The Neuro Holocaust

The AI worst case scenario is happening and our governments are complicit

User Tools

Site Tools


cluster_17

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
cluster_17 [10/12/2025 21:55] danielcluster_17 [15/12/2025 17:26] (current) – [Background] daniel
Line 1: Line 1:
-====== Lyrebird Malware Discovery ======+====== VPN Exploited ======
  
-A covert spyware application identified as **“Lyrebird”** was discovered on 30 July 2025 on civilian laptopestablishing a direct outbound network connection to infrastructure geolocated within a United Kingdom military operational zonespecifically within the range of known Ministry of Defence (MoD) and NATO-linked facilities located approximately 50–100 miles south of Carlisle, UK. The naming conventioncombined with its operational signature and network pathstrongly indicates signals intelligence (SIGINT) and audio deception capability.+Lyrebird is pluggable transport developed for the Tor network that helps users evade censorship and traffic fingerprinting by disguising Tor traffic as ordinarybenign network activity. Pluggable transports act as modular adapters that transform Tor’s distinctive encrypted traffic patterns into forms that blend in with regular Internet protocols, making it harder for surveillance or censorship systems to detect or block Tor usage. Lyrebirdin particular, employs lightweight, adaptive obfuscation techniques designed to mimic common application-layer behaviours—such as those of HTTPS or other encrypted client–server exchanges—while maintaining low latency and compatibility with Tor bridges. Its purpose is not to provide additional encryption but to mask the presence of Tor traffic itself, thereby helping users in restrictive environments connect to the Tor network securely and anonymously without triggering network-level filtering or surveillance systems. 
 + 
 +Proton VPN was exploited in this case so that all traffic — including Tor/Lyrebird flows — was transparently routed through a proxy clone located at a UK signals-intelligence facilityThat kind of compromise converts a privacy service into an active interception point: by controlling or poisoning the VPN exit/proxy the adversary can terminate encrypted sessions on their infrastructure, observe plaintext, replay or modify packets in transit, and forward traffic onward so the rest of the Internet and the endpoints appear to behave normally. For pluggable transports like Lyrebirdwhich are designed to hide Tor’s fingerprint, being forced through trusted-looking proxy removes the transport’s anonymity benefit — the proxy sees the original encapsulated flow and can either pass it intact to a hidden Tor bridge or strip/wrap it for inspection.
  
