Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search

Discovering IaB JohnDoe7: Access for sale from the common man

Redazione RHC : 23 July 2025 08:24

We continue our series of articles on Initial Access Brokers with an article on JohnDoe7 (also known as LORD1), who, as we’ll see later, uses a name/moniker reminiscent of movies or the US legal world.

1-Day Vulnerability Exploits

KELA Cyber has observed a steady stream of exploits for 1-day vulnerabilities, confirming that the IAB, like other actors, are interested in targeting organizations that have failed to patch their environments in a timely manner. Pictured here on Exploit in October 2020, LORD1 offers an RCE and LPE exploit priced starting at $5,000.

LORD1 offers one-day exploits (RCE, LPE), priced starting from $5000

The Case of MOVEit Transfer Software

In June 2023, johndoe7 aka LoRD1 on XSS and Exploit offered a custom malicious script to exploit the Progress MOVEit Transfer vulnerability (CVE-2023-34362). In May 2023, the CL0P ransomware group targeted Progress Software’s MOVEit Transfer, commonly used by organizations to manage file transfer operations. They exploited the zero-day SOL injection vulnerability (CVE-2023-34362) to infiltrate MOVEit Transfer’s web applications and gain unauthorized access to stored databases. This could suggest a connection between johndoe7 and the CL0P gang…

In the following example in the XSS and Exploit forums, the malicious actors “0x90” and “Present” express their interest in purchasing exploits for CVE-2023-3519 (RCE on Citrix) and CVE-2022-24527 (LPE on Microsoft Connected Cache).

Soc RADAR Report on Crypto/NFT Attacks

According to a SOCRadar report, LORD1 is very active in compromising credentials related to the world of cryptocurrencies and NFTs; Analysis conducted by the SOCRadar research team reveals that the majority of the approximately 1,700 unique Dark Web threats detected since 2021 involve the sale of compromised user data on a global scale. Therefore, malicious actors targeting the cryptocurrency and NFT industry pose a global threat to all users.

The most widespread threat in the cryptocurrency and NFT industry is the compromise and subsequent sale of personal information of industry users on dark web forums.

In the previous graph, taking the total number of credential compromise cases analyzed by SOCRadar during the period as 100, each segment shows the percentage of contribution attributed to each malicious actor: LORD1 ranks fifth in the TOP 10 with a contribution of 14 percent.

Other CVE scenarios exploited by the IAB

ATLASSIAN BITBUCKET COMMAND INJECTION (CVE-2022-36804)

Disclosed in August 2022, CVE-2022-36804 is a command injection vulnerability affecting multiple Bitbucket server API endpoints. Using this vulnerability, attackers with access to a public repository or with read permissions to a private Bitbucket repository can execute arbitrary code by sending a malicious HTTP request.

FORTINET: AUTHENTICATION BYPASS VULNERABILITY (CVE-2022-40684)

Disclosed in September 2022, this vulnerability allows an unauthenticated attacker to perform operations on the administrative interface of the FORTINET appliance via specially crafted HTTP or HTTPS requests by bypassing authentication using an alternate path or channel [CWE-288] in Fortinet FortiOS versions 7.2.0 through 7.2.1 and 7.0.0 through 7.0.6, FortiProxy version 7.2.0 and version 7.0.0 up to 7.0.6 and FortiSwitchManager version 7.2.0 and 7.0.0.

XSS Forum

More Johndoe7 tracks from 2022 in the XSS forum ( https://xss.ist/forums/104 )

SEVEN / SE7EN

Curiosity, “John Doe” is the name of the villain from the film SE7EN.

https://villains.fandom.com/it/wiki/John_Doe

In the US, the name John Doe is used for an unknown or anonymous victim or defendant in a legal case. It is also the name officially given to the bodies of unknown individuals.

In Italy, it is the equivalent of Unknown or NN (from the Latin Nomen Nescio).

Note about 1-day: what is a 1-day vulnerability?

1-day vulnerabilities are known vulnerabilities for which a remediation patch or a mitigations, but have not yet been applied. The term “one day” refers to the period between the disclosure of the vulnerability and the patching of affected systems.

These vulnerabilities are sometimes referred to as “n-day” vulnerabilities, as the period is often much longer than one day, given that the mean time to apply a patch (MTTP) is typically between 60 and 150 days.

Unfortunately, the exploitation of one-day vulnerabilities is often accelerated by the release of proof-of-concept (PoC) exploit code before affected users have had time to patch their systems. This practice appears to have worsened as some cybersecurity researchers seek to showcase their technical prowess by creating PoCs, despite the resulting harm.

While more sophisticated threat actors reverse-engineer a patch to understand what problem it was intended to fix and then develop their own exploits based on their findings, less technical threat actors adopt/use publicly available PoC code. This allows the vulnerability to be exploited by less technically skilled malicious actors who would otherwise be unable to do so without outside assistance.

A recent and notable example of a one-day vulnerability is CVE-2024-1708, an authentication bypass flaw, and CVE-2024-1709, a path traversal flaw, in ConnectWise’s ScreenConnect servers. Just one day after the vulnerabilities were announced, several researchers released the PoC exploit code and technical details related to the vulnerabilities. This code, combined with the ease of identifying vulnerable ScreenConnect instances via online web scanners, has led to mass exploitation and distribution of ransomware and other malware on unpatched servers.

Conclusion

In this article in the series on initial access brokers, we saw how credential theft can also occur through attacks that exploit RCE and LPE vulnerabilities and how it is essential to apply patches and remediation as soon as possible… So, let’s remember some of the best practices mentioned above to be prepared for any eventuality.

  • Constant system updates
  • Continuous Monitoring and Threat Detection
  • Strong Access Controls/Multi-Factor Authentication
  • Employee Training and Awareness
  • Network segmentation/micro-segmentation

References

KelaCyber 2022 Q2 Report https://www.kelacyber.com/wp-content/uploads/2022/08/KELA-RESEARCH_Ransomware-Victims-and-Network-Access-Sales_Q2-2022.pdf

Outpost24 IAB Report https://outpost24.com/wp-content/uploads/2024/11/IAB-and-links-to-ransomware.pdf

Soc Radar report https://socradar.io/wp-content/uploads/2024/03/SOCRadar-Cryptocurrency-NFT-Threat-Landscape-Report.pdf

Cyble underground report https://www.osintme.com/wp-content/uploads/2023/03/Cyble_Underground_Report.pdf

XSS Forum https://xss.ist/forums/104

Seven (Film, 1995) https://it.wikipedia.org/wiki/Seven

Redazione
The editorial team of Red Hot Cyber consists of a group of individuals and anonymous sources who actively collaborate to provide early information and news on cybersecurity and computing in general.

Lista degli articoli