The setup
A friend of mine, Vazz, noticed on his google slide account that there were several shared slides that appeared to be compromised. As in, he had no idea where these slides came from, or what they were doing connected to his Google account. And there were like, dozens of them.
![Google Slides](/assets/images/posts/slides.png)
He didnāt have ownership over these slide sets, and at first glance they appeared to either be spam or outright malicious. Immediately, we both assumed his Google account had been hacked or something. I got on a Discord call with him to try and do some incident response, see if we couldnāt contain and assess whatever was going on. Vazz was using Chrome on his Mac, and was sharing his screen to me as I talked with him and took notes. More than anything, we were intrigued. This looked like nothing else Iād seen.
The evidence
So, we began gathering evidence and discovered some facts.
- Google listed the slide decks as being created in 2019.
- Vazz did not own the slides, they were being shared with him.
- Google said the last time Vazz had looked at these slides was November 13th, 2020.
- Vazz said he couldnāt remember the last time heād actually checked his google slides - he didnāt use it often.
- The slides were an absolute cluster of information. Different languages, nonsense words and phrases, popular meme slogans and sayings, random images and videos made up the content of them.
- However, nothing within the slides was outright malicious, spam, or illicit. Everything pointed back to a company by the name of āTakashumi Holdings Companyā.
- The slides also linked exclusively to a google sites website, displaying the same company name.
- This website was massive and sprawling, with the worst UX Iāve ever seen. It contained thousands of hyperlinks, external pages, and was composed primarily of linked google docs and google slides (like the ones that brought Vazz here)
- By far the website was one of the largest Iāve ever seen. The content appeared to be more chaos than anything else, but, there was a lot of content.
- The google site appeared to be one of many satellite sites. In the top left, the site was described as āT61 PreSite Freeā, and via hyperlinks more sites were discovered (T1 and so on).
![Google Site](/assets/images/posts/google-site.png)
- Site manager email appeared to be ā[email protected]ā. Searching this email yielded no new info.
- Buried within the site a name was found, āDavid Evansā and a picture of a middle aged man. Reverse-image searching, we found that this man is on the board of Education at a Missouri school (same photo).
![David](/assets/images/posts/david.png)
- Searching for the company name yielded the same google site, a Facebook page, Twitter account, Youtube account, and Instagram among other accounts also by the same name.
- These additional social media accounts also appeared to follow the same nonsense format - posting completely random photos and comments across each otherās accounts.
![Youtube](/assets/images/posts/youtube.png)
- On twitter, a user āAndy Baioā tweeted out a link to the google site on November 13th, 2020. Andy is a prolific developer, who has many followers, and appeared to be in control of his account after that random tweet (all that to say, I donāt think his account got hacked to post that link).
![Tweet](/assets/images/posts/tweet.png)
- Performing steganography scans on some of the website images yielded no hidden data.
- At some point in the maze of google slides and sub-sites, the name āCicada 3301ā was referenced. This is a famous internet cyrptography/stegonography puzzle that started in 2012.
The theories
As we dug deeper into this rabbit hole of a story, I worked under the assumption of a few possible theories as to what the heck was happening:
Theory One
Vazzās google account could have been compromised by a malicious actor. This actor then created these slides, either as a prank or for illicit purposes, and then left them with Vazz so that way they would show up in his google slides. This had happened months ago, and Vazz never checked his slides until now. There was a few issues with this:
- Vazz had Multi-Factor Authentication (MFA) enabled. This would have made it difficult/impossible to breach his account.
- Vazz had no unauthorized logins since google security started recording them.
- Vazz had no outstanding sessions. Every device that he was signed in on was authorized.
- Vazz had not had a breach since he had last changed passwords (haveibeenpwned.com)
- Vazz didnāt actually even have ownership of the slides in question.
- No other Indicators of Compromise (IOCs) existed on his account. The slides appeared as the lone anomaly.
Theory Two
Vazz was working with another individual that owned these google slides. This could have been sometime in the last year, and the collaboration was from school or something. Long after they had stopped using the slides for the original purpose, that other individual had their account compromised, and the slides were changed to instead serve whatever purpose this was. There was a few issues with this as well:
- Vazz claimed he had not been using Google slides back in November of 2020 for any school related project.
- In total, there were 11 ācompromisedā slides we could see. Vazz did not have that number of shared slides with any one individual.
Theory Three
At some point, Vazz clicked on either a Google slide link out in the wild, or a google site link that led them to be associated to his account and therefore show up underneath his slides page. These slides may have been normal content at one point, but then had eventually gotten changed to the phenomenon we had seen. The lone issue with this theory:
- All of the last access dates for the slides was the same, November 13th 2020. Vazz stated he did not access 11 different slides on that day, or any day near it.
The revelation
It was at this point we hit a huge piece of information. Up to now, I was personally wondering if Vazz had stumbled upon either some sort of botnet facilitation website, a hidden command and control relay network, or perhaps a for a secretive darkweb hidden service. I had several reasons for this, but the wrench in my thinking was just how bizzare this site was. Moreover, most of the content appeared to have been scraped from other sites on the internet, including that really random reference to a Missouri public school.
However, after some more research, we stumbled across a machine curated Twitter API page that contained this google site URL. Next to it, was a linked article on a little-known blog that listed this google site.
It was written by a design blogsite, and it was titled āExploring the Worldās Worst Websiteā. In it, the author explained a reddit post on the r/web_design subreddit. This reddit post tells the story of a user who spent 3 years creating the worldās worst website as a proof-of-concept and a practical joke. They went into detail about the design philosophy, structure of the page, content and easter eggs, and origin. It seems we had found our āhackerā, just a practical prank site created by a user.
The conclusion
But a few questions remained unanswered.
- How did Vazz get those slides on his account?
- Why was the actual text content of the site so odd?
To the first one, we concluded that since it works via google docs and slides that are linked to the site, when navigating to the page google automatically shares that with the user (should they be signed in) and it then shows up on your account. Vazz, probably back around the time this article was created, navigated to the site and forgot about it, then didnāt check his google slides until months later.
As to the second, we think that the author of the site employed extensive use of botting and scripting to scrape enough random web content to add to his behemoth of a page. This would also explain the random comments throughout the site.
Some questions still remainā¦
Shockingly, that reddit post (the supposed origin of all this info) was posted sometime in [December of 2020]. The article itself was written in November 15th, 2020, and it directly references the post! How could it come after? And, how could āAndy Baioā know about and tweet about it before then?
Further, Vazz states that the only place he could have seen it was Hacker News. Upon searching, that site did not have any articles about Takashumi within that time frame for Vazz to visit itā¦ š¤