Historical list of #SystemApp callback to #FinFisher clients logged while on #InfoseceXchange that's good for #tcpdump correlation #investigations in #AMER on these IPs LARGE LIST hosting since November 2022ish for #Prosecutors to correlate.

#FinFisherCom🤝#EnemyOfTheInternet

#CALEA #greymarket #CALEAmalware 🔍🧐#infosec

¹
40.115.118.6

²
40.115.117.30

³ (fast .ly)
151.101.41.184


172.56.140.14


173.194.166.106


173.194.166.106


199.232.92.157

⁸ Twitter
104.244.42.66


151.101.190.110

¹⁰
138.91.55.166

¹¹
192.229.173.16

¹² Twitter
104.244.42.139

¹³
173.194.166.171

¹⁴
152.199.24.185

¹⁵
165.254.198.210

¹⁶ Fast .ly
151.101.42.2

¹⁷ Twitter
104.244.42.70

¹⁸ Fast .ly
151.101.40.193

¹⁹ Twitter
104.244.42.134

²⁰ Fast .ly
151.101.40.84

²¹
216.239.34.117

²²
104.26.2.192

²³
104.26.3.192

²⁴
172.67.72.251

²⁵
redirect.redhat.com

²⁶
192.229.210.163

²⁷
172.67.28.154

²⁸
104.18.10.19

²⁹
104.244.42.69

³⁰
944ellb0102-vip01.blackmesh.com

³¹
151.101.41.67

³² Fast .ly
151.101.40.81

³³
104.26.10.153

³⁴
151.101.41.188

³⁵
104.26.13.149

³⁶
104.26.12.149

³⁷
63.241.199.113

³⁸ Local ISP exploit try ip (private)
192.0.66.2

³⁹
162.159.153.4

⁴⁰
104.18.16.202

⁴¹
104.26.3.29

⁴²
104.26.2.29

⁴³ NYC Twitter
72.21.91.70

⁴⁴ Fast .ly
151.101.2.187

⁴⁵ Fast .ly
151.101.66.187

⁴⁶
13.86.218.255

⁴⁷
209.234.235.188

⁴⁸
104.26.15.185

⁴⁹
172.67.69.125

⁵⁰
52.239.139.228

⁵¹
104.17.83.11

⁵²
104.17.32.62

⁵³
104.244.42.130

⁵⁴
20.189.172.0

⁵⁵
172.67.222.28

⁵⁶
151.101.41.73

⁵⁷
13.86.218.248

⁵⁸
104.27.203.89

⁵⁹
104.16.13.194

⁶⁰
104.244.42.133

⁶¹
151.101.130.132

⁶²
172.67.73.80

⁶³
104.26.6.15

⁶⁴
104.22.33.123

⁶⁵
dns11.quad9.net

⁶⁶
104.244.42.198

⁶⁷
104.244.42.2

⁶⁸
104.244.43.131

⁶⁹
208.54.152.122

⁷⁰
208.54.150.98

⁷¹
52.236.40.36

⁷²
104.18.23.15

⁷³
104.26.1.5

⁷⁴
172.67.71.43

⁷⁵
199.232.93.184

⁷⁶
151.101.2.217

⁷⁷
199.232.92.81

⁷⁸
104.26.0.5

⁷⁹
151.101.130.217

⁸⁰
151.101.66.217

⁸¹
104.26.6.18

⁸²
104.18.22.15

⁸³
104.26.7.18

⁸⁴
104.21.78.132

⁸⁵
104.244.42.6

⁸⁶
199.232.92.200

⁸⁷
20.60.40.36

⁸⁸
52.245.40.74

⁸⁹
104.244.42.194

⁹⁰
199.232.94.110

⁹¹
172.67.72.57

⁹²
192.229.173.16

⁹³
104.244.42.193

⁹⁴
208.54.106.98

⁹⁵
104.244.42.65

⁹⁶
104.244.42.193

⁹⁷
151.101.67.52

⁹⁸
104.244.42.3

⁹⁹
151.101.67.52

¹⁰⁰
104.244.42.1

¹⁰¹
192.229.173.16

¹⁰²
151.101.40.159

¹⁰³
104.244.42.11

¹⁰⁴
152.199.24.185

¹⁰⁵
152.199.24.185

This is just # attaccc nodes for the past two years I have logged as #FinFisher shims/proxies/nodes. Every single one of these tried a MITM attaccc & multiple other OTS exploits. They were blocked and logged.