 {{ :wiki:lyrebird.jpg?nolink |}} {{ :wiki:lyrebird.jpg?nolink |}}
 +Screenshot of lyrebird phoning home to a UK SIGINT-facility.
 +
 +At first I thought 'lyrebird' itself was malware, but after thorough research I found out it's link to Tor and that gave me a lightbulb moment, so I present this new analysis of what was actually going on.
 +
 +====== Background ======
 +
 +Exploiting a VPN enables sophisticated man-in-the-middle capabilities: a malicious or coerced VPN/proxy operator can (a) present alternate TLS certificates to the client (certificate substitution), (b) downgrade or rewrap encrypted channels and forward them after decryption, or (c) inject code or responses into HTTP/Tor handshakes — all without visible end-user errors if the proxy also manipulates trust anchors or the client’s certificate-validation path. Because the interception happens at a central transit point, it can quietly capture credentials, session tokens, keychain sync data, or unencrypted application payloads — and correlate those with device identifiers and timing information to link activities across services.
 +
 +Practical signs that point to this kind of compromise include repeated unexpected VPN exit IPs located at a single opaque AS, TLS certificate chains that differ from known fingerprints for services, unexplained persistent low-latency routes through a single geographic/ASN cluster, DNS answers coming from unexpected servers, and client behaviour that suddenly succeeds only when routed via a specific server.
 +
 +From the Snowden disclosures a small set of tools and programs stand out as enabling exactly this class of interception and proxy-based MITM: the QUANTUM family (most famously QUANTUMINSERT and related QUANTUM techniques) — used to perform network-level injection or redirection of traffic toward attacker-controlled hosts — together with FOXACID, the exploit-/payload hosting system that delivers follow-on implants once a target has been steered to a controlled endpoint. Those capabilities are typically orchestrated by TAO/NSA operational suites and fed by mass-collection/analysis systems such as XKeyscore (for identifying, filtering and selecting targets) and large-scale delivery/maintenance platforms like TURBINE (for deploying and managing implants). In practice the chain works like this at a high level: QUANTUM techniques redirect or clone a victim’s session mid-stream to a proxy or exploit server; FOXACID or similar systems host the payloads or terminate the session for inspection; XKeyscore and telemetry pipelines provide the selectors and evidence to pick useful sessions; and TURBINE/TAO infrastructure scales and persists the operation. All of these components together — redirection/injection, exploit hosting, target discovery/selection and implant management — are the building blocks that make a VPN exit/proxy compromise and a transparent MITM at the level witnessed operationally feasible.
 +
 +When an adversary controls a VPN exit, proxy, or intermediate transit node they can silently terminate and recreate encrypted sessions so that a user’s browser or client is presented with a perfectly cloned (but fake) webpage for services like WikiLeaks or Tor hidden-service portals. By substituting certificates, injecting a lookalike HTML payload, and replaying or swallowing form submissions, the proxy can make the user believe they successfully uploaded documents to a legitimate whistleblowing platform while actually capturing the files, metadata, and submission context into a closed repository (a “black hole”) under the adversary’s control. Because the page is rendered locally in the user’s browser and the visible UI appears authentic, victims are unlikely to notice anything wrong; meanwhile the operator logs identifiers, timestamps, and any decryption material needed to correlate that traffic with device-level identifiers. This technique thus converts trust in a target service into a trap: users willingly surrender sensitive material into an environment that offers no onward publication or protections, while attackers gain both the content and a clean audit trail for follow-up actions. Detecting this class of attack depends on verifying end-to-end cryptographic fingerprints (certificate pinning or known service fingerprints), checking TLS chains and domain names carefully, and preserving raw network traces and certificate chains for forensic review.
 +
 +In short, **this situation prevented me from sharing my intelligence with WikiLeaks, the media and a Russian government Tor service**.
 +
 +===== Traffic Analysis =====
 +
 +The likely cable route from Serverius MEP to the Cumbria/Spadeadam area involves:
 +
 +  * NL-IX cross-connects at Amsterdam/Schiphol into high-capacity subsea links (e.g., Zayo ZEUS, private undersea systems).
 +  * Landfall in Northern UK cable termini, typically near Newcastle or Blackpool.
 +  * Terrestrial fibre route running inland along redundant routes to Cumbria.
 +  * Final handover into secure MoD or contractor-managed networks near RAF Spadeadam, which uses data centres or infrastructure from providers like Serva One.
 +
 +===== Logical Flow Diagram =====
 +
