Part 2: The NEKOBYTE Proxy Farm Tripled — 1,004 AiTM Servers, a Crimean Occupation IT Operative, and New Targets Including kernel.org and Zoom
Six weeks after our initial report documented 300+ MITM proxies, we rescanned. AS206134 alone now hosts 999. The operator built Crimea's IT infrastructure for Russia.
In March 2026, we published our initial investigation into NEKOBYTE INTERNATIONAL LIMITED — a bulletproof hosting operation running 300+ MITM proxy servers serving stolen TLS certificates for Apple, Google, GitHub, Microsoft, and dozens more, backed by 22 autonomous systems, 13+ UK shell companies directed by teenage Russian nominees, a Russian Government "Trusted Sub CA" certificate, and VK-issued internal CA certs with 30-year validity.
Six weeks later, a community tip brought us back to the same infrastructure. We rescanned. The operation has tripled. A single ASN — AS206134 — now hosts 1,004 confirmed AiTM proxy servers, up from approximately 300 across the entire network in March. New targets include Zoom, Twitch, kernel.org, MEGA, IMDB, and the German domain registry DENIC — while previously identified targets like GitHub, Microsoft, and Apple have seen massive proxy count increases. And we found a new attribution lead connecting the operation to a Crimean IT operative who built infrastructure for the Russian occupation government.
Across 34 subnets announced by a 3-month-old bulletproof ASN, we found 1,004 transparent AiTM proxy servers impersonating 40+ services including GitHub (128 proxies), Microsoft (142), Apple (98), VK, Yandex, Yahoo, Amazon, Oracle, Tesla, Intel, Samsung, Reddit, Zoom, WhatsApp, Wikipedia, and the Linux kernel source distribution infrastructure. Each proxy serves the target's real, CA-signed TLS certificate and relays traffic transparently — making interception invisible to the victim.
The ASN is AS206134 (NEKO-AS), operated by NEKOBYTE INTERNATIONAL LIMITED — a UK shell company registered at a known formation agent address. The director is Sergei Satsukevich — a 20-year-old Russian national (born April 2005), consistent with the teenage nominee director pattern documented in our initial report. The operating entity is IT-Garage LLC, registered in Sevastopol, Crimea at the same address as Alvion Europe — a company run by Igor Tsimbal, who built Crimea's IT infrastructure for the Russian occupation government and served as IT advisor to the self-proclaimed head of Sevastopol. Tsimbal appears in Ukraine's Myrotvorets database of individuals deemed threats to national security.
One proxy server was found serving a self-signed certificate from "VK interm CA" — a Russian deep packet inspection certificate valid from 2022 to 2052. This is not a commercial hosting operation.
Table of Contents
- How We Found It
- The Proxy Mechanism
- Verification: Every Proxy Is Fraudulent
- The Full Target List: 1,004 Proxies, 40+ Services
- Infrastructure: NEKOBYTE / IT-Garage
- Attribution: From Sevastopol to London
- The Alvion Connection: IT Advisor to the Occupation
- The Russian DPI Certificate
- Corporate Shell Structure
- Threat Assessment
- What This Report Adds
- IOC Table
- Recommendations
How We Found It
The trail started with a community tip. @Fact_Finder03 flagged an open Auraboros C2 panel at 174.138.43[.]25. Separately, @malwrhunterteam flagged 2.26.116[.]156 as threat infrastructure on the same day. We investigated and found the IP hosted on AS206134 (NEKO-AS / NEKOBYTE INTERNATIONAL LIMITED).
While probing other IPs on the same ASN, we discovered that 147.45.210[.]100 was serving a valid TLS certificate for github.com — issued by Sectigo, with the same serial number as the real certificate. Shodan had indexed the IP with hostnames github.com, www.github.com, and vm23588.it-garage.network.
We checked the .100 address on every other prefix the ASN announces. More proxies appeared. We then scanned every IP across all 34 announced subnets — approximately 8,700 addresses. The results were staggering.
The Proxy Mechanism
Each proxy performs TLS passthrough with SNI-based routing using a Traefik reverse proxy stack (confirmed via leaked default certificates on port 8443). The proxy presents the target's real, CA-signed certificate and relays traffic bidirectionally.
