Your business’ toughest competition might be criminal. See why.
Utility navigation bar redirect icon
Portal LoginSupportContact
Search
Close search
Huntress Logo in Teal
  • Platform Overview
    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed ITDR

    Protect your Microsoft 365 identities and email environments.

    Managed ITDR

    Protect your Microsoft 365 identities and email environments.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Huntress Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Huntress Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Huntress Managed ESPM

    Proactively secure endpoints against attacks.

    Huntress Managed ESPM

    Proactively secure endpoints against attacks.

    Integrations
    Integrations
    Support Documentation
    Support Documentation
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
  • Threats We Stop
    Phishing
    Phishing
    Business Email Compromise
    Business Email Compromise
    Ransomware
    Ransomware
    View Allright arrowView Allright arrow
    Industries We Serve
    Education
    Education
    Financial Services
    Financial Services
    State and Local Government
    State and Local Government
    Healthcare
    Healthcare
    Law Firms
    Law Firms
    Manufacturing
    Manufacturing
    Utilities
    Utilities
    View Allright arrowView Allright arrow
    Tailored Solutions
    MSPs
    MSPs
    Resellers
    Resellers
    SMBs
    SMBs
    Compliance
    Compliance
    Cybercriminals Have Evolved

    Get the intel on today’s cybercriminal groups and learn how to protect yourself.

    Huntress Cybersecurity
    Cybercriminals Have Evolved

    Get the intel on today’s cybercriminal groups and learn how to protect yourself.

    Huntress Cybersecurity
  • Pricing
  • Community Series
    The Product Lab

    Shape the next big thing in cybersecurity together.

    The Product Lab

    Shape the next big thing in cybersecurity together.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    Resources
    Upcoming Events
    Upcoming Events
    ebooks
    ebooks
    On-Demand Webinars
    On-Demand Webinars
    Videos
    Videos
    Whitepapers
    Whitepapers
    Datasheets
    Datasheets
    Cybersecurity Education
    Cybersecurity 101
    Cybersecurity 101
    Cybersecurity Guides
    Cybersecurity Guides
    Threat Library
    Threat Library
    Real Tradecraft, Real Results
    Real Tradecraft, Real Results
    2026 Cyber Threat Report
    2026 Cyber Threat Report
    The Huntress Blog
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
  • Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    The Huntress SOC

    24/7 Security Operations Center

    The Huntress SOC

    24/7 Security Operations Center

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Community

    Get in touch with the Huntress Community team

    Community

    Get in touch with the Huntress Community team

    Compare Huntress
    Bitdefender
    Bitdefender
    Blackpoint
    Blackpoint
    Breach Secure Now!
    Breach Secure Now!
    Crowdstrike
    Crowdstrike
    Datto
    Datto
    SentinelOne
    SentinelOne
    Sophos
    Sophos
    Compare Allright arrowCompare Allright arrow
  • HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    Partners
    MSPs

    Join our partner community to deliver expert-led managed security.

    MSPs

    Join our partner community to deliver expert-led managed security.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Tech Alliances

    Driving innovation through global technology Partnerships

    Tech Alliances

    Driving innovation through global technology Partnerships

    Microsoft Partnership

    A Level-Up for Your Business Security

    Microsoft Partnership

    A Level-Up for Your Business Security

  • Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Awards
    Awards
    Contact Us
    Contact Us
  • Portal Login
  • Support
  • Contact
  • Search
  • Get a Demo
  • Start for Free
Portal LoginSupportContact
Search
Close search
Get a Demo
Start for Free
HomeBlog
Brute Force or Something More? Ransomware Initial Access Brokers Exposed
Published:
April 10, 2025

Brute Force or Something More? Ransomware Initial Access Brokers Exposed

By:
Anton Ovrutsky
Dray Agha
Josh Allman
Share icon
Glitch effectGlitch effectGlitch effect

Every intrusion that we comb over here at Huntress is different in its own way. Although there are definitely discernible patterns when it comes to intrusions, us analysts are often left guessing as to threat actors' intentions and motivations. 

Sometimes, a case breaks established patterns and reveals itself as more interesting, or, at least, worthy of a closer look. 

This blog will cover an example of one such case—one that began with a simple brute force attack and led to the unraveling of infrastructure and tradecraft that we suspect as being linked to a larger ransomware ecosystem, particularly initial access brokers. 


Attack narrative 

In this case, a network was exposing a Remote Desktop (RDP) server to the broader internet. We’ve talked about the dangers of this dynamic through different webinars, blogs, and social media posts, yet often businesses have no choice but to expose RDP for a myriad of reasons. 

In this instance, our Security Operations Center (SOC) received an alert for some domain enumeration and got to work. 