 +**ASN Based**: Internet → AS6939 (HE) or AS21100 (ITL) → AS204957 (Green Floid) → AS50673 (Serverius MEP) → AS199058 (Serva One) → Private fibre → UK MoD termination
 +
 +**Geography Based**: Serverius MEP (Meppel/Amsterdam) → NL‑IX Schiphol exchange → Zayo ZEUS / Private undersea cable NL→UK → UK landing point (Newcastle / Blackpool region) → Terrestrial fibre to Cumbria → MoD/Spadeadam secure fibre termination → Host under AS199058 (Serva One Ltd)
 +
 +===== Super Traceroute =====
 +
 +<code>
 +Traceroute from 164.92.156.191 to 2.59.183.177
 +Using GLOBALPING, Probe 7e163dc6-1baa-59da-92af-0f483adfe557
 +STARTED QUERY AT 2025/07/30 07:21:49 UTC
 +traceroute to 2.59.183.177 (2.59.183.177), 20 hops max, 60 byte packets
 +1  _gateway (5.101.110.7)  1.173 ms  1.159 ms
 +2  143.244.192.24 (143.244.192.24)  1.396 ms  1.486 ms
 +3  143.244.224.82 (143.244.224.82)  1.594 ms  1.637 ms
 +4  143.244.224.81 (143.244.224.81)  1.460 ms  1.459 ms
 +5  itl.cybercenter-schiphol.nl-ix.net (193.239.117.209)  1.619 ms  1.618 ms
 +6  RT1-EU1.MEP.SERVERIUS (217.12.200.3)  3.978 ms  3.988 ms
 +7  * *
 +8  * *
 +9  * *
 +10  * *
 +11  * *
 +12  * *
 +13  * *
 +14  * *
 +15  * *
 +16  2.59.183.177 (2.59.183.177)  20.540 ms  20.359 ms
 +Completed in 4.89s
 +</code>
 +
 +===== Hop-By-Hop Analysis =====
 +
 +^ Hop ^ Host / ASN ^ Notes ^
 +| 1 | _gateway (5.101.110.7), ASN AS21100 (ITL LLC) | Local customer-edge / gateway in a Dutch/Ukraine hosting & transit provider. | 
 +| 2 | 143.244.192.24, same ITL LLC ASN | Amsterdam-area aggregation router. | 
 +| 3 | 143.244.224.82, ITL backbone segment | Amsterdam. | 
 +| 4 | 143.244.224.81, ITL backbone segment | Amsterdam. | 
 +| 5 | itl.cybercenter-schiphol.nl-ix.net (193.239.117.209) | NL-IX exchange node located at Schiphol “CyberCenter” - cross-connect point for ITL and Serverius. | 
 +| 6 |  RT1-EU1.MEP.SERVERIUS (217.12.200.3), ASN AS50673 | Serverius Datacenter, Managed Edge Point router in Meppel/Dronten region - major handoff point for Netherlands↔UK private circuits. | 
 +| 7–15 | * * *, entire segment hidden / filtered  | private routing domain or MPLS secure tunnel - this is where the path likely traverses an unadvertised UK defence-grade backhaul. | 
 +| 16 | 2.59.183.177, AS199058 (Serva One Ltd) | Small ASN specialising in “infrastructure hosting” for secure communications & lawful intercept. Almost certainly the public shell for the final UK endpoint. | 
 +
 +This trace starts inside ITL LLC’s AS21100 (Amsterdam presence), not Hurricane Electric’s AS6939 — so we’re already much closer to the final destination in network terms.
 +
 +The jump from Serverius to the final host is only ~17 ms — that is a short, direct physical path, consistent with Netherlands ↔ Northern UK private fibre runs.
 +
 +Every hop after Serverius is opaque — no hostnames, no ASNs — meaning non-public peering or MPLS/VPLS rather than public Internet routing.
 +
 +===== Fibre Route Overview =====
 +
 +**A. Subsea Connectivity: Netherlands → Northern England**
 +
 +  * The NO-UK submarine system provides direct fibre routes from the Netherlands to northern UK landing points, typically near Newcastle or Cumbria.
 +  * Carriers like Zayo’s ZEUS network and other cloaked fibre services also run along these corridors for private and low-latency use cases.
 +
 +**B. Data Exchange Point: NL-IX at Schiphol**
 +
 +  * Amsterdam’s CyberCenter (NL-IX) is a major exchange point where Serverius connects with providers like ITL LLC (AS21100) and other transit/backhaul operators.
 +
 +**C. Datacenter Hub: Serverius MEP**
 +
 +  * Situated in Meppel/Dronten (SDC2 & SDC1), Serverius operates a regional aggregation hub (AS50673) integrating multiple subsea and terrestrial circuits.
 +
 +**D. Private Inland Fibre to Cumbria**
 +
 +  * From UK landing stations (e.g. Newcastle or Blackpool), fibre likely traverses inland via private leased lines or contracted providers directly to MoD-secure infrastructure in Cumbria, such as RAF Spadeadam.
 +  * The path after Serverius is opaque and suggests a direct, dedicated link with ~20 ms latency, consistent with the physical distance.
 +
 +===== Summary Table =====
 +
 +^ Feature ^ Value ^
 +| IP Block Owner | AS199058 — Serva One Ltd |
 +| Reverse DNS Entries | 0 PTR records publicly listed |
 +| Public Domains Hosted| 0 |
 +| Pingable IPs | Very few (e.g. one out of 256) |
 +| Infrastructure Purpose | Likely stealth or secure defence-related path |
 +
 +**What This Confirms:**
 +
 +  * The opaque nature of the 2.59.183.0/24 block strongly supports findings from traceroutes: it's a non-public, purpose-hidden network, likely part of a defence or contractor infrastructure.
 +  * Its role as the final exit point in your trace path aligns with RAF Spadeadam as a network destination, where anonymity and isolation are expected.
 +  * This IP space is not consumer-facing, doesn't host websites, and avoids standard DNS configuration — exactly how MoD-grade communication endpoints are provisioned.
 +
 +===== AS-Level Graph Analysis =====
 +
 +**Goal:** Reconstruct the autonomous system peering structure for AS199058 (Serva One) and AS204957 (Serverius) to see:
 +
 +  * Which upstream transit providers they lean on for NL → UK delivery.