We verified this by comparing certificate serial numbers:
GitHub proxy at 2.26.16[.]79:
| Field | Proxy | Real github.com |
|---|---|---|
| Serial | 1DC289C1EADAFB04E9D1CF53D5D72253 | 1DC289C1EADAFB04E9D1CF53D5D72253 |
| Issuer | Sectigo Public Server Authentication CA DV E36 | Sectigo Public Server Authentication CA DV E36 |
| Subject | CN=github.com | CN=github.com |
Identical. The proxy relays the TLS handshake to the real server, which returns its genuine certificate. The proxy forwards this to the client. Certificate validation passes. Certificate pinning passes. The victim sees no warning.
The proxies are SNI-aware. The GitHub proxy at 147.45.210[.]100 returned different certificates based on Server Name Indication:
| SNI | Certificate Served |
|---|---|
github.com | CN=github.com (Sectigo) |
api.github.com | CN=*.github.com (Sectigo) |
raw.githubusercontent.com | CN=*.githubusercontent.com (DigiCert) |
Content comparison confirms transparent relay:
| Page | Proxy Size | Real Size | Difference |
|---|---|---|---|
| github.com homepage | 564,455 B | 564,452 B | 3 bytes |
| github.com/login | 45,027 B | 45,028 B | 1 byte |
The proxy passes through all response headers including session cookies (_gh_sess, _octo), request IDs, and the full Content Security Policy. A victim authenticating through this proxy would have their credentials and session tokens captured in transit.
Verification: Every Proxy Is Fraudulent
We verified a representative sample of 25 proxies across all major target categories:
- 22 of 25 relay the exact same certificate (identical serial number) as the real service — confirmed TLS passthrough
- 17 of 25 returned byte-identical content to the real service
- 0 of 25 appear in any legitimate provider's published IP ranges (checked against GitHub's
/metaAPI, Microsoft Azure service tags, Apple CDN, Akamai, Cloudflare, and Fastly edge networks) - All 25 resolve via WHOIS to
NEKOBYTE INTERNATIONAL LIMITED / it-garage - TLS handshakes were 1.3–2.3x slower through proxies versus direct connections, consistent with an additional relay hop
There is no legitimate business reason for a hosting provider to serve other companies' TLS certificates. These are not CDN nodes, authorized mirrors, or sanctioned proxies. They are transparent interception infrastructure.
The Full Target List
We scanned every IP across all 34 subnets announced by AS206134. Of 1,616 IPs serving TLS certificates, 1,004 were confirmed impersonating major services.
Western Technology Targets
| Target | Cert Subject | Proxies |
|---|---|---|
| Microsoft | www.microsoft.com, learn.microsoft.com, azure.microsoft.com | 142 |
| GitHub | github.com | 128 |
| Apple | www.apple.com, www.icloud.com, itunes.apple.com, images.apple.com, swdist.apple.com | 98 |
| Cloudflare | www.cloudflare.com, cloudflare-dns.com, cdnjs.cloudflare.com | 47 |
| Yahoo | yahoo.com, *.www.yahoo.com | 37 |
| AMD | amd.com | 27 |
| Oracle | www-cs-02.oracle.com (80+ subdomains incl. container-registry) | 18 |
| Tesla | *.tesla.com | 16 |
| Samsung | www.samsung.com (50+ subdomains incl. semiconductor) | 15 |
| Amazon | www.amazon.com, *.peg.a2z.com | 13 |
| Intel | *.intel.com | 13 |
| Azure Edge CDN | *.azureedge.net | 9 |
| Twitch | twitch.tv | 8 |
| Lenovo | *.lenovo.com | 3 |
| Steam | steamcommunity.com | 3 |
| Otto.de | www.otto.de (German e-commerce) | 2 |
*.reddit.com | 1 | |
| Zoom | *.zoom.us | 1 |
*.whatsapp.net (on port 7777) | 1 | |
| Wikipedia | *.wikipedia.org | 1 |
| MEGA | *.static.mega.co.nz | 1 |
| DENIC | denic.de (German domain registry) | 1 |
| kernel.org | fra.source.kernel.org | 1 |
| ZDF | www.zdf.de (German public TV) | 1 |
| IMDB | us.dd.imdb.com | 1 |
*.pinterest.com | 1 |
Russian Service Targets
