Also some of us have noticed for a while Hacker News is hosted differently than the rest of YCombinator. While YCombinator uses AWS, which makes sense, Hacker News uses a small San Diego firm called M5 Computer Security. They have commented on here from time to time.
M5 Computer Security, also known as Cloud 5 Hosting and a few other names, has popped up on other forums too. The IPs that are owned by them (at least according to WHOIS) wind up holding very strange other websites that aren't say hosting customers (like how to weld underwater, how to get a foreign visa, etc). Some of their name servers also hold data for websites that are definitely not supposed to be there, like the regional government sites of a foreign country (could be part of the Sea Turtle DNS attack we have thought [1]). Also for a security company they seem to have strangely out of date websites [2]. Copyright 2003?
A few weeks ago we wound up calling the FBI's Cyberstorm hotline after we saw something weird with a government in the United States that traced back to M5 and American Internet Services, LLC (they often appear alongside M5 in the hosting records). A week later I had someone from DHS interview me at length (they just showed up at the door) for about 30 minutes. They seemed to be around organized crime, but near the end of the conversation it was mentioned "well they also do a lot of Department of Defense stuff". Uh oh. This seems to be true as they mention it on one of their websites actually [4].
Hopefully someone a few months from now will pick up the case and find out / connect to one of the many other DNS mysteries out there.
[1] - https://blogs.cisco.com/security/talos/sea-turtle-keeps-on-s...
[2] - https://www.m5computersecurity.com/audit-private.php
[3] - www.htleng.com
[4] - https://www.m5hosting.com/about-us/data-centers/san-diego-li...
Also this group looks almost cliche Cold War intelligence agency. Their UK name servers appear to host the authoritative records for half a dozen amateur radio groups / HF repeater runners in the UK. Fascinating, could someone reach out to them? cleddau-amateur-radio-society.org.uk AND tenby-radio-repeater-group.org.uk AND taffvaleradio.club with DNS records served from ns1.mhosting.co.uk.
Dead Comment
Apparently they left open their main production database a few months ago. The issue here though seems to be that even now they require all these agencies to whitelist on all ports their two /24 "remote support" subnets.
He pulled an SSH key from one of the remote support servers and found it also on dozens of Chinese servers...
If you are familiar with ICS security / systems, you can literally see the incinerators with dashboards of “humans per hour” and things like that.
Anyone with data wrangling skills (BigQuery, DataPrep, stuff like that), setting up cloud infra, or even just really good hard-code internetting research skills would be appreciated.
001-alias-aw@outlook.com
I actually wouldn’t have minded posting my real name, but it seemed somehow like it would take away from my post unless I used a cool anonymous (but not really) alias.
Again though I still see your point and those claims, if situation was a little more mundane, are absolutely true.
Behind a single user/pass form with a 12 char pass. Would be stupid to not target these states.
This was in September 2018.
Deleted Comment