Posted: 8 Min ReadSecurity Response

Mercenary.Amanda

Professional Hackers for Hire carried out large-scale credential spearphishing campaigns since at least 2013

After an in-depth investigation of a wave of phishing attacks by the threat actor Mercenary.Amanda, we conclude with high confidence that operators at an IT company based in India are responsible for performing account intrusions at the behest of private investigators and other clients. Mercenary.Amanda has been executing persistent credential spearphishing against a variety of targets in several industries around the globe going back to at least 2013. Symantec, now NortonLifeLock, gathered attacker data and telemetry that built a detailed picture of the phishing operation and campaigns from late 2017 to early 2020.

During that time, a total of 220 identified target organizations around the world with over 1,800 individual targeted email addresses were observed. Tight clusters of verticals in the phishing attacks suggest motives of financial, industrial as well as political espionage. The target list assembled during our investigation indicates campaigns against environmental advocacy groups, investment businesses and financial journalists, law firms, and political consulting, as well as dozens of individual targets that do not bunch into one of the categories.

The EFF published a blog titled “Phish for the Future” in September 2017 that detailed spearphishing attacks against two non-profit organizations that link to the actor that we track as “Mercenary.Amanda”. Our name for this group was derived from the apparent motivation of hacking for money and the email alias amanda.lovers[at]mail.com that was heavily used by the group to register phishing domains in 2017.

Closely tracking the attackers’ actions from domain registrations and server infrastructure allowed us to discover unique threat data including phishing kit source code, server log files, and documents that the operators left behind. The scale and breadth of the phishing operation against completely different industries, geographies and individuals implied that the actor contracted as a hack-for-hire operator. Following several operational mistakes by the attackers in 2017 and 2018, reasonable evidence was gathered to directly attribute the Mercenary.Amanda operations to an IT company based in India that advertises “Cyber Intelligence Services” to private investigators and corporations.

Hack for hire

While it is still possible to find and hire hackers on an underground forum like in a stereotypical movie script, today there is an industry of hack-for-hire companies with complex business relations. These companies advertise virtual “intelligence services” and are used by their clients to offshore the hacking of targets to countries with low risk of prosecution.

Collaboration & Notification

During the course of the Mercenary.Amanda investigation, the NortonLifeLock Labs team learned that researchers at the non-profit Citizen Lab were also working on analyzing the campaigns, leading to a research collaboration with mutual sharing of threat indicators and investigation results.

The report into the actor called “Dark Basin” by Citizen Lab can be found here: https://citizenlab.ca/2020/06/dark-basin-uncovering-a-massive-hack-for-hire-operation/.

NortonLifeLock has shared relevant technical information to law enforcement agencies in multiple countries to support respective investigations.

While a public report was held back until now, our team has been working to notify targets of Mercenary.Amanda phishing campaigns since early 2018.

Indicators

A list of domains used in the phishing attacks were produced as a joint effort by researchers at Citizen Lab and NortonLifeLock Labs and can be found here: https://github.com/nortonlifelock/indicators/blob/master/mercenary.amanda.txt.

Credential Phishing Operation

The phishing campaigns executed by Mercenary.Amanda have been following the same pattern: spearphishing emails are sent to individuals at the target organization that include a link ultimately leading to a credential phishing website operated by the attackers.

The email attacks we observed generally followed one of two techniques:

  • “standard” social engineering that mimics notifications from online services,
  • emails that are meant to persistently annoy or embarrass the victim.

While the mimicked notifications are enticing the victim to click, the latter approach aims to deliver something to the user that they do not want to see in their (work) email inbox: newsletter subscriptions or sign-ups for dating or adult websites. If the victim in this case clicks on an “unsubscribe” link, they will end up on a credential phishing website set up by the attackers.

Examples of Mercenary.Amanda email subjects
Examples of Mercenary.Amanda email subjects

While the mimicked notifications are enticing the victim to click, the latter approach aims to deliver something to the user that they do not want to see in their (work) email inbox: newsletter subscriptions or sign-ups for dating or adult websites. If the victim in this case clicks on an “unsubscribe” link, they will end up on a credential phishing website set up by the attackers.

The embedded links contained in the phishing emails do not directly point to the credential phishing pages. Instead, the attackers have set up their own URL shorteners infrastructure using the open source project “Phurl2”.

