libRT
kiwifarms.net
- Joined
- Apr 15, 2021
I assume its a border device, and a phishing page was set up for it. I doubt the device itself was internal only (though it is possible, and it was exposing services that could be used to identify the make/model, they could have just got that, and set up a page on that but less likely), but probably provided VPN access or something to that internal network with the stuff that got compromised.The part that says "clones the behavior of our intranet gateway" makes me think that the actual payload site was actually meant to trick the browser into exposing login sessions and tokens of their internal admin pages. But even then, how did they know how to do it if it's a website that's supposedly unreachable from beyond their HQ?