Results 1 to 10 of 1320

Thread: SPAM frauds, fakes, and other MALWARE deliveries...

Hybrid View

Previous Post Previous Post   Next Post Next Post
  1. #1
    Adviser Team AplusWebMaster's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    6,881

    Thumbs down Fake Sendspace/AICPA SPAM lead to malware

    FYI...

    Fake Sendspace SPAM "You have been sent a file" / anifkailood .ru:
    - http://blog.dynamoo.com/2012/12/you-...pace-spam.html
    10 Dec 2012 - "This fake Sendspace spam leads to malware on anifkailood .ru:
    Date: Mon, 10 Dec 2012 06:01:01 -0500
    From: "Octavio BOWMAN" [AdlaiBaldacci @telefonica .net]
    Subject: You have been sent a file (Filename: [redacted]-722.pdf)
    Sendspace File Delivery Notification:
    You've got a file called [redacted]-018.pdf, (767.2 KB) waiting to be downloaded at sendspace.(It was sent by Octavio BOWMAN).
    You can use the following link to retrieve your file:
    Download Link
    The file may be available for a limited time only.
    Thank you,
    sendspace - The best free file sharing service.
    Please do not reply to this email. This auto-mailbox is not monitored and you will not receive a response.


    The malicious payload is at [donotclick]anifkailood .ru:8080/forum/links/column.php hosted on the following IPs:
    202.180.221.186 (GNet, Mongolia)
    212.162.52.180 (Secure Netz, Germany)
    212.162.56.210 (Secure Netz, Germany)..."
    ___

    Fake AICPA SPAM / eaglepointecondo .co
    - http://blog.dynamoo.com/2012/12/aicp...tecondoco.html
    10 Dec 2012 - "This fake AICPA spam leads to malware on eaglepointecondo .co:
    Date: Mon, 10 Dec 2012 19:29:21 +0400
    From: "AICPA" [alerts@aicpa.org]
    Subject: Income fake tax return accusations.
    You're receiving this email as a Certified Public Accountant and a member of AICPA.
    Having difficulties reading this email? Take a look at it in your browser.
    Termination of Public Account Status due to income tax fraud allegations
    Respected accountant officer,
    We have received a denouncement about your probable interest in income tax return swindle for one of your customers. In concordance with AICPA Bylaw Head # 500 your Certified Public Accountant status can be revoked in case of the occurrence of submitting of a faked or fraudulent income tax return for your client or employer.
    Please be notified below and provide explanation of this issue to it within 21 business days. The rejection to provide elucidation within this period would finish in end off of your CPA license.
    SubmittedReport.doc
    The American Institute of Certified Public Accountants.
    Email: service @aicpa .org
    Tel. 888.777.7077
    Fax. 800.362.5066


    The malicious payload is at [donotclick]eaglepointecondo .co/detects/denouncement-reports.php hosted on 59.57.247.185 in China, which has been used a few times recently* for malware distribution..."
    * http://blog.dynamoo.com/search?q=59.57.247.185

    > http://www.aicpa.org/news/featuredne...ent-email.aspx

    Your CPA License has -not- been revoked
    - https://isc.sans.edu/diary.html?storyid=14674
    Last Updated: 2012-12-10 - "I have been seeing some e-mails hitting my spam traps today, warning me of my revoked CPA license. No, I am not a CPA. But the e-mails are reasonably well done, so I do think some CPAs may fall for them. At least they got the graphics nice and pretty, but the text could be better worded.
    > https://isc.sans.edu/diaryimages/images/CPAEmail.png
    The only clickable link is the "Delation.pdf" (maybe that should be deletion?). Upon clicking the link, we are send on the usual malware redirect loop:
    The first stop is httx ://tesorogroup .com/components/com_ag_google_analytics2/taxfraudalert.html
    It includes javascript and meta tag redirects to
    httx ://eaglepointecondo. co/ detects /denouncement-reports.php
    ... which will test our browser for vulnerable plugins and try to run a java applet. Looks all very "standard". You may want to check your DNS server logs for anybody resolving tesorogroup.com or eaglepointecondo.co . The two host currently resolve to 64.15.152.49 and 59.57.247.185 respectively.
    Wepawet does a nice job analysing the obfuscated javascript:
    http://wepawet.iseclab.org/view.php?...160668&type=js ..."
    ___

