top of page

Attack Correlation: Finding the Clusters Oz Missed

  • Writer: Patrick Duggan
    Patrick Duggan
  • Feb 15
  • 2 min read

# Attack Correlation: Finding the Clusters Oz Missed


**Classification:** TLP:WHITE




The Gap



Our autonomous system (Oz) blocked 1000+ IPs from coordinated attack campaigns. Individual decisions, all correct. But it never connected the dots.


Today we ran subnet aggregation on our block logs. Found three attack clusters hiding in plain sight.




Cluster 1: DMZHOST Bulletproof Hosting



**Range:** 45.148.10.0/24

**Blocked IPs:** 12

**Owner:** TECHOFF SRV LIMITED

**Registered:** Andorra

**Abuse Contact:** [email protected]


When your abuse contact is a gmail address, you're not running a legitimate hosting company. You're running a bulletproof operation.


**Status:** BLOCKED + INDEXED




Cluster 2: Alibaba Cloud Singapore



**Ranges:** 47.79.201.x, 47.79.202.x, 47.79.203.x

**Blocked IPs:** 110+

**Owner:** Alibaba Cloud LLC


Three adjacent /24s from the same cloud provider, all hitting us in coordinated fashion. This is either:

- A customer abusing Alibaba Cloud for scanning

- A compromised account running a botnet

- State-sponsored activity using commercial cloud cover


110 IPs from adjacent ranges isn't coincidence. It's infrastructure.


**Status:** BLOCKED + INDEXED




Cluster 3: OVH Canada Botnet



**Range:** 54.39.89.0/24

**Blocked IPs:** 1000+

**Owner:** OVH Hosting, Inc.


One thousand IPs from a single /24. This is a botnet or commercial scanner farm. OVH is notorious for hosting both.


**Status:** INDEXED (already heavily blocked)




The False Positives We Caught



Not everything is malicious:


| Range | Owner | Assessment |

|-------|-------|------------|

| 205.210.31.x (90 IPs) | Palo Alto Networks | Security scanning - legit |

| 40.77.167.x (55 IPs) | Microsoft | Bing crawlers - legit |

| 52.167.144.x (50 IPs) | Azure | Cloud services - legit |


Palo Alto scanning us is actually a good sign - means we're on their radar for threat intel collection.




STIX Graph Findings



Our STIX feed shows:

- **582 relationship objects** mapping threat actor infrastructure

- **49 threat actors** share a single VPN provider in Seattle

- Infrastructure reuse patterns suggest coordination between nominally separate groups


When 49 different threat actors use the same VPN exit node, either:

1. That VPN is compromised

2. Those "49 groups" are actually fewer groups with multiple names

3. There's a shared tooling/infrastructure provider serving multiple APTs




Why Oz Missed It



Oz makes per-IP decisions. Each block was correct. But the system never asked: "Are these IPs related?"


**What we're adding:**

- Subnet aggregation in the consumer attack correlator

- /24 clustering detection

- Alert threshold: 4+ IPs from same /24 = flag for review


Individual trees, no forest. Fixed now.




IOCs



**Block these ranges:**





**Stealthy outliers still under investigation:**

- 111.7.100.42 (China Mobile)

- 139.186.206.86 (APNIC/CN)

- 185.182.194.245 (Netherlands)

- 23.27.145.x (US - two IPs, same /24)




Methodology



1. Pulled 1000 most recent block events

2. Grouped by /24 subnet

3. Ranked by IP count per subnet

4. WHOIS'd the top offenders

5. Cross-referenced with STIX relationships

6. Indexed findings, blocked ranges


Total time: 15 minutes. Should have been automated.




*The blocks were right. The correlation was missing. Now it's not.*





*Her name was Renee Nicole Good.*


*His name was Alex Jeffery Pretti.*

 
 
 

Comments

Rated 0 out of 5 stars.
No ratings yet

Add a rating
bottom of page