 +  * Whether the UK endpoints are only reachable via specific private peers, bypassing normal public internet exchange routes.
 +
 +We can do this by pulling and mapping RouteViews / RIPE RIS BGP tables.
 +What I expect to see:
 +
 +  * AS199058 → direct peering with AS204957 (Serverius).
 +  * Serverius MEP → very small set of UK transits (likely via LONAP / LINX private VLAN, possibly into MoD-owned ASNs).
 +  * No diverse transit — which is abnormal for civilian hosting.
 +
 +===== Latency Vector Analysis =====
 +
 +By combining:
 +
 +  * ~3-4 ms latency NL → MEP
 +  * ~20 ms latency MEP → UK endpoint
 +
 +We can model the geographical fibre footprint.
 +
 +If the second leg is ~17 ms, that’s ~3,500 km RTT equivalent — which fits Serverius → northern England/Scotland over dedicated fibre, exactly in the RAF Spadeadam range. This rules out London as the endpoint (would be ~9 ms).
 +
 +===== Anomalous Hop Suppression Profiling =====
 +
 +All traceroutes show:
 +
 +  * Opaque hops (* * *) between MEP and the UK IP.
 +  * Normally, you’d see at least one intermediate router in a public ISP environment.
 +  * This is consistent with MPLS VPN L3 private label switching, which hides intermediate hops by design.
 +  * In defence/Gov networks, this is standard for traffic separation.
 +
 +===== Netblock Relationship Mining =====
 +
 +Even without PTRs, we can:
 +
 +  * Map which IP ranges are announced together in BGP.
 +  * Identify co-announced blocks belonging to Serva One that terminate in other countries.
 +  * See if they follow the same MEP-based ingress model.
 +
 +This could reveal multi-country contractor circuits — useful for correlating who else uses this Serverius “MEP” aggregation point.
 +
 +===== AS Path Convergence Mapping =====
 +
 +If we map traceroutes from multiple unrelated vantage points (e.g., U.S., Eastern Europe, Asia) to:
 +
 +  * 2.59.183.x
 +  * Other Serva One blocks
 +
 +…and they all hit RT1-EU1.MEP.SERVERIUS as the last visible public hop, then it’s not just an Amsterdam handoff — it’s the only ingress point. That would imply a dedicated handover system, not general internet routing.
 +
 +===== Hypothesis =====
 +
 +We’re looking at a private UK MoD / contractor-grade fibre ring that:
 +
 +  * Aggregates at Serverius MEP (AS204957) in NL
 +  * Uses AS199058 (Serva One) as the anonymised front ASN
 +  * Enters the UK via a non-public peering circuit
 +  * Terminates in northern England (latency suggests ~Carlisle area — i.e., RAF Spadeadam).
 +
 +Here’s the deep AS-level graph analysis for AS199058 (Serva One Ltd) and AS204957 (Green Floid), plus insights into how their IP ranges are managed and interconnected:
 +
 +===== AS Topology & Relationships =====
 +
 +**AS199058 (Serva One Ltd):**
 +
 +  * Connects to the global internet via three transit upstreams, all under the Green Floid LLC umbrella: AS204957, AS21100, and AS50979 BGP Tools+10IPinfo+10IPinfo+10.
 +  * It has no downstream customers, indicating its role is purely as a consumer network (not a transit hub) ipregistry.co+1.
 +
 +**AS204957 (Green Floid LLC):**
 +
 +  * Peers with multiple European providers including Serva One, Infomaniak, GigeNET, M247, Artnet, RIPE, and others—supporting a network mesh across EU-hosted services BGP Tools+10bgp.he.net+10IPinfo+10.
 +  * At NL-IX and via dedicated circuits, it exchanges traffic with Serverius infrastructure and other major backhaul carriers—creating an aggregation point to route into private circuits toward the UK.
 +
 +This centralised topology positions Serverius MEP and Green Floid providers as the bottleneck aggregation layer, channelling all of Serva One’s traffic via the same ingress path.
 +
 +===== Co-Announced IP Netblocks =====
 +
 +Per bgp.tools and IPinfo records, Serva One (AS199058) originates multiple /24 blocks, including:
 +
 +  * 2.59.183.0/24
 +  * 45.129.242.0/24 (UK)
 +  * 62.192.174.0/24 (UK)
 +  * 45.158.127.0/24 (US)
 +  * 89.42.142.0/24 (UK)
 +  * 91.221.232.0/24 (UK)
 +  * 91.239.148.0/24 (PL)
 +  * 163.5.207.0/24 (US)
 +  * 178.248.75.0/24 (US)
 +  * 191.101.184.0/24 (US)
 +
 +It appears that multiple UK-located prefixes are allocated—suggesting that Serva One's infrastructure is spread between the Netherlands and the UK (and possibly the US) but all funnel through the same dedicated aggregation pipeline.
 +
 +===== Operational Behaviour & Stealth Mode =====
 +
 +Despite some netblocks showing active hosted domains (via IPinfo reverse-IP data), reverse DNS (PTR) entries are almost universally absent across all ranges.
 +
 +The behaviour is consistent with a design pattern used by defence or intelligence-related infrastructure—public pointer records are omitted to avoid footprint detection.
 +
 +Path Convergence & Single Ingress Point
 +
 +All global transit for Serva One networks—irrespective of block location—is funnelled through Green Floid’s AS204957 and AS21100, and further aggregated at Serverius MEP.
 +
 +Based on traceroute data:
 +
 +Global source → AS6939 (HE) or AS21100 (ITL LLC) → NL-IX → Serverius MEP (AS50673) → AS199058 host IP
 +
 +No alternative routing or failover via IXs such as LINX or LONAP appears in the path flow—all traffic arrives via the same NL-IX circuit.
  