    Facebook SCAM goes wild - doubles over the weekend ...
    - http://community.websense.com/blogs/...e-weekend.aspx
    10 Dec 2012 - "Last week we wrote a blog* about a specific Facebook scam that appeared to spread rather aggresively... Websense.. detected that the scam has increased and multiplied over the weekend - particularly on Saturday where we saw the amount of unique URLs related to this scam double. This shows how cyber crooks time their attacks to times where users are more laid back and when the security community is less likely to alert users on this type of threat... The scam spreads using click-jacking techniques and employs a mass number of varied scam hosts by using the infrastructure of the legitimate service at freedns.afraid .org... A graph showing the volume of unique scam URLs vs. active URLs (available URLs) over the past few days:
    > http://community.websense.com/cfs-fi...as_5F00_23.jpg
    Screenshot of the scam's main page:
    > http://community.websense.com/cfs-fi...as_5F00_24.jpg
    How the scam looks like in Facebook's new feed. The scam uses varied sexual implied images and varied enticing wording to lure for user's clicks:
    > http://community.websense.com/cfs-fi...as_5F00_25.jpg

    * http://community.websense.com/blogs/...-facebook.aspx

    Facebook Spam leverages/abuses Instagram App
    - http://blog.trendmicro.com/trendlabs...instagram-app/
    Dec 10, 2012 - "... social networking sites have been often used to proliferate malware. Just recently, we spotted a Facebook clickjacking attack that leverages and abuses Instagram to point users to malicious websites. Users encounter this threat by being tagged in a photo posted by one of their contacts on Facebook. The post states that users can know who visited their profile on Faceboofk and how often. It also includes a photo posted via Instagram. We noticed that the photo and the names used in the “Recent Profile Views” (see below) are used repeatedly for other attacks.
    > http://blog.trendmicro.com/trendlabs...screenshot.gif
    Should users decide to click the link, they are lead to a page with instructions on how to generate the verification code. Once done, a pop-up window appears, which is actually the Instagram for Facebook app asking users to click “Go to App” button. Once done, it -redirects- users to a page that looks like the Facebook Home page.
    > http://blog.trendmicro.com/trendlabs...e_facebook.gif
    ... the address bar is different from the legitimate Facebook homepage. Users are then asked to copy and paste the malicious URL (which varies per user) in a certain dialog box and to click ‘continue’... the link so far gathered 825,545 clicks worldwide, mostly coming from the Philippines and India. The said link is attributed to the account maygup88, who is also responsible for other 130 domains blocked. This type of threat on Facebook has taken on different forms these past months, usually under the veil of popular brands such as Diablo 3 and iPad. It even expanded to other social networking sites like Pinterest and Tumblr, which only means one thing: users are still falling for these scams. With this in mind, users are advised to take precautionary steps such as double-checking the legitimacy of links and posts. And remember: just because a contact posted that link, it does not mean it’s safe..."
    ___

