Why was a bitcoin node running on the New York City Board of Elections network??
Potential Evidence of Election Meddling we found back in 2016. Not sure why the powers that be & the media were not interested then. Perhaps, we informed the wrong outlets. Let’s try this again.
Summary
On 11/7/2016 at approximately 4pm EST, Matthew Caldwell, now founder and CEO of Tophat Security Inc. conducted a test of his Second Look program. The purpose of the test was to look for potential compromises in the United States’ Election Systems. Mr. Caldwell researched the publicly available information describing the ownership of Internet addresses that relate to the election process, election boards, parties, and correlated alleged compromised hosts. The primary finding was that his ‘Second Look’ process detected potentially infected or compromise hosts which exist in the U.S. election systems. These election systems were not only likely compromised but evidence of Bitcoin operations were also found. Bitcoin operations have been associated with illegal activities from murder to malware and are frequently used to launder money for illicit purposes. It is highly suspicious and unusual that an Electoral Board would be running Bitcoin on multiple systems. This document describes what was discovered during that test.
Correlated Alert Message
After correlation in our ‘Second Look’ process we received the following alert message:
“We have received Internet intelligence associated with IP address(s) indicating a potential compromise or other detrimental Internet activity.
These indications may uncover vulnerabilities or threats that are increasing information risk to the organization.
ALERT DETAILS:
ALERT IP:208.69.7.17 INTELSOURCE_ID:560 CUSTOMER_ID:42074
ALERT IP:208.69.7.17 INTELSOURCE_ID:561 CUSTOMER_ID:42074
ALERT IP:208.69.7.17 INTELSOURCE_ID:562 CUSTOMER_ID:42074
ALERT IP:192.111.57.168 INTELSOURCE_ID:485 CUSTOMER_ID:42074
ALERT IP:192.111.57.166 INTELSOURCE_ID:485 CUSTOMER_ID:42074
ALERT IP:192.111.57.160 INTELSOURCE_ID:459 CUSTOMER_ID:42074
ALERT IP:192.111.57.160 INTELSOURCE_ID:481 CUSTOMER_ID:42074
ALERT IP:192.111.57.160 INTELSOURCE_ID:485 CUSTOMER_ID:42074
Analysis of 192.111.57.x Board of Elections in the City of New York
This set of IP addresses was the most disturbing: 192.111.57.x series of addresses belongs to the NYS Board of Elections in New York City.
ALERT IP:192.111.57.168 INTELSOURCE_ID:485 CUSTOMER_ID:42074
ALERT IP:192.111.57.166 INTELSOURCE_ID:485 CUSTOMER_ID:42074
ALERT IP:192.111.57.160 INTELSOURCE_ID:459 CUSTOMER_ID:42074
ALERT IP:192.111.57.160 INTELSOURCE_ID:481 CUSTOMER_ID:42074
ALERT IP:192.111.57.160 INTELSOURCE_ID:485 CUSTOMER_ID:42074
Host:192.111.57.160
The intelligence sources for these IP addresses indicate that system 192.111.57.160 (Intel Source: 459) was compromised by the JIGSAW Family of Malware. This malware is generally ransomware, however can include other malware programs not previously detectable. Ransomware needs to be able to process bitcoin payments and the 192.111.57.160 host is running a BITCOIN NODE with BLOCKCHAIN activity (Intel Source:481,485) in the last 30 days.
Additionally, this information was correlated with an external third party called SHODAN.IO which shows the Bitcoin client version and last block information.
The first highlighted entry indicates the system is named Yi-T5500.boenyc.us. (Systems Administrator Yi Yu). This could be the administrator’s system running the bitcoin user agent on port 8333 tcp. This means that the system is being used to process bitcoin payments. Additionally, two other hosts are running bitcoin clients (On port 8333), the host 192.111.57.166 and 192.111.57.168 and have block chain information in the last 30 days.
Host:192.111.57.166
This is from the host 192.111.57.166 and shows that the host is likely not a Windows system (likely FreeBSD) as it is running OpenSSH. This host is running a different version of the BITCOIN client (Satoshi:0.11.2) which is indicative that this bitcoin exchange client has been running on the server for a while and is unusual since normally ransomware doesn’t affect FreeBSD.
Host:192.111.57.168
Results for 192.111.57.168 could not be correlated in SHODAN.IO databases. However BITCOIN BLOCK Chain activity appears to have been present in the last 30 days.
The lP addresses 192.111.57.160-168 was reverse traced and found to belong to the following registrant, the entire network from these alerts belong to the organization.