Cities:
¹
https://www.reddit.com/r/netzpolitik/comments/jax0e3/our_criminal_complaint_german_statemalware/

²
https://en.wikipedia.org/wiki/FinFisher

³
https://www.spiegel.de/netzwelt/netzpolitik/finfisher-ueberwachungssoftware-hersteller-ist-insolvent-a-399e29e2-a7ae-4966-8d26-fc3c4f92db64


https://netzpolitik.org/2022/nach-pfaendung-staatstrojaner-hersteller-finfisher-ist-geschlossen-und-bleibt-es-auch/


https://www.securityweek.com/german-authorities-seize-spyware-firm-finfishers-accounts/


https://www.bloomberg.com/news/articles/2022-03-28/spyware-vendor-finfisher-claims-insolvency-amid-investigation

#RTDNA #StateSponsoredMalware#SSM#malware

Historical list of #SystemApp callback to #FinFisher clients logged while on #InfoseceXchange that's good for #tcpdump correlation #investigations in #AMER on #akamai hosting since November 2022ish for #Prosecutors to correlate.

#FinFisherCom🤝#EnemyOfTheInternet

#CALEA #greymarket #CALEAmalware 🔍🧐#infosec

¹
a23-2-76-180.deploy.static.akamaitechnologies.com

²
a96-7-153-84.deploy.static.akamaitechnologies.com

³
a104-86-4-102.deploy.static.akamaitechnologies.com


a184-31-10-236.deploy.static.akamaitechnologies.com


a96-6-226-157.deploy.static.akamaitechnologies.com


a23-50-34-13.deploy.static.akamaitechnologies.com


a23-15-137-146.deploy.static.akamaitechnologies.com


a23-213-123-78.deploy.static.akamaitechnologies.com


a23-213-123-78.deploy.static.akamaitechnologies.com

¹⁰
a23-11-22-101.deploy.static.akamaitechnologies.com

¹¹
a23-59-206-230.deploy.static.akamaitechnologies.com

¹²
a104-125-55-184.deploy.static.akamaitechnologies.com

¹³
a23-78-154-233.deploy.static.akamaitechnologies.com

¹⁴
a23-7-132-30.deploy.static.akamaitechnologies.com

¹⁵
a104-86-104-224.deploy.static.akamaitechnologies.com

¹⁶
a104-122-42-39.deploy.static.akamaitechnologies.com

¹⁷
a23-202-60-225.deploy.static.akamaitechnologies.com

¹⁸
a104-86-184-250.deploy.static.akamaitechnologies.com

¹⁹
a184-51-48-250.deploy.static.akamaitechnologies.com

²⁰
a104-121-159-217.deploy.static.akamaitechnologies.com

²¹
a104-121-159-225.deploy.static.akamaitechnologies.com

²²
a104-84-227-133.deploy.static.akamaitechnologies.com

²³
a23-42-151-231.deploy.static.akamaitechnologies.com

²⁴
a23-40-167-73.deploy.static.akamaitechnologies.com

²⁵
a23-223-16-122.deploy.static.akamaitechnologies.com

²⁶
a184-31-10-237.deploy.static.akamaitechnologies.com

²⁷
a23-48-32-80.deploy.static.akamaitechnologies.com

²⁸
a23-48-32-75.deploy.static.akamaitechnologies.com

²⁹
a173-222-162-31.deploy.static.akamaitechnologies.com

³⁰
a23-45-32-210.deploy.static.akamaitechnologies.com

³¹
a184-30-164-84.deploy.static.akamaitechnologies.com

³²
a23-59-200-173.deploy.static.akamaitechnologies.com

³³
a23-43-191-224.deploy.static.akamaitechnologies.com

This is just #akamai attaccc nodes for the past two years I have logged as #FinFisher shims/proxies/nodes. Every single one of these tried a MITM attaccc & multiple other OTS exploits. They were blocked and logged.

Cities:
¹
https://www.reddit.com/r/netzpolitik/comments/jax0e3/our_criminal_complaint_german_statemalware/

²
https://en.wikipedia.org/wiki/FinFisher

³
https://www.spiegel.de/netzwelt/netzpolitik/finfisher-ueberwachungssoftware-hersteller-ist-insolvent-a-399e29e2-a7ae-4966-8d26-fc3c4f92db64


https://netzpolitik.org/2022/nach-pfaendung-staatstrojaner-hersteller-finfisher-ist-geschlossen-und-bleibt-es-auch/


https://www.securityweek.com/german-authorities-seize-spyware-firm-finfishers-accounts/


https://www.bloomberg.com/news/articles/2022-03-28/spyware-vendor-finfisher-claims-insolvency-amid-investigation

#RTDNA #StateSponsoredMalware#SSM#malware

Historical list of #SystemApp callback to #FinFisher clients logged while on #InfoseceXchange that's good for #tcpdump correlation #investigations in #AMER on #Google hosting since November 2022ish for #Prosecutors to correlate.

