Listen to this Post
2025-01-08
In the world of cybersecurity, shadow IT—unauthorized or forgotten systems lurking within corporate networks—has long been a headache for chief information security officers (CISOs). These forgotten assets often become gateways for data breaches. But what if the tables were turned? What if malicious hackers, the very perpetrators of cyberattacks, were also victims of their own sloppy practices? New research from watchTowr Labs reveals that hackers, too, suffer from a shadow IT problem, and their carelessness can be exploited to turn their own tools against them.
—
The Exploitation of Hackers’ Abandoned Infrastructure
watchTowr Labs, led by CEO Benjamin Harris and researcher Aliz Hammond, has uncovered a fascinating vulnerability in the world of cybercrime: hackers’ reliance on abandoned infrastructure and expired domains. By purchasing these domains for as little as $20, the researchers were able to hijack thousands of live backdoors used by malicious actors. These backdoors, often left behind by hacking groups, allowed watchTowr to monitor compromised hosts and even gain theoretical control over them.
The researchers discovered that attackers frequently leave behind old web shells—small pieces of code that can be used to access compromised systems. While these shells are typically password-protected, watchTowr used creative techniques to overwrite the hardcoded passwords and gain access. By purchasing expired domains referenced in these shells, they redirected traffic to their own logging servers, capturing valuable data without engaging in illegal activity.
Among the victims identified were government organizations in Bangladesh, China, and Nigeria, as well as universities in China, Thailand, and South Korea. In total, watchTowr claims to have accessed 4,000 backdoors, with some linked to thousands of compromised domains. For example, a single backdoor tied to the infamous Lazarus Group was connected to over 3,900 unique domains.
The majority of the attacker traffic observed by watchTowr originated from Chinese and Hong Kong IP addresses, targeting Chinese entities. However, the researchers caution that this could simply reflect their sample size, as hackers often use proxy infrastructure in various countries to mask their activities.
To ensure ethical boundaries, watchTowr avoided manipulating systems or responding with malicious code. They also obscured compromised hostnames and technical details before handing over the purchased domains to the Shadowserver Foundation, a nonprofit that transformed them into sinkholes to neutralize the threat.
—
What Undercode Say:
The findings from watchTowr Labs offer a rare glimpse into the often-overlooked vulnerabilities within the hacking community. While much attention is paid to the sophistication of cybercriminals, this research highlights a critical flaw: their reliance on outdated, abandoned infrastructure. This oversight not only exposes their operations but also provides an opportunity for defenders to level the playing field.
1. The Irony of Hackers’ Shadow IT
Just as enterprises struggle with shadow IT, hackers face similar challenges. The difference lies in the stakes: while businesses risk data breaches, hackers risk exposure and operational disruption. The fact that attackers leave behind expired domains and unprotected web shells suggests a lack of operational discipline. This negligence undermines the myth of invincibility often associated with advanced hacking groups.
2. The Power of Low-Cost Countermeasures
One of the most striking aspects of this research is the simplicity and affordability of the countermeasures. For just $20, watchTowr was able to purchase expired domains and gain access to critical infrastructure. This demonstrates that effective cybersecurity doesn’t always require massive budgets or cutting-edge technology. Sometimes, creativity and resourcefulness can yield significant results.
3. The Broader Implications for Cybersecurity
The research underscores the importance of maintaining and monitoring digital infrastructure, even for malicious actors. As the internet continues to age, the problem of abandoned and expired infrastructure will only grow. This presents both a challenge and an opportunity for defenders. By identifying and exploiting these vulnerabilities, cybersecurity professionals can disrupt hacking operations and gather valuable intelligence.
4. Ethical Considerations and Legal Boundaries
watchTowr’s approach also raises important ethical questions. While the researchers were careful to avoid illegal activities, their work highlights the fine line between offensive and defensive cybersecurity practices. As the industry grapples with these issues, it’s crucial to establish clear guidelines for ethical hacking and research.
5. A Level Playing Field?
The study suggests that the cybersecurity landscape may be more balanced than previously thought. Attackers, like defenders, are prone to mistakes and oversights. This realization can empower defenders to adopt a more proactive stance, leveraging attackers’ weaknesses to their advantage.
—
Conclusion
The shadow IT problem is no longer exclusive to legitimate enterprises. As watchTowr Labs has demonstrated, malicious hackers are equally susceptible to the pitfalls of abandoned infrastructure and expired domains. By exploiting these vulnerabilities, defenders can gain valuable insights and disrupt cybercriminal operations. This research serves as a reminder that even the most sophisticated attackers are not infallible—and that sometimes, a $20 domain purchase can be the key to turning the tide in the fight against cybercrime.
References:
Reported By: Cyberscoop.com
https://www.reddit.com/r/AskReddit
Wikipedia: https://www.wikipedia.org
Undercode AI: https://ai.undercodetesting.com
Image Source:
OpenAI: https://craiyon.com
Undercode AI DI v2: https://ai.undercode.help