Brute force

Although intrusions are often written about in a linear fashion, neatly mapped to frameworks like ATT&CK, the reality is that analysts often receive signals for intrusions that are normally found in the “middle” of a threat actor's kill chain. This means that once a signal is received, we have to work both backward and forward in time to find both the source of the intrusion as well as any go-forward attack paths. 

In this case, upon investigation of the Windows event logs for the affected hosts, we discovered that the RDP service was being brute forced. 

Although brute forcing is considered a “bread and butter” type attack technique, investigation of brute force attacks, particularly in networks with default logging configurations, can get a little tricky. Often, recorded login attempts fill up the log channels with security-relevant telemetry being overwritten or discarded. Adding to this dynamic are various service accounts for inventory or vulnerability scanning tooling that often generates failed logins to various services. 

Here, the relevant telemetry was thankfully available, and a successful brute force attack was discovered. Although a multitude of accounts were targeted via this brute force attack, only one account was successfully compromised. 

Using this compromised account as a pivot point, we discovered that the account had been compromised from multiple IP addresses. This dynamic is at least somewhat atypical or nonstandard for what we'd expect to see in most intrusions. Upon further review of the timestamps of the successful logins, evidence suggested that this compromise was not from multiple threat actors, but from one threat actor utilizing infrastructure that allowed compromise from various servers.


Figure 1: Initial SOC incident report showing brute forcing from multiple IP addresses

The successful brute force of the exposed RDP server meant that the threat actor now had access to the victim's network. Once this access was established, the threat actor proceeded to enumerate the domain, including various groups and domain configurations.


Figure 2: Image showing domain enumeration commands

When these enumeration signals were investigated by the SOC and determined to be malicious, network-wide isolation was issued to prevent further lateral movement within the network. 

At first glance, this may seem like a straightforward incident: a successful brute force occurs, the threat actor lands in the network, and proceeds to enumerate said network prior to being discovered and shut down by the SOC. This time, however, upon reviewing other bits of telemetry after isolating the network, we discovered something particularly interesting and out of step with the normal threat actor activity patterns we observe.

Something feels off

When threat actors land inside a network—either through an RDP intrusion like we’ve covered so far or through other means such as VPN compromise—they'll typically enumerate the network, gather credentials, and move laterally. 

Typically, credential access in these scenarios consists of extracting credentials from the Windows LSASS process through tooling like Procdump or Mimikatz or credential access via registry dumping via something like Secretsdump. In some cases, we’ve also observed threat actors going after browser cookies. 

We often don't observe threat actors going through file systems or file shares to look for credentials in files. In this intrusion, however, we observed just this. 

Absent hard evidence, we can only offer educated speculation as to why this dynamic plays out the way it does. Our hypothesis is that most threat actors have a playbook that's followed. Extracting passwords from the registry or from LSASS can be performed in a playbook-type fashion, with commands and tooling differing little from environment to environment. This isn't the case for passwords in files, as these can be found in many places on the network. In addition, once credentials are extracted from the registry and from LSASS, we can surmise that these credentials are utilized in one way or another within the network, making them attractive to threat actors. In contrast, credentials found in files may be historical, old, or outdated, and they need manual testing to verify whether they actually grant access to a targeted resource. 

In this particular instance, the threat actor chose a manual approach, using Notepad to open up text files that ostensibly contained credential materials:


Figure 3: Image showing process tree with notepad opening text files containing passwords

When we examined the jumplist artifacts from the affected host, we noticed even more threat actor activity linked to credentials in files.


Figure 4: Forensic evidence of threat actor looking through “password” themed files

This uncharacteristic tradecraft prompted a second and closer examination of the IP addresses associated with the brute force attack.


Unraveling the infrastructure

An initial look at the offending IP addresses resulted in some hits via Maltrail, which indicated that the IP in question was associated with Hive ransomware: 



Figure 5: Image showing brute force IP addresses associated with Hive ransomware

Other reporting via CISA also links this particular IP address to BlackSuit.

With this information now in our possession, we wanted to pivot from this data point and look for any interesting domain names. When examining the TLS certificates associated with the brute-forcing IP address, we discovered an interesting domain name of specialsseason[.]com: 



Figure 6: Image showing certificate information for a malicious domain 

Now that we had a domain name associated with the offending IP address, we pivoted to the TLS certificate fingerprint to see if we could identify further malicious infrastructure consisting of either IP addresses or domain names. 

This yielded surprising results, and we found multiple related IP addresses and domain names: 


Figure 7: Image showing pivot from initial certificate fingerprint to other domains

When reviewing the IP addresses and their associated domain names, a pattern emerged. Each of the IPs resolved with the same naming convention: NL-<countrycode>.specialsseason[.]com

Below is a full listing of all the various country codes found associated with the TLS certificate of the IP address used in the original brute force attack:

Figure 8: Image showing Google search for specialsseason domain with an additional domain displayed

We can observe a fairly robust network that's geographically distributed. Also interesting to note here is multiple “Ru” / Russian codes as well as multiple US country codes. 