#FinFisherCom🤝#EnemyOfTheInternet

#CALEA #greymarket #CALEAmalware 🔍🧐#infosec

¹
sfo07s13-in-f174.1e100.net

²
159.240.178.107.bc.googleusercontent.com

³
25.25.190.35.bc.googleusercontent.com


51.241.186.35.bc.googleusercontent.com


183.34.211.130.bc.googleusercontent.com


173.194.166.198


74.125.166.169


173.194.166.106


173.194.167.9

¹⁰
142.250.138.97

¹¹
142.250.138.95

¹²
142.250.138.94

¹³
142.250.114.97

¹⁴
142.250.138.100

¹⁵
142.250.138.101

¹⁶
142.250.138.138

¹⁷
142.250.138.139

¹⁸
142.250.138.113

¹⁹
142.250.114.95

²⁰
142.250.138.102

²¹
sfo07s16-in-f78.1e100.net

²²
dns.google

²³
74.125.20.94

²⁴
142.250.101.188

²⁵
172.253.112.188

²⁶
238.105.188.35.bc.googleusercontent.com

²⁷
sfo03s26-in-f10.1e100.net

²⁷
sfo03s25-in-f10.1e100.net

²⁸
sfo03s24-in-f10.1e100.net

²⁹
nuq04s45-in-f10.1e100.net

³⁰
sfo03s27-in-f10.1e100.net

³¹
sfo03s21-in-f10.1e100.net

³²
nuq04s42-in-f10.1e100.net

³³
nuq04s39-in-f10.1e100.net

³⁴
sfo03s18-in-f10.1e100.net

³⁵
142.250.176.10

³⁶
lax17s50-in-f3.1e100.net

³⁷
sfo03s33-in-f10.1e100.net

³⁸
142.251.46.163

This is just #Google attaccc nodes for the past two years I have logged as #FinFisher shims/proxies/nodes. Every single one of these tried a MITM attaccc & multiple other OTS exploits. They were blocked and logged.

Cities:
¹
https://www.reddit.com/r/netzpolitik/comments/jax0e3/our_criminal_complaint_german_statemalware/

²
https://en.wikipedia.org/wiki/FinFisher

³
https://www.spiegel.de/netzwelt/netzpolitik/finfisher-ueberwachungssoftware-hersteller-ist-insolvent-a-399e29e2-a7ae-4966-8d26-fc3c4f92db64


https://netzpolitik.org/2022/nach-pfaendung-staatstrojaner-hersteller-finfisher-ist-geschlossen-und-bleibt-es-auch/


https://www.securityweek.com/german-authorities-seize-spyware-firm-finfishers-accounts/


https://www.bloomberg.com/news/articles/2022-03-28/spyware-vendor-finfisher-claims-insolvency-amid-investigation

#RTDNA #StateSponsoredMalware#SSM#malware

Historical list of #SystemApp callback to #FinFisher clients logged while on #InfoseceXchange that's good for #tcpdump correlation #investigations in #AMER & #EU on #AWS hosting since November 2022ish for #Prosecutors to correlate.