Screenshot: Mercenary.Amanda URL shortener “Powered by Phurl 2” on shortenurlservices.com
Screenshot: Mercenary.Amanda URL shortener “Powered by Phurl 2” on shortenurlservices.com

The effective landing URLs are customized for each attack and include information about the target in query parameters. Following is an example of Mercenary.Amanda landing URL:

https://tricktravelbooking.com/account.login.system.gmail.com.appredirects.portfoliofa.system-login.app-direct-signin-login.ppsecure-auth/?email=<redacted>&error=Sign in to continue&redirect=//support.google.com 

In this case the URL includes query parameters for the targeted email, an error message displayed on the phishing page, and a redirect URL that is used after credentials are entered.

Mercenary.Amanda has a large arsenal of phishing websites ready to deploy depending on the accounts targeted in the attack. During the investigation of the recent campaigns we found 68 website designs copying popular email & cloud services, social media accounts, and a number of customized phishing pages aiming at organization-specific services.

Mercenary.Amanda phishing designs and targeted services
Mercenary.Amanda phishing designs and targeted services

The respective websites also seem to have been localized depending on the victim’s origin. For Google Mail, for example, variants of the login page in the following languages were found: English, German, Spanish, French, Portuguese, Icelandic, Hebrew, Italian, Romanian, Russian, and Ukrainian.

Screenshot of a phishing page to steal two-factor backup codes of targeted Google Accounts
Screenshot of a phishing page to steal two-factor backup codes of targeted Google Accounts

In multiple cases the Mercenary.Amanda operators left behind ZIP archives that included server-side PHP phishing code and log files from previous deployments.

Screenshot: Logging code from publicly accessible ZIP archives on Mercenary.Amanda servers
Screenshot: Logging code from publicly accessible ZIP archives on Mercenary.Amanda servers

In 2016 and 2017 alone, the attackers registered 248 domains for the credential phishing operation. During that time, registrations were mainly done through two email addresses: amanda.lovers@mail.com and amanda.kruetner@mail.com. This changed in December 2017 when domain registrations were switched to privacy-protected at the provider.

Table: Mercenary.Amanda Domain Registrant Emails
Table: Mercenary.Amanda Domain Registrant Emails

Targets

Examining the PHP code of the open source URL shortener “Phurl2” (http://code.google.com/p/phurl/) used in the attacks brought an interesting detail to light: If the user does not specify a custom identifier, the application generates new shortened codes in ascending length and order using an internal character array (s. screenshot).

Screenshot: Phurl source code for generating shortened URLs
Screenshot: Phurl source code for generating shortened URLs

This discovery allowed us to enumerate the shortened URLs and capture a list a total of 5,311 unique landing URLs used in the attacks between 2017 and 2020. Embedded in these URLs were 1,886 target email addresses and hundreds of subdomains and paths where phishing pages were deployed.

Using this list of email addresses, we were able to establish a detailed picture of the phishing campaigns that Mercenary.Amanda executed during this time window. Over half of the addresses pointed to corporate email accounts and allowed us to identify 168 targeted organizations.

For email addresses observed in the enumeration more than once, the average length of attacks was 32 days, while the number of attacks per address averaged to roughly 5.

Many individuals were targeted using multiple email addresses, including: work email, university (alumni) email, personal email (Google Mail, etc.). In multiple cases, family members of targeted individuals were also targeted at the same time. 

Roughly 2/3 of the targeted organizations are based in the United States, with the remaining targets split between 13 other countries.

Geographical distribution of target organizations
Geographical distribution of target organizations

The verticals of the targeted organizations fall into several clusters, suggesting that Mercenary.Amanda launched campaigns against specific industries at the order of their clients.

Clustering of target verticals
Clustering of target verticals

Target Vertical: Financial Services

By far the largest campaign observed from Mercenary.Amanda was targeted at financial services companies. These small and medium-sized businesses all operate in the investment business including fund management, hedge funds, private equity, and financial analysis & advisory.

In the crosshairs were also six financial journalists, both independent as well as employed by global business media outlets. The apparent connection between these journalists were previous publications to investigate accounting irregularities at a German company.

Target Vertical: Law firms

The Mercenary.Amanda target list included a total of 13 renowned law firms in 4 countries: United States, Israel, France, and Switzerland.

Target Vertical: Political Consulting

Another cluster of targets builds around several consulting organizations in the United States that are in the business of public opinion research and political lobbying.