    AICPA SPAM / eaglepointecondo .org
    - http://blog.dynamoo.com/2012/12/aicpa-spam.html
    10 Dec 2012 - "Yet another fake AICPA spam run today with a slightly different domain from before, now on eaglepointecondo .org:
    Date: Mon, 10 Dec 2012 18:51:38 +0100
    From: "AICPA" [info @aicpa .org]
    Subject: Tax return assistance fraud.
    You're receiving this message as a Certified Public Accountant and a part of AICPA.
    Having any issues reading this email? Overview it in your favorite browser.
    Suspension of CPA license due to income tax indictment
    Valued AICPA participant,
    We have been notified of your potential participation in income tax refund shady transactions for one of your customers. In concordance with AICPA Bylaw Head # 740 your Certified Public Accountant status can be terminated in case of the act of submitting of a phony or fraudulent tax return for your client or employer.
    Please be informed of the complaint below and respond to it within 7 work days. The refusal to respond within this period will finish in cancellation of your Accountant status.
    Delation.pdf
    The American Institute of Certified Public Accountants.
    Email: service @aicpa .org
    Tel. 888.777.7077
    Fax. 800.362.5066
    ===================
    Date: Mon, 10 Dec 2012 14:50:40 -0300
    From: "AICPA" [noreply @aicpa .org]
    Subject: Your accountant license can be end off.
    You're receiving this message as a Certified Public Accountant and a part of AICPA.
    Having problems reading this email? Review it in your browser.
    Suspension of Accountant status due to tax return fraud prosecution
    Respected AICPA member,
    We have received a complaint about your alleged participation in income tax return fraudulent activity for one of your employees. In accordance with AICPA Bylaw Section No. 500 your Certified Public Accountant license can be terminated in case of the event of presenting of a false or fraudulent tax return for your client or employer.
    Please find the complaint below below and provide your feedback to it within 3 work days. The rejection to provide the clarifications within this time-frame would abide in end off of your Certified Accountant Career.
    SubmittedReport.pdf
    The American Institute of Certified Public Accountants.
    Email: service @aicpa .org
    Tel. 888.777.7077
    Fax. 800.362.5066


    In this case the malicious payload is at [donotclick]eaglepointecondo .org/detects/denouncement-reports.php hosted on 59.57.247.185 in China, as with the earlier spam run today*."
    * http://blog.dynamoo.com/2012/12/aicp...tecondoco.html
    ___

    GFI Labs Email Roundup for the Week
    - http://www.gfi.com/blog/gfi-labs-ema...or-the-week-5/
    Dec 10, 2012 - "... noteworthy email threats for the week of December 3 to 7:
    - Phishers Target Wells Fargo Clients
    - Message from the Department of Investigations
    - Amazon eBook Spam in the Wild
    - Spam from AICPA ...
    (More detail and screenshots at the gfi URL above.)

    Last edited by AplusWebMaster; 2012-12-11 at 03:53.
    The machine has no brain.
    ......... Use your own.
    Browser check for updates here.
    YOU need to defend against -all- vulnerabilities.
    Hacks only need to find -1- to get in...
    .

  2. #2
    Adviser Team AplusWebMaster's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    6,881

    Thumbs down Fake Changelog SPAM ...

    FYI...

    Fake Changelog SPAM / aseniakrol .ru
    - http://blog.dynamoo.com/2012/12/chan...niakrolru.html
    11 Dec 2012 - "This spam leads to malware on aseniakrol .ru:
    Date: Tue, 11 Dec 2012 10:46:43 -0300
    From: Tarra Comer via LinkedIn [member @linkedin .com]
    Subject: Re: Your Changelog UPDATED
    Hi,
    as promised your changelog - View
    I. Easley


    The malicious payload is at [donotclick]aseniakrol .ru:8080/forum/links/column.php hosted on a bunch of IPs that have been used for malware before:
    202.180.221.186 (GNet, Mongolia)
    212.162.52.180 (Secure Netz, Germany)
    212.162.56.210 (Secure Netz, Germany)..."

    The machine has no brain.
    ......... Use your own.
    Browser check for updates here.
    YOU need to defend against -all- vulnerabilities.
    Hacks only need to find -1- to get in...
    .

  3. #3
    Adviser Team AplusWebMaster's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    6,881

    Thumbs down Fake Sendspace/Citibank emails lead to malware

    FYI...