| Target | Cert Subject | Proxies | Type |
|---|---|---|---|
| VK | *.vk.com, *.mail.ru, *.max.ru, *.userapi.com, *.okcdn.ru, *.dzen.ru | 76+ | Social + email |
| Yandex | *.yandex.tr, scale.yandex.ru, api-maps.yandex.ru, *.mirror.yandex.ru | 75+ | Search + maps + cloud |
| Ozon | *.ozon.ru | 22 | E-commerce |
| 1C | *.1c.ru | 17 | Enterprise ERP |
| Petrovich | *.petrovich.ru | 8 | Retail |
| Wildberries | wb.ru, wildberries.global | 5 | E-commerce |
| Habr | *.habr.com | 3 | Developer community |
| DNS Shop | *.dns-shop.ru | 2 | Electronics retail |
| CDEK | cdek-llc.store | 2 | Logistics |
| Avito | *.avito.ru | 1 | Classifieds |
| MegaMarket | *.megamarket.ru | 1 | Marketplace |
| Bitrix24 | *.bitrix24.ru | 1 | CRM |
| Drom.ru | drom.ru | 1 | Auto marketplace |
| MK.ru | *.mk.ru | 1 | News |
Infrastructure Targets
| Target | Cert Subject | Proxies | Risk |
|---|---|---|---|
| Fastly CDN | n.sni-347-default.ssl.fastly.net | 29 | CDN interception |
| Cloudflare DNS | cloudflare-dns.com | 1 | DNS query interception |
| Akamai CDN | a248.e.akamai.net | 1 | CDN interception |
| jsDelivr | *.jsdelivr.net | 1 | JavaScript CDN / supply chain |
| Vercel | no-sni.vercel-infra.com | 1 | Hosting platform |
Infrastructure: NEKOBYTE / IT-Garage
| Field | Value |
|---|---|
| ASN | AS206134 (NEKO-AS) |
| Created | 2026-01-20 (3 months old) |
| Organization | NEKOBYTE INTERNATIONAL LIMITED |
| Operating Brand | IT-Garage (it-garage[.]pro) |
| Total IPv4 | ~8,700 addresses (34 subnets) |
| Upstream | AS49418 (NETSHIELD LTD) via aurologic GmbH (AS30823), Frankfurt — documented by Recorded Future as a top-10 malicious hosting enabler |
| Proxy Stack | Traefik (confirmed via default cert leak) |
| Geofeed | Frankfurt (20), Helsinki (7), Moscow (5) |
The actual network engineering is performed by Dan Fedoseev (dan.fedoseev.20@gmail.com), who controls the DGTLS-MNT and MNT-DGTL RIPE maintainer objects (250+ objects combined) — as documented in our March report. Fedoseev never appears as a director of any UK company, remaining behind the RIPE infrastructure layer while nominee directors absorb legal liability.
Second ASN
AS207416 (NEKO-ORG-AS), created June 4, 2025, is registered to both "NekoByte Limited" and "WINTELECOM LLC" (Ukraine). This ASN has been reported for announcing bogon routes — invalid IP ranges that indicate BGP hijacking capability.
IT-Garage Service
IT-Garage (it-garage[.]pro) is a Russian-language VPS hosting service:
- Accepts Russian SBP payments and Russian bank cards
- AMD Ryzen 9 5950x and Intel Xeon servers
- Trustpilot: 3.1/5 with 67% negative reviews
- Customer complaints include being blocked on Telegram after raising issues
Attribution: From Sevastopol to London
IT-Garage LLC — The Russian Entity
| Field | Value |
|---|---|
| Full Name | OOO "IT-GARAZH" (IT-Garage LLC) |
| Address | 299053 Sevastopol, ul. Rudneva, zd. 41, of. n-25 |
| Tax ID | 9200013941 (Crimea/Sevastopol registration) |
| Registered | November 22, 2022 |
| General Manager | Tretiakova Mariia Vladimirovna (since August 2023) |
| Assets | 167 million RUB (~$1.8M USD) |
| Revenue | 667,000 RUB (with 1.6M RUB loss) |
| OKVED Classification | 64.99 — "Other financial service activities" |
The classification is notable. IT-Garage is not registered as a hosting or telecommunications company. It is registered under financial services — OKVED 64.99. An entity with 167 million rubles in assets but only 667,000 in revenue, classified as financial services, operating a 999-proxy AiTM farm.
The Alvion Connection: IT Advisor to the Occupation
IT-Garage LLC is registered at ul. Rudneva, zd. 41, of. n-25, Sevastopol. This is the same address as Alvion Europe — a company whose history connects directly to the Russian annexation of Crimea.
