Skip to content

Ud0g-Py/Killing-the-Bear-BloodCoin

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

13 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Logo

UPDATE - ESXiArgs Campaign Module Added HERE

  • About 800 attacks registered in the repository

  • More than 700 unique wallets collected

  • More than 44 unique countries affected

License

MIT License

Killing The Bear - BloodCoin

tag0 tag0

Killing The Bear: BloodCoin is repo that allows users to collect crypto wallet addresses (mainly BTC) from ransom notes. These addresses are from real and recent attacks on services like ELK, MongoDB, and other unsecured resources, allowing researchers to be aware of the latest movements and protect themselves from future attacks. BloodCoin also collects email addresses associated with ransom notes, as well as metadata such as countries, continents, services, versions and ports. Events are grouped so track data along days its possible.

It is a repository focused on data storage and analysis. Data is updated every day and is available in JSON format.

Killing The Bear: BloodCoin also collects email addresses associated with ransom notes, as well as metadata such as countries, continents, services, versions and ports.

Features

  • Compilation of real and recent ransom crypto wallet addresses used in ongoing attacks. tag1

  • Collection of email addresses used by threat actors to stabilish comms with the victim. tag2

  • Collection of metadata such as countries, continents, services, versions and ports of the attacks tag3 tag4 tag5 tag6

  • Analysis of outgoing transactions and related wallets tag7

🎯 Roadmap

  • Being the bad news for some mxtherf@ck*rs out there. ✅

  • Deploy customized honeypots focused on hunting and studying the behavior and bruteforce dicts of these attacks, using the geographic, product, service and version statistics collected. 🔄

  • Build a public-face dashboard to filter data 🔄

  • Be able to send reports in bulk about wallets listed and make it public to make harder for the threat actor to catch the money from victim. 🔄

How to use it

Attack Wallets

Gathers information on recents REAL attacks

{
    "uuid": {
        "_id": "uuid",
        "is_wallet": boolean,
        "emails_related": ["string"],
        "tracking": [
            {
                "bytes_encrypted": long int,
                "seen_at": date (YYYY-MM-DD),
                "countries": [
                    "string
                ],
                "continents": [
                    "string"
                ],
                "services": [
                    {
                        "service": "string",
                        "version": "string"
                    }
                ],
                "ports": [
                    "string"
                ]
            }
        ],
        "observed_countries": [
            "string"
        ],
        "observed_continents": [
            "string"
        ],
        "observed_ports": [
            "string"
        ],
        "hit_services": {
            "string" (product): [
                "string" (version)
            ]
        },
        "last_seen": date (YYYY-MM-DD)
    },

TX Wallets

Information about transactions and cash flow after an attack, related wallets used for money laundering masquerading with high confidence, etc.

{
    "uuid": {
    "is_valid": boolean,
    "hash160": "hash",
    "n_transactions": long int,
    "n_unredeemed": long int,
    "total_received": long int,
    "total_sent": long int,
    "final_balance": long int,
    "sent_cash_to": [
        "string"
    ],
    "last_check": date (YYYY-MM-DD)
    },

🐻 About Me

Author of "Killing The Bear" (v2.0 WIP)

Global Cybersecurity Technology Researcher Lead

MITRE ATT&CK Defender

🔗 Links

portfolio linkedin twitter

About

Killing The Bear Module. Tracking crypto wallets (BTC mostly) seen in recent ransomware/intrusion attacks.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published