<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: erickcodes-dev</title>
    <description>The latest articles on DEV Community by erickcodes-dev (@erickcodesdev).</description>
    <link>https://dev.to/erickcodesdev</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3861906%2F33709b25-d2ca-4676-bd7c-a7c6fd2165fb.png</url>
      <title>DEV Community: erickcodes-dev</title>
      <link>https://dev.to/erickcodesdev</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/erickcodesdev"/>
    <language>en</language>
    <item>
      <title>I Traced a "Cute" Minecraft Phishing Site to a C2 Server in Chicago</title>
      <dc:creator>erickcodes-dev</dc:creator>
      <pubDate>Sun, 05 Apr 2026 07:13:58 +0000</pubDate>
      <link>https://dev.to/erickcodesdev/i-traced-a-cute-minecraft-phishing-site-to-a-c2-server-in-chicago-20g6</link>
      <guid>https://dev.to/erickcodesdev/i-traced-a-cute-minecraft-phishing-site-to-a-c2-server-in-chicago-20g6</guid>
      <description>&lt;p&gt;Hello community! As an IT engineering student, I recently conducted a technical investigation into an active threat targeting the gaming community (specifically Minecraft players).&lt;/p&gt;

&lt;p&gt;What appeared to be a harmless "cute" website turned out to be a Phishing and Malware-as-a-Service (MaaS) infrastructure. Here is a technical breakdown of my findings:&lt;/p&gt;

&lt;h2&gt;
  
  
  PHISHING AND MALWARE SPREAD THROUGH DISCORD
&lt;/h2&gt;

&lt;p&gt;The primary domain identified is owocraft.com. At first glance, it uses Tailwind CSS and a Turkish-coded template (identified by source code comments such as /* Sayfa Fade-in Animasyonu */).&lt;/p&gt;

&lt;p&gt;The main deception is a download button for a fake "Launcher" that actually points to a malicious .rar file hosted on Dropbox (ID: 3d1d505ajob480fkdnpm3). This file contains a Discord Token Stealer.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Unmasking the Infrastructure&lt;/strong&gt;&lt;br&gt;
Despite using Cloudflare for obfuscation, I performed a passive DNS analysis and utilized OSINT tools (Censys/Shodan) and other tools to identify the real origin server:&lt;/p&gt;

&lt;p&gt;Command &amp;amp; Control (C2) IP: 209.182.219.131&lt;/p&gt;

&lt;p&gt;Provider: Kamatera (Global Cloud Infrastructure LLC).&lt;/p&gt;

&lt;p&gt;Location: Chicago, IL, USA.&lt;/p&gt;

&lt;p&gt;System Info: Windows Server 2016 administered via RDP with the hostname SUNRATE01-1.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Network Correlation&lt;/strong&gt;&lt;br&gt;
This is not an isolated site. By correlating tracking tokens and CSS fingerprints, I identified several other active domains sharing the same infrastructure and payload:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;kittycraft.online&lt;/li&gt;
&lt;li&gt;ragnacook.site&lt;/li&gt;
&lt;li&gt;cutecraftsmp.com&lt;/li&gt;
&lt;li&gt;playsweetcraft.site&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;There are probably many more, since there are over 19 pages with different domains but the same Cloudflare token.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Incident Response &amp;amp; Mitigation&lt;/strong&gt;&lt;br&gt;
In accordance with professional ethics, I documented and reported the issue to the relevant global providers:&lt;/p&gt;

&lt;p&gt;GoDaddy: Criminal abuse report (Claim ID: DCU101215117).&lt;/p&gt;

&lt;p&gt;Google Trust Services: SSL certificate revocation request.&lt;/p&gt;

&lt;p&gt;Google Safe Browsing: Malicious site report for browser-level blocking.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Focwlp5pelyo232r6pgei.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Focwlp5pelyo232r6pgei.png" alt=" " width="800" height="407"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;Prevention&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;I recommend the following measures to avoid falling victim to these types of "Social Engineering" attacks:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Verify the Origin:&lt;/strong&gt; Never trust "Custom Launchers" or "Performance Boosters" from unofficial sources. If it’s not from a verified developer or a reputable open-source repository (like GitHub).&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Analyze the URL:&lt;/strong&gt; Scammers often use domains like .online, .site, or .art because they are cheap to register in bulk. Always check the WHOIS data for the registration date; a site created only 3 months ago claiming to have "10,000+ players" is likely a fraud.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Discord Security:&lt;/strong&gt; Enable 2FA (Two-Factor Authentication) and never share your Discord Token. Remember: no legitimate application will ever ask you to paste a script into your browser console or download a .rar to "verify" your account.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Virtualize for Safety:&lt;/strong&gt; If you must test a new mod or client, use a Virtual Machine (VM) or a "Sandbox" environment to isolate the execution and protect your host system.&lt;/p&gt;

&lt;p&gt;Although we have identified the C2 infrastructure and the payload distribution system, identifying the individuals behind this network remains difficult.&lt;/p&gt;

&lt;p&gt;Use of VPNs and proxies: Attackers almost never connect directly to their servers. They use multiple layers of encrypted VPNs and proxies to hide their original location and IP address.&lt;/p&gt;

&lt;p&gt;Infrastructure as a Service (IaaS): By using providers like Kamatera or Cloudflare, they create a barrier between their physical location and the malicious content.&lt;/p&gt;

&lt;p&gt;Many of these actors hop from one hosting provider to another, exploiting those that ignore the DMCA and abuse reports.&lt;/p&gt;

&lt;p&gt;They use ghost accounts, cryptocurrencies for payments, and encrypted communication channels like Telegram, leaving very little digital trail for law enforcement.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;There are probably more reports on this online, so do your research; my content is just a contribution&lt;/strong&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>phishing</category>
    </item>
  </channel>
</rss>