Igor Tsimbal
| Field | Value |
|---|---|
| Role | CEO of Alvion Europe |
| Location | Sevastopol, Crimea |
| Previous | Head of SoftServe's Sevastopol office |
| Political role | IT advisor to Alexei Chaly — self-proclaimed head of Sevastopol during 2014 Russian annexation |
| Crimea role | Built the IT cluster in Crimea under Russian occupation (2017) |
| Myrotvorets | Listed in Ukraine's database of national security threats (2018) |
| Contact | i***@alvioneurope.ru |
The timeline:
- 2008: SoftServe acquires Alvion for business intelligence services
- February 2014: Russia annexes Crimea
- April 2014: SoftServe officially closes its Sevastopol office
- May 14, 2014: Alvion Europe registered under Russian law in Sevastopol — days after annexation. Alvion becomes the legal successor to SoftServe's Crimean operations.
- 2017: Igor Tsimbal builds IT infrastructure for Russian-occupied Crimea, advises occupation leadership
- 2018: Tsimbal added to Ukraine's Myrotvorets database
- November 2022: IT-Garage LLC registered at same Sevastopol address as Alvion Europe
- May 2025: ALVION SERVICES LTD registered in UK
- June 2025: NEKOBYTE LIMITED registered in UK; AS207416 created
- August 2025: ALVION LIMITED registered in UK
- December 2025: NEKOBYTE INTERNATIONAL LIMITED registered in UK
- January 2026: AS206134 created
- March–April 2026: 999 AiTM proxies deployed across 34 subnets
Alvion and NEKOBYTE companies were registered in the UK in the same period by the same operation. A Crimean IT operative who serves the Russian occupation government is building Western corporate shells to front an industrial-scale AiTM proxy farm.
The Russian DPI Certificate
During verification, one proxy was found serving a self-signed certificate with issuer "VK interm CA" — a Russian deep packet inspection intermediate certificate valid from 2022 to 2052 (30-year validity). This is not a standard web certificate. This is the type of certificate used by Russian SORM (System for Operative Investigative Activities) infrastructure to perform lawful interception of encrypted traffic.
SORM is Russia's state-mandated surveillance system. All Russian ISPs are required to install SORM equipment that allows the FSB to intercept communications without a warrant. The presence of a DPI certificate on this infrastructure directly links it to Russian state surveillance capabilities.
Corporate Shell Structure
SEVASTOPOL, CRIMEA
|
+-- IT-Garage LLC (OOO IT-GARAZH)
| Tax ID: 9200013941
| Address: ul. Rudneva 41
| GM: Tretiakova M.V.
| OKVED: 64.99 (Financial Services)
| Assets: 167M RUB
|
+-- Alvion Europe (same address)
CEO: Igor Tsimbal
IT advisor to occupation government
|
v
LONDON, UK (Formation Agent Addresses)
|
+-- NEKOBYTE LIMITED (16487892)
| 27 Old Gloucester Street, WC1N 3AX
| Incorporated: June 2, 2025
|
+-- NEKOBYTE INTERNATIONAL LIMITED (16913243)
| 128 City Road, EC1V 2NX
| Director: Sergei Satsukevich (Russian, born Apr 2005, age 20)
| Incorporated: December 16, 2025
|
+-- ALVION LIMITED
| 2 Duchess Crescent, Stanmore
| Incorporated: August 15, 2025
|
+-- ALVION SERVICES LTD
| 78 Brown Lane, Heald Green
| Incorporated: May 6, 2025
|
+-- NETSHIELD LTD (LIR / Sponsoring Org)
71-75 Shelton Street, WC2H 9JQ
Phone: +79029519859 (Russian mobile)
|
v
RIPE / BGP
|
+-- AS206134 (NEKO-AS) — 34 subnets, 999 AiTM proxies
+-- AS207416 (NEKO-ORG-AS) — bogon announcements
Internal Infrastructure Leaks
| Artifact | Source | Significance |
|---|---|---|
PROXYKB.bentonite.local | Certificate CN on 178.236.249.100 | Internal proxy software name + Active Directory domain |
C=RU | Same certificate | Confirms Russian operator |
mail.bentonit.ru | Kerio Connect on same IP | Operator email server (IMAP + LDAP exposed) |
bentonit.ru | WHOIS | OOO "Kompaniya Bentonit" (taxpayer 7710644764) — Russian bentonite mining company |
vpn.Asamantde1.local | Certificate on 195.62.48 range | Second internal domain leak |
+79029519859 | NETSHIELD LTD RIPE record | Russian Tele2 mobile number on the LIR |
Threat Assessment
Continuity With March Findings
Our March report documented additional indicators not repeated here in full: a Russian Government "Trusted Sub CA" certificate for TBank (definitively state-linked), VK internal CA certificates with 30-year validity, Google Analytics interception on 230+ hosts (mass passive surveillance), an HAProxy WhatsApp interception proxy with 62,254+ logged connections, and documented links to the Russian state-linked Doppelganger disinformation campaign via Intrinsec and Qurium reporting. All of these findings remain relevant context for the expanded infrastructure documented below.