#FinFisherCom🤝#EnemyOfTheInternet

#CALEA #greymarket #CALEAmalware 🔍🧐#infosec

¹
ec2-52-25-170-148.us-west-2.compute.amazonaws.com

²
ec2-52-42-61-176.us-west-2.compute.amazonaws.com

³
ec2-52-25-170-148.us-west-2.compute.amazonaws.com


ec2-44-236-58-13.us-west-2.compute.amazonaws.com


ec2-44-240-164-68.us-west-2.compute.amazonaws.com


ec2-52-41-118-210.us-west-2.compute.amazonaws.com


ec2-52-35-177-24.us-west-2.compute.amazonaws.com


35.82.205.248


ec2-54-191-45-53.us-west-2.compute.amazonaws.com

¹⁰
ec2-44-241-110-131.us-west-2.compute.amazonaws.com

¹¹
ec2-35-82-235-74.us-west-2.compute.amazonaws.com

¹²
ec2-54-68-18-200.us-west-2.compute.amazonaws.com

¹³
ec2-54-184-79-208.us-west-2.compute.amazonaws.com

¹⁴
ec2-52-10-247-144.us-west-2.compute.amazonaws.com

¹⁵
ec2-54-186-72-30.us-west-2.compute.amazonaws.com

¹⁶
ec2-13-234-145-166.ap-south-1.compute.amazonaws.com

¹⁷
ec2-52-21-175-83.compute-1.amazonaws.com

¹⁸
ec2-44-229-72-171.us-west-2.compute.amazonaws.com

¹⁹
ec2-44-230-23-250.us-west-2.compute.amazonaws.com

²⁰
ec2-52-20-36-26.compute-1.amazonaws.com

²¹
ec2-52-204-216-203.compute-1.amazonaws.com

²²
ec2-13-235-220-86.ap-south-1.compute.amazonaws.com

²³
ec2-18-235-29-229.compute-1.amazonaws.com

²⁴
ec2-15-207-179-172.ap-south-1.compute.amazonaws.com

²⁵
ec2-176-34-188-147.eu-west-1.compute.amazonaws.com

²⁶
ec2-176-34-188-143.eu-west-1.compute.amazonaws.com

²⁷
ec2-18-218-105-211.us-east-2.compute.amazonaws.com

²⁸
ec2-3-21-177-140.us-east-2.compute.amazonaws.com

²⁹
ec2-34-205-198-58.compute-1.amazonaws.com

³⁰
ec2-3-20-61-88.us-east-2.compute.amazonaws.com

³¹
ec2-13-59-255-164.us-east-2.compute.amazonaws.com

³²
ec2-3-221-252-182.compute-1.amazonaws.com

³³
ec2-54-236-219-191.compute-1.amazonaws.com

³⁴
ec2-18-156-155-177.eu-central-1.compute.amazonaws.com

³⁵
ec2-34-212-53-52.us-west-2.compute.amazonaws.com

³⁶
ec2-54-246-112-81.eu-west-1.compute.amazonaws.com

³⁷
ec2-54-217-236-154.eu-west-1.compute.amazonaws.com

³⁸
ec2-46-137-158-3.eu-west-1.compute.amazonaws.com

³⁹
ec2-176-34-105-145.eu-west-1.compute.amazonaws.com

⁴⁰
ec2-52-0-252-134.compute-1.amazonaws.com

⁴¹
ec2-176-34-123-171.eu-west-1.compute.amazonaws.com

⁴²
ec2-54-228-232-250.eu-west-1.compute.amazonaws.com

⁴³
ec2-54-217-245-217.eu-west-1.compute.amazonaws.com

⁴⁴
ec2-52-0-252-1.compute-1.amazonaws.com

⁴⁵
ec2-52-0-252-3.compute-1.amazonaws.com

⁴⁶
ec2-52-0-252-2.compute-1.amazonaws.com

⁴⁷
ec2-54-246-123-138.eu-west-1.compute.amazonaws.com

⁴⁸
ec2-54-191-65-148.us-west-2.compute.amazonaws.com

This is just #AWS attaccc nodes for the past two years I have logged as #FinFisher shims/proxies/nodes. Every single one of these tried a MITM attaccc & multiple other OTS exploits. They were blocked and logged.

Cities:
¹
https://www.reddit.com/r/netzpolitik/comments/jax0e3/our_criminal_complaint_german_statemalware/

²
https://en.wikipedia.org/wiki/FinFisher

³
https://www.spiegel.de/netzwelt/netzpolitik/finfisher-ueberwachungssoftware-hersteller-ist-insolvent-a-399e29e2-a7ae-4966-8d26-fc3c4f92db64


https://netzpolitik.org/2022/nach-pfaendung-staatstrojaner-hersteller-finfisher-ist-geschlossen-und-bleibt-es-auch/


https://www.securityweek.com/german-authorities-seize-spyware-firm-finfishers-accounts/


https://www.bloomberg.com/news/articles/2022-03-28/spyware-vendor-finfisher-claims-insolvency-amid-investigation

#RTDNA #StateSponsoredMalware#SSM#malware

Historical list of #SystemApp callback to #FinFisher clients logged while on #InfoseceXchange that's good for #tcpdump correlation #investigations in #Germany on the CDN #DataPacket hosting the #BunnyNet since November 2022ish for #GermanProsecutors to correlate.