    Fake Sendspace emails lead to BlackHole Exploit Kit
    - http://blog.webroot.com/2012/12/12/m...e-exploit-kit/
    Dec 12, 2012 - "Cybercriminals are currently attempting to trick hundreds of thousands of users into clicking on the malicious links found in the currently spamvertised -bogus- ‘Sendspace File Delivery Notifications‘. Upon clicking on any of the links found in the email, users are exposed to the client-side exploits served by the latest version of the BlackHole Exploit Kit...
    Sample screenshot of the spamvertised email:
    > https://webrootblog.files.wordpress....xploit_kit.png
    ... Sample client-side exploits served: CVE-2010-0188
    Upon successful client-side exploitation, the campaign drops MD5: 532bdd2565cae7b84cb26e4cf02f42a0 * ... Worm:Win32/Cridex.E
    Once executed it creates %AppData%\kb00121600.exe on the affected system.
    The sample also creates the following registry entries:
    HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CFBDC89D4
    HKEY_CURRENT_USER\Software\Microsoft\Windows NT\S25BC2D7B
    As well as the following Mutexes:
    Local\XMM00000418
    Local\XMI00000418
    Local\XMRFB119394
    Local\XMM000005E4
    Local\XMI000005E4
    Local\XMM0000009C
    Local\XMI0000009C
    Local\XMM000000C8
    Local\XMI000000C8
    It then phones back to hxxp ://210.253.102.95 :8080/DPNilBA/ue1elBAAAA/tlSHAAAAA/ and to hxxp ://123.49.61.59 :8080/AJtw/UCyqrDAA/Ud+asDAA/ ..."
    (More detail at the webroot URL above.
    * https://www.virustotal.com/file/a070...eb2b/analysis/
    File name: contacts.exe.x-msdownload
    Detection ratio: 33/44
    Analysis date: 2012-11-13
    ___

    Fake Citibank SPAM / platinumbristol .net
    - http://blog.dynamoo.com/2012/12/citi...ristolnet.html
    12 Dec 2012 - "This fake Citibank spam leads to malware on platinumbristol .net:
    From: citibankonline @serviceemail1 .citibank .com via pado .com .br
    Date: 12 December 2012 15:38
    Subject: Account Alert
    Mailed-by: pado .com .br
    Citi
    Email Security Zone EMAIL SECURITY AREA
    ATM/Credit card ending in: XXX7
    Alerting System
    Bill Payment
    Ultimate Savings Account (USA) XXXXXXXXX2
    Amount Debited: $2,973.22
    Date: 12/12/12
    Log In to Overview Transaction
    Bill Payment
    Ultimate Savings Account (USA) XXXXXXXXX2
    Amount Credited: $.97
    Date: 12/12/12
    Visit this link to Overview Detailed information
    ABOUT THIS MESSAGE
    Please DO NOT reply to this message. auomatic informational system unable to accept incoming messages.
    Citibank, N.A. Member FDIC.
    Š 2012 Citigroup Inc. Citi with Arc Design and Citibank are registered service marks of Citigroup Inc.
    ========================
    From: citibankonline @serviceemail5 .citibank .com via clickz .com
    Date: 12 December 2012 15:39
    Subject: Account Notify
    Mailed-by: clickz .com
    Citi
    Email Security Zone EMAIL SAFETY AREA
    ATM/Debit card ending in: XXX7
    Alerting System
    Money Transfer Report
    Savings Account XXXXXXXXX8
    Amount Withdrawn: $3,620.11
    Date: 12/12/12
    Visit this link to Cancel Details
    Money Transfer Report
    Savings Account XXXXXXXXX8
    Amount Withdrawn: $.38
    Date: 12/12/12
    Sign In to Overview Details
    ABOUT THIS MESSAGE
    Please Not try to reply to this message. automative notification system unable to accept incoming messages.
    Citibank, N.A. Member FDIC.
    © 2012 Citigroup Inc. Citi with Arc Design and Citibank are registered service marks of Citigroup Inc.
    ========================
    Date: Wed, 12 Dec 2012 23:16:15 +0700
    From: alets-no-reply @serviceemail6 .citibank .com
    Subject: Account Insufficient funds
    EMAIL SAFETY ZONE
    ATM/Debit card ending in: XXX0
    Notifications System
    Transaction Announcement
    Ultimate Savings Account (USA) XXXXXXXXX4
    Amount Debited: $4,222.19
    Date: 12/12/12
    Login to Abort Detailed information
    Transaction Announcement
    Ultimate Savings Account (USA) XXXXXXXXX4
    Amount Credited: $.41
    Date: 12/12/12
    Go to web site by clicking here to See Operation
    ABOUT THIS MESSAGE
    Please Not try to reply to this message. automative notification system cannot accept incoming mail.
    Citibank, N.A. Member FDIC.
    2012 Citigroup Inc. Citi with Arc Design and Citibank are registered service marks of Citigroup Inc.
    ========================
    Date: Wed, 12 Dec 2012 20:07:46 +0400
    From: citibankonline @serviceemail8 .citibank .com
    Subject: Account Operation Alert
    EMAIL SECURITY ZONE
    Credit card ending in: XXX0
    Notifications System
    Bill Payment
    Ultimate Savings Account (USA) XXXXXXXXX3
    Amount Credited: $5,970.51
    Date: 12/12/12
    Click Here to Review Transaction
    Bill Payment
    Ultimate Savings Account (USA) XXXXXXXXX3
    Amount Withdrawn: $.11
    Date: 12/12/12
    Sign In to View Operation
    ABOUT THIS MESSAGE
    Please don't reply to this message. auomatic informational system cannot accept incoming mail.
    Citibank, N.A. Member FDIC.
    2012 Citigroup Inc. Citi with Arc Design and Citibank are registered service marks of Citigroup Inc.