Why This Is Likely State-Linked Infrastructure
-
Dual Russian domestic + Western targeting: The simultaneous impersonation of Russian consumer services (VK, Yandex, Ozon, Wildberries, 1C) alongside Western tech platforms (GitHub, Microsoft, Apple) is operationally consistent with the FSB's unique mandate — domestic security AND foreign counterintelligence. Neither GRU nor SVR target domestic Russian services. Commercial operators don't optimize for both markets simultaneously.
-
Consistent with documented FSB operations: In July 2025, Microsoft documented Secret Blizzard — an FSB-linked actor using ISP-level AiTM positions to intercept traffic from foreign embassies in Moscow. The NEKOBYTE infrastructure follows the same operational pattern at larger scale.
-
Russian DPI certificate: The presence of a "VK interm CA" deep packet inspection certificate (2022–2052) directly links this infrastructure to Russia's SORM lawful intercept system.
-
Scale exceeds commercial AiTM: 999 proxies across 34 subnets far exceeds any documented commercial phishing-as-a-service operation. The largest commercial AiTM platforms (Tycoon2FA, Evilginx ecosystem) typically operate 100–200 IPs.
-
Financial classification: IT-Garage LLC is registered under OKVED 64.99 (financial services), not telecommunications or hosting. Its 167M RUB in assets with minimal revenue suggests the entity exists to hold infrastructure, not generate commercial hosting income.
-
Operator profile: Igor Tsimbal built IT infrastructure for the Russian occupation government in Crimea and served as IT advisor to the occupation's leadership. This is not a commercial hosting entrepreneur.
-
Supply chain targets: Proxies impersonating
kernel.org(Linux kernel source),jsDelivr(JavaScript CDN),container-registry.oracle.com, and GitHub suggest preparation for supply chain attacks — a state-level objective with no commercial motive.
What We Cannot Confirm
- Direct FSB tasking or formal government contracts
- Whether Igor Tsimbal personally manages the proxy infrastructure or delegates through Tretiakova M.V.
- Whether the infrastructure is actively intercepting traffic or staged for future operations
- The relationship between the NEKOBYTE UK shells and the Sevastopol entities (possibly nominee directors)
What This Report Adds
-
1,004 AiTM proxy servers mapped across a single ASN — the largest publicly documented transparent proxy farm we are aware of.
-
The proxy mechanism is verified through certificate chain validation, content comparison, latency analysis, and confirmation that zero proxy IPs appear in any target's authorized IP ranges.
-
Attribution to a named Crimean IT operative who built infrastructure for the Russian occupation government and is listed in Ukraine's national security database.
-
The corporate shell structure linking Sevastopol entities to UK companies registered at known formation agent addresses in 2025, with a Russian mobile number on the LIR.
-
A Russian DPI certificate on the infrastructure directly connecting it to state surveillance capabilities.
-
The complete target inventory spanning Western tech giants, the Russian consumer internet, and critical infrastructure (kernel.org, DENIC, Cloudflare DNS).
Credit to @Fact_Finder03 for the initial C2 tip, @malwrhunterteam for flagging the infrastructure, and @4_n_0_n_1_3_3_7 for port enumeration.