Target Vertical: Politicians

There are multiple clusters in the target list that map to concerted campaigns against politicians and union leaders in at least three countries.

Target Vertical: Non-profit

Another Mercenary.Amanda campaign is aimed at non-profit organizations working on environmental advocacy & climate change policy in the United States and globally. A very detailed description of this campaign is included in the report by Citizen Lab.

Other Targets

There are still dozens of targeted organizations and individuals in the list that do not fall into one of the larger campaigns. This is consistent with the characterization of Mercenary.Amanda as a “hack for hire” actor and would explain the seemingly unconnected target clusters.

Attribution

In the course of the investigation we found several independent trails of evidence that point to an IT company based in India as the entity behind Mercenary.Amanda.

Logging Time Zone

The archives with PHP server code obtained from a Mercenary.Amanda phishing servers include an interesting snippet in the part responsible for logging victim visits.

Screenshot of PHP logging time zone code
Screenshot of PHP logging time zone code

As can be seen the code sets the default time zone for the PHP execution to Indian Standard Time (IST) which is only used in India & Sri Lanka.

Working Hours

Using telemetry of successfully blocked Mercenary.Amanda phishing emails, we were able to chart the times of day when emails were received. The timing is consistent with a workday in India.

Times of day when Mercenary.Amanda emails were received (UTC)
Times of day when Mercenary.Amanda emails were received (UTC)

Peerlyst Blog Post

In December 2016, a blog post about using HTTPS certificates in phishing pages was posted on the knowledge sharing platform Peerlyst. The author of the article identified himself as an “Information Security Analyst” at the company that we suspect to be connected with the Mercenary.Amanda phishing campaigns. One of the screenshots in the blog shows a fake Facebook login set up on the domain supportserviceonline[.]com for demonstration purposes.

Screenshot taken from Peerlyst post about using HTTPS certificates for phishing
Screenshot taken from Peerlyst post about using HTTPS certificates for phishing

While searching for indicators for this domain we found URLs submitted to the online security service VirusTotal that used the shortener service pushthisurl[.]com. This shortener domain was used in early 2017 to redirect to the Mercenary.Amanda phishing domain auditionregistrationonline[.]com.

Shortener Leaks

While analyzing the URLs yielded from enumerating shorteners used by Mercenary.Amanda, a number of links were not used to link credential phishing websites. Apparently, the operators used the shortener to exchange URLs including:

  • Target research (LinkedIn profiles)
  • Links to public cloud storage folders with phishing kits
  • Viral videos in Hindi
  • Links to products on Indian e-commerce portals

In January 2018, several links appeared on the shortener pointing to listings jobs connected to “offensive security”. This was followed by another public link to cloud storage that included a personal resume apparently stored by one of the operators.

Responsibilities listed on resume leaked through Mercenary.Amanda URL shortener
Responsibilities listed on resume leaked through Mercenary.Amanda URL shortener

The resume matched an employee of the IT company in the role of “Information Security Analyst” that is linked with high confidence to the campaigns executed by Mercenary.Amanda. The responsibilities listed for their position in the resume distinctively match the phishing operation. 

NortonLifeLock Labs™ is the cornerstone of NortonLifeLock’s thought leadership in Cyber Safety, leading the company’s future technology and guiding the consumer cybersecurity industry around the globe. The Labs team, sitting within the office of the CTO,  includes leading threat and security researchers aimed at protecting customers against known and new threats, and delivering consumer-focused innovation in the space of security, privacy and identity.  Through these efforts, we continually improve our industry-leading protection and detection capabilities to help keep consumers Cyber Safe, while also delivering innovative prototypes with test-friendly features so adventurous users can learn and offer feedback.
Copyright © 2020 NortonLifeLock Inc. All rights reserved. NortonLifeLock, the NortonLifeLock Logo, the Checkmark Logo, Norton, LifeLock, and the LockMan Logo are trademarks or registered trademarks of NortonLifeLock Inc. or its affiliates in the United States and other countries. Other names may be trademarks of their respective owners.

About the Author

Norton Labs

Global Innovation & Research

Norton Lab’s research on Cyber Safety influences future technology and impacts the consumer cybersecurity industry worldwide. The Labs team includes top threat and security researchers who work to protect consumers from known and new threats.

Want to comment on this post?

We encourage you to share your thoughts on your favorite social platform.