    The malicious payload is at [donotclick]platinumbristol .net/detects/alert-service.php hosted on the same 59.57.247.185 IP address in China that has been used in several recent attacks. This is definitely an IP to block if you can.
    I can see the following evil domains on that same server..."
    (More detail at the dynamoo URL above.)

    Last edited by AplusWebMaster; 2012-12-12 at 18:45.
    The machine has no brain.
    ......... Use your own.
    Browser check for updates here.
    YOU need to defend against -all- vulnerabilities.
    Hacks only need to find -1- to get in...
    .

  4. #4
    Adviser Team AplusWebMaster's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    6,881

    Thumbs down Fake Citi-cards/Citibank/Copies of Policies SPAM ...

    FYI...

    Fake Citi Cards SPAM / 6.bbnface .com and 6.mamaswishes .com
    - http://blog.dynamoo.com/2012/12/citi...cecom-and.html
    13 Dec 2012 - "This fake Citi Cards spam leads to malware on 6.bbnface .com and 6.mamaswishes .com:
    Date: Thu, 13 Dec 2012 11:59:33 +0300
    From: Citi Cards [citicards @info .citibank .com]
    Subject: Your Citi Credit Card Statement
    Add citicards @info .citibank .com to your address book to ensure delivery.
    Your Account: Important Notification
    Your Citi Credit Card statement is ready to view online
    Dear customer,
    Your Citi Credit Card statement is now available for you to view online. Here are some key pieces of information from your statement:
    Statement Date: December 13, 2012
    Statement Balance: -$8,803.77
    Minimum Payment Due: $750.00
    Payment Due Date: Tue, January 01, 2013
    Want help remembering your payment due date? Sign up for automated alerts such as Payment Due reminders with Alerting Service.
    To set up alerts sign on to www .citicards .com and go to Account Profile.
    Iprefer not to have this email contain specific information from my statement. Please send me just the announcement that my statement is ready to view online.
    View Your Account Pay Your Bill Contact Us
    Privacy | Security
    Email Preferences
    This message is from Citi Cards. Your credit card is issued by Citibank, N.A. If you'd like to refine the types of email messages you receive, or if you'd prefer to stop receiving email from us, please go to... Citibank manages email preferences by line of business. Changing your email preferences with Citi Cards does not change your email preferences for messages from Citibank?s other businesses which include retail branch banking among others.
    Should you want to contact us in writing concerning this email, please direct your correspondence to:
    Citibank Customer Service
    P. O. Box 6500
    Sioux Falls, SD 57117
    Help / Contact Us
    If you have questions about your account, please use our secure message center by signing on at... and choosing "Contact Us" from the "Help / Contact Us" menu. You can also call the customer service phone number on the back of your card.
    (c) 2012 Citibank, N.A.
    All rights reserved.
    Citi, Citibank and Citi with Arc Design are registered service marks of Citigroup Inc.
    ============================
    Date: Thu, 13 Dec 2012 10:30:55 +0200
