I did some digging. There is an investigation into the Interwarp ISP leak that was posted about on RF. The CoomingProject Ransomware actor, I believe led to the leak in the first place, and some users began posting direct details of employees at the ISP. According to research and confirmed sources, this has been ongoing since on or before September 26, 2022. Interesting to note that on the days leading up to that date, there was an information
exposure of the staff portal and resulted in the site being down for maintenance shortly after. The investigation has led to other domains where the leak was posted about, being seized as well. It has even led to he suspected turnover of the entity known as .@Omnipotent, a male from Europe according to the FBI. So it should be assumed that this Admin has been working with the FBI since at least late September, early October. The actual domain was last updated: February 25, 2022 so it should also be assumed this was the domain seizure date.
A user from Twitter posted the details of the domain name servers now in use for the domain raidforums [dot] com here, DNS used in other seizures.
https://pbs.twimg.com/media/FNjt4e_aIAIvI9v?format=png&name=900x900
So, it seems the FBI has setup both an internal honeypot and a whaling operation on the following IPs:
EC2 instance detected: 216[.]182.229.162
Code:
ip: "216[.]182.229.162"
city: "Ashburn"
region: "Virginia"
country: "US"
loc: "39.0437,-77.4875"
org: "AS14618 Amazon.com, Inc."
postal: "20147"
timezone: "America/New_York"
asn: Object
asn: "AS14618"
name: "Amazon.com, Inc."
domain: "amazon.com"
route: "216[.]182.224.0/21"
type: "hosting"
company: Object
name: "Amazon.com, Inc."
domain: "amazon.com"
type: "hosting"
privacy: Object
vpn: false
proxy: false
tor: false
relay: false
hosting: true
service: ""
abuse: Object
address: "US, WA, Seattle, Amazon Web Services Elastic Compute Cloud, EC2, 410 Terry Avenue North, 98109-5210"
country: "US"
email: "abuse@amazonaws.com"
name: "Amazon EC2 Abuse"
network: "216[.]182.224.0/20"
phone: "+1-206-266-4064"
domains: Object
total: 0
domains: Array
[*] Internal honeypot was detected using active IDS on: ip-10-0-0-14.ec2.internal
Nice one, FBI. :>
Using Amazon to phish for hackers is their only play here, it seems?