NetRange: 192.111.56.0 – 192.111.63.255
CIDR: 192.111.56.0/21
NetName: BOARDOFELECTIONS-INTHECITYOFNEWYORK
NetHandle: NET-192-111-56-0-1
Parent: NET192 (NET-192-0-0-0-0)
NetType: Direct Assignment
OriginAS: AS22422
Organization: Board of Elections in the City of New York (BEICNY)
RegDate: 2013-01-29
Updated: 2015-07-16
Comment: http://vote.nyc.ny.us
Comment: Emergency Contact:
Comment: 347.827.1075
Ref: https://whois.arin.net/rest/net/NET-192-111-56-0-1
OrgName: Board of Elections in the City of New York
OrgId: BEICNY
Address: 42 Broadway, 6th Fl.
City: New York
StateProv: NY
PostalCode: 10004
Country: US
RegDate: 2012-09-18
Updated: 2012-09-19
Ref: https://whois.arin.net/rest/org/BEICNY
OrgAbuseHandle: YUYI-ARIN
OrgAbuseName: Yu, Yi
OrgAbusePhone: +1-212-487-7035
OrgAbuseEmail: yu@boenyc.us
OrgAbuseRef: https://whois.arin.net/rest/poc/YUYI-ARIN
OrgNOCHandle: YUYI-ARIN
OrgNOCName: Yu, Yi
OrgNOCPhone: +1-212-487-7035
OrgNOCEmail: yu@boenyc.us
OrgNOCRef: https://whois.arin.net/rest/poc/YUYI-ARIN
OrgTechHandle: YUYI-ARIN
OrgTechName: Yu, Yi
OrgTechPhone: +1-212-487-7035
OrgTechEmail: yu@boenyc.us
OrgTechRef: https://whois.arin.net/rest/poc/YUYI-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/whois_tou.html
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/public/whoisinaccuracy/index.xhtml
#
Analysis of 208.69.7.17 Democratic National Mail Server
These are the alerts related to the DNC mail server:
ALERT IP:208.69.7.17 INTELSOURCE_ID:560 CUSTOMER_ID:42074
ALERT IP:208.69.7.17 INTELSOURCE_ID:561 CUSTOMER_ID:42074
ALERT IP:208.69.7.17 INTELSOURCE_ID:562 CUSTOMER_ID:42074
The following was of interest: 208.69.7.17 is the email server of the Democratic National Party (mailer.democrats.org) However, the Intelligence sources for this server indicate that it was on a SPAM blacklist. This is indicative of the server sending unsolicited emails to recipients on the Internet and seems to be a problem but not necessarily a compromise as one may surmise that this server send numerous emails.
The IP address 208.69.7.17 was reverse traced and found to belong to the following registrant, the entire network from these alerts belong to the organization.
NetRange: 208.69.4.0 – 208.69.7.255
CIDR: 208.69.4.0/22
NetName: DNC
NetHandle: NET-208-69-4-0-1
Parent: NET208 (NET-208-0-0-0-0)
NetType: Direct Assignment
OriginAS:
Organization: Democratic National Committee (DSCNC)
RegDate: 2006-07-24
Updated: 2012-03-02
Comment: http://www.democrats.org/
Ref: https://whois.arin.net/rest/net/NET-208-69-4-0-1
OrgName: Democratic National Committee
OrgId: DSCNC
Address: 430 South Capitol Street, S.E.
City: Washington
StateProv: DC
PostalCode: 20003
Country: US
RegDate: 2006-05-11
Updated: 2012-07-03
Ref: https://whois.arin.net/rest/org/DSCNC
OrgTechHandle: IIM3-ARIN
OrgTechName: Internet Infrastructure Manager
OrgTechPhone: +1-202-350-6012
OrgTechEmail: sysadmins@democrats.org
OrgTechRef: https://whois.arin.net/rest/poc/IIM3-ARIN
OrgAbuseHandle: IIM3-ARIN
OrgAbuseName: Internet Infrastructure Manager
OrgAbusePhone: +1-202-350-6012
OrgAbuseEmail: sysadmins@democrats.org
OrgAbuseRef: https://whois.arin.net/rest/poc/IIM3-ARIN
RTechHandle: IIM3-ARIN
RTechName: Internet Infrastructure Manager
RTechPhone: +1-202-350-6012
RTechEmail: sysadmins@democrats.org
RTechRef: https://whois.arin.net/rest/poc/IIM3-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/whois_tou.html
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/public/whoisinaccuracy/index.xhtml
#