IOC Table
ASN / Network
| Type | Indicator | Context |
|---|---|---|
| ASN | AS206134 (NEKO-AS) | Primary proxy farm |
| ASN | AS207416 (NEKO-ORG-AS) | Secondary ASN, bogon announcements |
| Org | NEKOBYTE INTERNATIONAL LIMITED | UK shell (Company 16913243) |
| Org | NEKOBYTE LIMITED | UK shell (Company 16487892) |
| Org | IT-Garage LLC | Operating entity (Sevastopol, TIN 9200013941) |
| Person | Sergei Satsukevich | Director, NEKOBYTE INTERNATIONAL LIMITED |
| Person | Igor Tsimbal | CEO, Alvion Europe (Sevastopol) |
| Person | Tretiakova Mariia Vladimirovna | GM, IT-Garage LLC |
| Phone | +79029519859 | Russian mobile on NETSHIELD LTD (LIR) |
abuse@it-garage[.]pro | Abuse contact | |
| Domain | it-garage[.]pro | Hosting service |
| Domain | it-garage[.]network | VM hostname domain |
| Domain | bentonit[.]ru | Operator mail server host |
| Domain | mcgtechlab[.]ru | On 147.45.210.1 |
| Internal | PROXYKB.bentonite.local | Proxy software name + AD domain |
| Internal | vpn.Asamantde1.local | Second internal domain leak |
Proxy Subnets (Block Entire Ranges)
| Prefix | Geofeed Location | Key Targets |
|---|---|---|
147.45.210[.]0/24 | Frankfurt | GitHub (6), Microsoft (12), Apple, VK, Yandex |
195.62.48[.]0/23 | Frankfurt | Twitch, Microsoft, Yahoo, Samsung, WhatsApp |
212.113.98[.]0/24 | Moscow | GitHub (3), Lenovo, VK, Yandex, Amazon |
2.26.16[.]0/24 | Frankfurt | Microsoft (11), GitHub, Tesla, AMD, Oracle |
2.26.17[.]0/24 | Frankfurt | Microsoft, GitHub, Apple, VK, Yandex |
2.26.28[.]0/24 | Helsinki | Apple, Microsoft, GitHub |
2.26.29[.]0/24 | Frankfurt | Additional proxies |
2.26.30[.]0/24 | Frankfurt | Additional proxies |
2.26.116[.]0/24 | Helsinki | C2 listener, Nextcloud |
2.26.117[.]0/24 | Frankfurt | Additional proxies |
2.26.119[.]0/24 | Moscow | Additional proxies |
2.27.16[.]0/24 | Frankfurt | GitHub (5), Microsoft, Yahoo, Tesla, VK |
2.27.17[.]0/24 | Frankfurt | Additional proxies |
2.27.120-123[.]0/24 | Mixed | Additional proxies |
64.188.115[.]0/24 | Frankfurt | Additional proxies |
77.91.79[.]0/24 | Frankfurt | Known malware hosting range |
77.239.127[.]0/24 | Frankfurt | Additional proxies |
138.124.240[.]0/23 | Mixed | Additional proxies |
144.31.x[.]0/24 | Mixed | Multiple ranges |
178.236.240[.]0/24 | Moscow | Internal infrastructure |
178.236.243[.]0/24 | Frankfurt | Additional proxies |
178.236.249[.]0/24 | — | PROXYKB cert leak, Kerio Connect mail |
Recommendations
Immediate
| Action | Target |
|---|---|
| Block all AS206134 and AS207416 prefixes | Network perimeter, DNS resolvers |
| Report to GitHub Security | 128 proxies impersonating github.com |
| Report to Microsoft MSRC | 142 proxies impersonating microsoft.com |
| Report to Apple Product Security | 98 proxies impersonating apple.com/icloud.com |
| Report to CISA | State-linked AiTM infrastructure targeting US services |
| Report to UK NCA | Shell company abuse, Companies House fraud |
| Report to BfV (German domestic intelligence) | DENIC proxy, German-specific targets |
| Report to SBU (Ukraine Security Service) | Crimean occupation IT operative |
| Report to SureVoIP / NETSHIELD LTD | Upstream providing transit to proxy farm |
| Alert kernel.org maintainers | Supply chain attack staging |
Monitoring
- Track BGP announcements from AS206134 and AS207416 for new prefixes
- Monitor UK Companies House for new NEKOBYTE or ALVION registrations
- Watch RIPE for new objects under
itgarage-mnt,LIMITED-MNT, orNUXTCLOUD-MNT - Monitor Certificate Transparency logs for proxy IP appearances
- Track
bentonit.ruandmcgtechlab.rufor infrastructure changes
Investigation by Breakglass Intelligence. Credit to @Fact_Finder03, @malwrhunterteam, and @4_n_0_n_1_3_3_7 for the initial tips. All IOCs defanged. Verification data and reproducible scripts available to qualified researchers upon request.