domains
- SSL certificates from legitimate providers
- CloudDNS for DNS management and resilience
Internal Network Access
Communication Systems
Credentials for internal communication platforms: ISABELLE - Internal team communication- Used for day-to-day operational coordination
- Access credentials documented in infrastructure sheets
- VoIP capabilities for operational communications
- Integration with other team communication tools
- Used for sensitive operational discussions
- Accounts linked to procurement identities
Payment Infrastructure
The group uses various payment methods:- Bitcoin (BTC) - Primary cryptocurrency for anonymous payments
- Credit cards - Limited use through procurement identities
- PayPal - Occasional use for legitimate-appearing purchases
- Direct hosting billing - For established relationships
Operational Security Patterns
Analysis of the infrastructure reveals several patterns:Procurement Methods
- Layered identities - Fake personas with consistent email accounts
- Privacy-focused providers - Preference for PRQ, TheOnionHost, Impreza
- Cryptocurrency payments - Bitcoin for maximum anonymity
- ProtonMail accounts - Encrypted email for registrations
- TOR infrastructure - Dark web hosting for critical operations
Infrastructure Management
- Centralized documentation - Single Excel sheets for all infrastructure
- Credential reuse - Same procurement identities across multiple services
- Long-term planning - Multi-year domain registrations and renewals
- Backup systems - Redundant hosting and multiple TLDs
Security Failures
- Plaintext credentials - All passwords stored in cleartext
- Centralized documentation - Single point of failure for all infrastructure
- Limited compartmentalization - All infrastructure documented together
- Predictable patterns - Consistent naming and procurement methods
Timeline and Costs
The infrastructure sheets reveal:- Operational timeframe: 2022-2025 (documented periods)
- Domain costs: Ranging from 100 per domain
- Hosting costs: 140 per server per billing period
- SSL certificates: 21 per certificate
- Total documented infrastructure: Hundreds of domains and servers
Attribution Indicators
The infrastructure can be attributed to CharmingKitten through:- BELLACIAO C2 servers - IPs match exposed infrastructure
- CYCLOPS infrastructure - Overlapping server usage
- Known phishing campaigns - Domains match reported operations
- Moses Staff operations - Direct link to IRGC influence operations
- Personnel connection - Maintained by known IRGC operatives
Defensive Recommendations
Security teams should:- Block exposed IPs and domains - Add to threat intelligence feeds
- Hunt for related infrastructure - Look for similar patterns
- Monitor procurement identities - Track the exposed email accounts
- Update detection rules - Incorporate infrastructure indicators
- Share intelligence - Contribute findings to the community