    From: Citi Cards [citicards @info .citibank .com]
    Subject: Your Citi Credit Card Statement
    Add citicards @info .citibank .com to your address book to ensure delivery.
    Your Account: Important Notification
    Your Citi Credit Card statement is ready to view online
    Dear customer,
    Your Citi Credit Card statement is now available for you to view online. Here are some key pieces of information from your statement:
    Statement Date: December 13, 2012
    Statement Balance: -$5,319.77
    Minimum Payment Due: $506.00
    Payment Due Date: Tue, January 01, 2013
    Want help remembering your payment due date? Sign up for automated alerts such as Payment Due reminders with Alerting Service.
    To set up alerts sign on to www .citicards .com and go to Account Profile.
    Iprefer not to have this email contain specific information from my statement. Please send me just the announcement that my statement is ready to view online.
    View Your Account Pay Your Bill Contact Us
    Privacy | Security
    Email Preferences
    This message is from Citi Cards. Your credit card is issued by Citibank, N.A. If you'd like to refine the types of email messages you receive, or if you'd prefer to stop receiving email from us, please go to... Citibank manages email preferences by line of business. Changing your email preferences with Citi Cards does not change your email preferences for messages from Citibank?s other businesses which include retail branch banking among others.
    Should you want to contact us in writing concerning this email, please direct your correspondence to:
    Citibank Customer Service
    P. O. Box 6500
    Sioux Falls, SD 57117
    Help / Contact Us
    If you have questions about your account, please use our secure message center by signing on at... and choosing "Contact Us" from the "Help / Contact Us" menu. You can also call the customer service phone number on the back of your card.
    (c) 2012 Citibank, N.A.
    All rights reserved.
    Citi, Citibank and Citi with Arc Design are registered service marks of Citigroup Inc.


    The links in the email bounce through a legitimate hacked site, and in the samples I have seen end up on [donotclick]6.bbnface .com/string/obscure-logs-useful.php or [donotclick]6.mamaswishes .com/string/obscure-logs-useful.php both hosted on 173.246.102.223 (Gandi, US) which probably contains many other evil sites, so blocking that IP address would probably be prudent."
    ___

    More "Copies of Policies" SPAM / awoeionfpop .ru:
    - http://blog.dynamoo.com/2012/12/copi...ionfpopru.html
    13 Dec 2012 - "This spam leads to malware on awoeionfpop .ru:
    Date: Thu, 13 Dec 2012 09:08:32 -0400
    From: "Myspace" [noreply @message .myspace .com]
    Subject: Fwd: Deshaun - Copies of Policies
    Unfortunately, I cannot obtain electronic copies of the SPII policy.
    Here is the Package and Umbrella,
    and a copy of the most recent schedule.
    Deshaun ZAMORA,


    The malicious payload is at [donotclick]awoeionfpop .ru:8080/forum/links/column.php hosted on the following IPs that I haven't seen before:
    75.148.242.70 (Comcast Business, US)
    91.142.208.144 (Axarnet, Spain)..."
    (More detail at the dynamoo URL above.)
    ___