#FinFisherCom🤝#EnemyOfTheInternet

#CALEA #greymarket #CALEAmalware 🔍🧐#infosec

¹
143-244-49-183.bunnyinfra.net

²
143-244-50-83.bunnyinfra.net

³
169.150.221.147


143-244-50-88.bunnyinfra.net


143-244-50-211.bunnyinfra.net


169-150-249-163.bunnyinfra.net


169-150-221-147.bunnyinfra.net


143-244-50-82.bunnyinfra.net


143-244-50-213.bunnyinfra.net

¹⁰
143-244-50-209.bunnyinfra.net

¹¹
143-244-49-180.bunnyinfra.net

¹²
143.244.50.214

¹³
185-93-1-251.bunnyinfra.net

¹⁴
unn-169-150-249-163.datapacket.com

¹⁵
unn-169-150-249-165.datapacket.com

¹⁶
unn-169-150-249-164.datapacket.com

¹⁷
unn-169-150-249-166.datapacket.com

Cities:
¹
https://www.reddit.com/r/netzpolitik/comments/jax0e3/our_criminal_complaint_german_statemalware/

²
https://en.wikipedia.org/wiki/FinFisher

³
https://www.spiegel.de/netzwelt/netzpolitik/finfisher-ueberwachungssoftware-hersteller-ist-insolvent-a-399e29e2-a7ae-4966-8d26-fc3c4f92db64


https://netzpolitik.org/2022/nach-pfaendung-staatstrojaner-hersteller-finfisher-ist-geschlossen-und-bleibt-es-auch/


https://www.securityweek.com/german-authorities-seize-spyware-firm-finfishers-accounts/


https://www.bloomberg.com/news/articles/2022-03-28/spyware-vendor-finfisher-claims-insolvency-amid-investigation

#RTDNA #StateSponsoredMalware#SSM#malware

@abcfeeds

They should corelate the usage of #GangStalkingAttributes software install wise, namely #GammaGroup .Com's #FinFisher #FinSpy #Finsky #StateSponsoredMalware deployed by these #PedophileRings on #Meta's #TheFacebook #Instagram #WhatsApp & the #NanothechImplants & monitoring used by these #GangStalkingForum's who think they can ' manage ' people's lives through manipulation, generationally speaking.

Funny how three generations' of these ' families list of names ' proliferates around when their individual cases' and individual attributes are assessed, as a group, and since they are related, which reports they lied on, specifically. #GangStalkingAttributes #GenerationPedophileFamilyList #Meta #InstaCSAM #Instagram #BoomersONLY #CrimesOnlyMeta #investigations now in 30+ states in #AMER & #EU countries! 🔍🧐

#lawfedi #fedilaw #CALEASoftware #UK software used #FinFisher #EnemyOfTheInternet since 2012*

* Netpolitik has covered the closing, due to export licenses, of FinFisher . Com in #Germany in 2021, due cyber munitions export violations. ☣️🔍🧐

@knitcode

Ahh, good to see them acknowledge #GammaGroup's work at #FinFisher #FinSpy #Finsky

I have been covering this for a couple of years now and have run modules I found of #FinFisher on #Android through my #VirusTotal account.

Both times I ran into limits on #VirusTotal it was over a few #GammaGroup modules 🤦‍♂️🤦👀👀☣️🪓🧐

Worst. Human Rights. Abusing. #SSM#StateSponsoredMalware™ in the world of #infosec and #EnemyOfTheInternet since 2013 onward.

I'll post a few links later to these graphs. 👇⚠️☣️🪓

https://infosec.exchange/@infosec_jcp/110039751040478601

Here's a recent one from today

#GammaGroup #FinFisher

#SystemApp host :
142.251.46.163

#GammaGroupProxyIPs

#VirusTotal

https://www.virustotal.com/graph/embed/g7f982c1b896f4a15b4d800eacf6a57757d03956655be40a0ba6585f1b17d4c31

@infosec_jcp 🆓🐦🐈🃏 done differently (@[email protected])

Content warning: re: #Trapped & #Traced #GammaGroup #FinFisher 03-13-2023 from new AT&T #MotorolaPhone under ~$100 #infosec

Infosec Exchange

@openrightsgroup @Mer__edith

This is not true. #SSM™ breaks anything regardless.

#GammaGroup #FinFisher #FinSpy #Finsky #NSOGroup #Pegasus 👀👀🕵️‍♀️🕵️

The discussions into this #E2EE should _include_ #SSM#StateSponsordMalware™ as this option had been the #EnemyOfTheInternet since.... Forever.

#malware #ecosystem #YouArePwnd #GetOverIT ☣️🚢👀🕵️🕵️‍♀️