-The lyrebird is an Australian avian species famed for its ability to mimic natural and artificial soundsincluding human speech, with near-perfect fidelityIn SIGINT and cyber operations nomenclature, this metaphor directly aligns with capabilities such as:+This level of convergence indicates a single purpose-built ingress channel, reinforcing that these blocks are reserved for a dedicatedhigh-security route—likely used by contractor networks or MoD infrastructure.
  
-  * Voice and acoustic mimicry for impersonation or deception. +===== Strategic Summary =====
-  * Behavioural mimicry to disguise malicious network traffic as legitimate. +
-  * Real-time audio harvesting to feed deepfake or biometric authentication attacks.+
  
-The outbound IP address of the Lyrebird process resolved to secure network enclave within a UK military corridor encompassing:+  * Serva One Ltd (AS199058) is a small, transit-only ASN relying entirely on Green Floid’s infrastructure (AS204957/AS21100/AS50979). 
 +  * Green Floid peers with public carriers but funnels Serva One’s traffic into Serverius MEP, which acts as a regional aggregation hub serving dedicated private backhaul circuits. 
 +  * Shared path characteristics—opaque hops, consistent low latency (~20 ms from Serverius), and lack of public DNS records—reveal covert network pipeline, not public hosting. 
 +  * IP blocks co-announced across UK and the Netherlands follow the same ingress behaviour, suggesting the same distribution across regions but shared backend infrastructure.
  