    Fake Citibank SPAM / eaglepointecondo .biz
    - http://blog.dynamoo.com/2012/12/citi...econdobiz.html
    13 Dec 2012 - "This fake Citibank spam leads to malware on eaglepointecondo .biz:
    Date: Thu, 13 Dec 2012 16:59:14 +0400
    From: "Citi Alerts" [lubumbashiny63 @bankofdeerfield .com]
    Subject: Account Operation Alert
    EMAIL SAFETY AREA
    ATM/Credit card ending in: XXX8
    Notifications System
    Wire Transaction Issued
    Ultimate Savings Account (USA) XXXXXXXXX5
    Amount Withdrawn: $4,564.61
    Date: 12/12/12
    Sign In to Abort Details
    Wire Transaction Issued
    Ultimate Savings Account (USA) XXXXXXXXX5
    Amount Debited: $.24
    Date: 12/12/12
    Login to Overview Operation
    ABOUT THIS MESSAGE
    Please DO NOT reply to this message. auto-notification system can't accept incoming mail.
    Citibank, N.A. Member FDIC.
    2012 Citigroup Inc. Citi with Arc Design and Citibank are registered service marks of Citigroup Inc.
    ====================
    From: Citibank - Alerts [mailto:enormityyf10 @iztzg .hr]
    Sent: 13 December 2012 12:50
    Subject: Account Operation Alert
    Importance: High
    EMAIL SAFETY AREA
    ATM/Credit card ending in: XXX6
    Notifications System
    Bill Payment
    Checking XXXXXXXXX7
    Amount Withdrawn: $5,951.56
    Date: 12/12/12
    Visit this link to Cancel Detailed information
    Bill Payment
    Checking XXXXXXXXX7
    Amount Debited: $.14
    Date: 12/12/12
    Login to Review Operation
    ABOUT THIS MESSAGE
    Please don't reply to this message. auto informer system unable to accept incoming mail.
    Citibank, N.A. Member FDIC.
    2012 Citigroup Inc. Citi with Arc Design and Citibank are registered service marks of Citigroup Inc.
    ====================
    From: Citibank - Service [mailto:goaliesj79 @wonderware .com]
    Sent: 13 December 2012 12:59
    Subject: Account Alert
    Importance: High
    EMAIL SAFETY ZONE
    ATM/Debit card ending in: XXX8
    Alerting System
    Withdraw Message
    Savings Account XXXXXXXXX4
    Amount Debited: $1,218.42
    Date: 12/12/12
    Login to Abort Operation
    Withdraw Message
    Savings Account XXXXXXXXX4
    Amount Withdrawn: $.42
    Date: 12/12/12
    Sign In to Overview Operation
    ABOUT THIS MESSAGE
    Please DO NOT reply to this message. auto-notification system not configured to accept incoming mail.
    Citibank, N.A. Member FDIC.
    2012 Citigroup Inc. Citi with Arc Design and Citibank are registered service marks of Citigroup Inc.


    The malicious payload is on [donotclick]eaglepointecondo .biz/detects/operation_alert_login.php hosted on 59.57.247.185 in China, the same IP has been used several times for evil recently and you should block it if you can."

    Last edited by AplusWebMaster; 2012-12-13 at 18:59.
    The machine has no brain.
    ......... Use your own.
    Browser check for updates here.
    YOU need to defend against -all- vulnerabilities.
    Hacks only need to find -1- to get in...
    .

  5. #5
    Adviser Team AplusWebMaster's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    6,881

    Thumbs down Something evil on 87.229.26.138

    FYI...

