An exposed .git folder let us dox a phishing campaign
Mood
excited
Sentiment
positive
Category
tech
Key topics
security
phishing
GitHub
Telegram
We took up to research it and because of clumsy decisions by the attacker we got their GitHub and their operational Telegram bot.
Screenshots: https://imgur.com/a/FTy4mrH
Sometimes the attacker incompetence can be a defender's best weapon ¯\_(ツ)_/¯
The phishing page was a standard clone of an "email", unbranded anf generic service. A bit of gobuster reconnaissance and we got the site's .git directory publicly accessible and listing its contents.
Inspecting of the requests also got us the first Telegram bot token. This is the digital equivalent of leaving the blueprints to your entire operation, including past versions and deleted files, lying on the front lawn.
We pulled the repository, found automated deployments and multiple fake pages with different hardcoded Telegram bot tokens and Chat IDs.
With the source code, repo and the active Telegram bot token, we filed detailed abuse reports:
- GitHub: We reported the repository containing the phishing kit's source code. It was taken down for violating TOS.
- Telegram: We reported the bot using the provided token and chat ID, leading to its removal.
- Hosting Provider: The malicious site was reported and taken offline.
Lesson learned? Never deploy a .git folder to production. Even if you are a criminal.
Acknowledgement: This was a collaborative effort by members of the BeyondMachines Discord community. The crowdsourced speed and collaboration helped us take this down very fast.
A phishing campaign was doxxed and taken down due to the attacker's mistake of leaving a .git folder publicly accessible, allowing the defenders to obtain sensitive information.
Snapshot generated from the HN discussion
Discussion Activity
No activity data yet
We're still syncing comments from Hacker News.
Generating AI Summary...
Analyzing up to 500 comments to identify key contributors and discussion patterns
No comments available in our database yet.
Comments are synced periodically from Hacker News.
Want the full context?
Jump to the original sources
Read the primary article or dive into the live Hacker News thread when you're ready.