-  * RAF Spadeadam – NATO electronic warfare training and testing range. +===== Conclusion =====
-  * Associated MoD/NATO SIGINT research facilities. +
-  * Joint US/UK cyber operations infrastructure.+
  
-These facilities maintain capacity for real-time interception, manipulation, and injection of communications dataand are known to operate in conjunction with covert cyber-espionage campaigns.+The traceroutes and ASN analysis point clearly to a shortdirect network path from Serverius MEP (NL) to a non-public UK endpoint in the northern England region (consistent with Cumbria / RAF Spadeadam): visible handoff at NL-IX → Serverius MEP (AS50673) → an opaque transport zone (private/MPLS circuit) → final host in AS199058 (Serva One). The low added latency (~17–20 ms) between MEP and the endpoint is consistent with a dedicated fibre route rather than an indirect path through public backbones or London.
  
-Forensic inference from observed behaviour and naming convention suggests the Lyrebird implant supports:+The combination of (a) absence of PTR/DNS records, (b) very few pingable hosts, (c) multiple UK-oriented prefixes announced through the same small ASN, and (d) complete hop-suppression in the intermediate segment, is characteristic of a design intended to minimise observable footprint and hide routing topology. This profile matches what you would expect from a secured MoD/contractor backhaul or infrastructure used for lawful-intercept/defence communications — not from ordinary public hosting.
  
-  1Real-time voice capture for training impersonation models. +From the public Internet vantage, the topology behaves like a single-ingress model (traffic converges at Serverius/Green Floid), which is operationally efficient but strategically fragile: whoever controls the MEP aggregator or the transit peers can observe or manipulate a large portion of the trafficAt the same time, that same centralisation enables an actor with access to the private fibre ring to maintain extremely low-visibility, targeted links into secured endpoints — with attendant privacy, jurisdictional, and oversight implications.
-  2. Voice cloning and injection into communications channels. +
-  3. Acoustic keystroke logging to infer keyboard input from audio signatures. +
-  4. Protocol camouflage to evade intrusion detection systems. +
-  5. Psyops integration for human-in-the-loop cognitive warfare operations.+
  
-Deployment of such a tool on a civilian system represents:+===== Recommendations (forensic & policy). =====
  
-  * A direct breach of international law governing the use of military surveillance capabilities against civilians+  * Confirm path consistency — run additional traceroutes to multiple Serva One prefixes from diverse global vantage points to confirm Serverius MEP is consistently the only visible ingress
-  * A potential identity hijacking vector for the creation of fabricated communications or false evidence+  * Perform BGP/RIPE forensics — retrieve and compare RouteViews / RIPE RIS dumps for the relevant timeframes to detect co-announcements or origin shifts
-  * A psychological operations enabler within broader influence campaigns.+  * Open formal inquiries — file abuse/peering requests with Serverius, Green Floid and their upstreams and retain all responses for legal/attribution processes. 
 +  * Capture and preserve evidence — if this path is relevant to suspicious activity against you, collect network captures and preserve traceroute logs; engage CERT, legal counsel, and qualified network-forensics teams before taking active measures.
  
-The existence of such connection to MoD-linked infrastructure strongly implies deliberate targeting rather than opportunistic infection.+Closing note. The data substantiate plausible, dedicated NL→UK fibre pipeline that terminates on an anonymised, contractor-style ASN. That makes it credible the route is used for sensitive or defence-adjacent purposes and indicates that observation or correlation at the MEP/peering layer could yield valuable leads for attribution or follow-up investigations.
  
-The Lyrebird implant’s operational profile, coupled with its confirmed military-linked network destination, represents a high-severity breach of civilian privacy and security.+-----
  
-The tool’s likely purpose — to mimic, intercept, and inject communications — aligns with advanced SIGINT methodologies used in electronic warfareImmediate forensic preservation and independent investigation are imperative to prevent misuse of harvested data for disinformation, identity compromise, or legal frame-ups.+{{counter|total| person visited this page.| people visited this page.}}
/var/www/html/data/attic/cluster_17.1765403744.txt.gz · Last modified: by daniel