Many of the IP addresses associated with the above country codes also contained various listening services on various ports. An examination of TLS certificates of these IPs presented an opportunity for a further pivot revealing yet another malicious domain name of 1vpns[.]com: 


Figure 9: Image showing pivot from certificate fingerprint hash to additional domains

Interestingly, this domain name is very similar to the legitimate VPN site, but without the extra “s” after “1vpn”:  https[:]//1vpn[.]org/ 

Some domain names mean nothing and are random but here we don't believe that to be the case. The term “Special season” also referred to as “big game hunting” has been a common phrase used to describe financially motivated threat groups, typically ransomware targeting high-value and or high-impact organizations.

Two public threat reports link the use of this VPN service to two separate ransomware groups—an additional service advertised 1jabber[.]com with a list of “funny”’ domains.

Figure 10: Image showing additional domains

Specifically focusing on the mention of nologs[.]club, whereas the VPN service FAQ also comments on the fact they keep 0 logs, which would make this an ideal service for any cybercriminal. 

We often read about ransomware cases through a lens of techniques, tactics, procedures, and other abstract elements. We often hear terms like “initial access brokers” but often don't get an inside view into their operations, particularly through an infrastructure lens. In this case, we can see how these nefarious actors operate and can get a glimpse into their motivations as well as the kinds of elements that make up their ecosystem. A clear motivation to get as much credential material as possible is evident in this case. This case also demonstrates the need to sometimes go beyond traditional incident response, where a “zooming out” is required. Here, a “simple” brute force turned out to unravel an entire ecosystem and infrastructure for ransomware operators. 

Most intrusions don't facilitate this kind of analysis either due to lack of telemetry or many other factors. This intrusion is different in that a tiny little thread of evidence led to an unraveling of a proverbial yarn of ransomware infrastructure. The evidence also provides insight into the behavior and objectives of these threat actors in a manner that's difficult to convey through static IOCs or TTPs. 


Conclusion 

Ransomware continues to disrupt businesses large and small alike. For many security professionals, a brute force is a “bread and butter” technique that's been covered and written about for many years. Many analysts may see a brute force attack and will move on with their day. At Huntress, however, we're always looking to “SOC and Awe,” constantly pulling on every and any investigative thread that we can get our fingers on.

In this case, what started out as a simple brute force attack turned out to unravel a rather large suspected ransomware-as-a-service ecosystem, specifically one that's suspected to be utilized by initial access brokers who facilitate this illicit dynamic. 


Indicators of Compromise

IOC Type

IOC

IP Address

64.190.113[.]159

IP Address

147.135.36[.]162

Domain

specialsseason[.]com

Domain

1vpns[.]com

Certificate Fingerprint (SHA256)

6bc8b8f260f9f9bfea69863ef8d3c525568676ddadc09c14655191cad1acdb5b

Certificate Fingerprint (SHA-1)

65899cd65dd753d2eef5463f120ae023e873e1bd

Certificate Fingerprint (SHA-246)


b884cce828f06fb936fd5809d5945d861401c606c4ebe894464c99e6473e9570

          
Summarize this postClose Speech Bubble
ChatGPTClaudePerplexityGoogle AI

See Huntress in action

Our platform combines a suite of powerful managed detection and response tools for endpoints and Microsoft 365 identities, science-backed security awareness training, and the expertise of our 24/7 Security Operations Center (SOC).

Book a Demo
Share
Facebook iconTwitter X iconLinkedin iconDownload icon

Sign Up for Huntress Updates

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.
Privacy • Terms
By submitting this form, you accept our Terms of Service & Privacy Policy
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Huntress Managed Security PlatformManaged EDRManaged EDR for macOSManaged EDR for LinuxManaged ITDRManaged SIEMManaged Security Awareness TrainingManaged ISPMManaged ESPMBook a Demo
PhishingComplianceBusiness Email CompromiseEducationFinanceHealthcareManufacturingState & Local Government
Managed Service ProvidersResellersIT & Security Teams24/7 SOCCase Studies
BlogResource CenterCybersecurity 101Upcoming EventsSupport Documentation
Our CompanyLeadershipNews & PressCareersContact Us
Huntress white logo

Protecting 215k+ customers like you with enterprise-grade protection.

Privacy PolicyCookie PolicyTerms of UseCookie Consent
Linkedin iconTwitter X iconYouTube iconInstagram icon
© 2025 Huntress All Rights Reserved.

Join the Hunt

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.

By submitting this form, you accept our Terms of Service & Privacy Policy