    Dexter malware targets POS systems...
    - http://www.theregister.co.uk/2012/12...s_pos_systems/
    14 Dec 2012 - "You could be getting more than you bargained for when you swipe your credit card this holiday shopping season, thanks to new malware that can skim credit card info from compromised point-of-sale (POS) systems. First spotted by security firm Seculert*, the malware dubbed "Dexter" is believed to have infected hundreds of POS systems in 40 countries worldwide in recent months. Companies targeted include retailers, hotel chains, restaurants, and private parking providers. The US, the UK, and Canada top the list of countries where the malicious app has been found... Once the malware is installed on a POS system, it grabs the machine's list of active processes and sends them to a command-and-control server – a highly unusual step for POS malware, according to security researchers at Trustwave**..."
    * http://blog.seculert.com/2012/12/dex...-point-of.html

    ** http://blog.spiderlabs.com/2012/12/t...nds-dirty.html
    ___

    Something evil on 87.229.26.138
    - http://blog.dynamoo.com/2012/12/some...722926138.html
    14 Dec 2012 - "This seems to be a bunch of evil domains on 87.229.26.138 (Deninet, Hungary) being used in injection attacks. Possible payloads include Blackhole (for example*).
    * http://urlquery.net/report.php?id=406222
    There are two sets of domains, .in domains being used by themselves and .eu domains being used with subdomains, listed below.
    The registration details are probably fake, but for the record the .eu domains are registered to:
    Juha Salonen
    Lukiokatu 23
    13430 Hameenlinna
    Hameenlinna
    Finland
    salonen_juha @yahoo .com
    The .in domains are registered to:
    Puk T Lapkanen
    Puruntie 33
    LAPPEENRANTA
    53200
    FI
    +358.443875638
    puklapkanen @yahoo .com
    If you can block the IP address then it will be the simplest option as there are rather a lot of domains here..."
    (More detail at the dynamoo URL above.)
    ___

    Fake Citibank SPAM / 4.whereintrentinoaltoadige .com
    - http://blog.dynamoo.com/2012/12/citi...altoadige.html
    14 Dec 2012 - "This fake Citibank spam leads to malware on 4.whereintrentinoaltoadige .com:
    Date: Fri, 14 Dec 2012 13:54:14 +0200
    From: Citi Cards [citicards @info .citibank .com]
    Subject: Your Citi Credit Card Statement
    Add citicards @info .citibank .com to your address book to ensure delivery.
    Your Account: Important Notification
    Your Citi Credit Card statement is ready to view online
    Dear customer,
    Your Citi Credit Card statement is now available for you to view online. Here are some key pieces of information from your statement:
    Statement Date: December 13, 2012
    Statement Balance: -$4,550.67
    Minimum Payment Due: $764.00
    Payment Due Date: Tue, January 01, 2013
    Want help remembering your payment due date? Sign up for automated alerts such as Payment Due reminders with Alerting Service.
    To set up alerts sign on to... and go to Account Profile.
    Iprefer not to have this email contain specific information from my statement. Please send me just the announcement that my statement is ready to view online.
    View Your Account Pay Your Bill Contact Us
    Privacy | Security
    Email Preferences
    This message is from Citi Cards. Your credit card is issued by Citibank, N.A. If you'd like to refine the types of email messages you receive, or if you'd prefer to stop receiving email from us, please go to... Citibank manages email preferences by line of business. Changing your email preferences with Citi Cards does not change your email preferences for messages from Citibank?s other businesses which include retail branch banking among others.
    Should you want to contact us in writing concerning this email, please direct your correspondence to:
    Citibank Customer Service
    P. O. Box 6500
    Sioux Falls, SD 57117
    Help / Contact Us
    If you have questions about your account, please use our secure message center by signing on at... and choosing "Contact Us" from the "Help / Contact Us" menu. You can also call the customer service phone number on the back of your card.
    (c) 2012 Citibank, N.A.
    All rights reserved.
    Citi, Citibank and Citi with Arc Design are registered service marks of Citigroup Inc.
    ====================
    Alternative mid-sections:
    Statement Date: December 13, 2012
    Statement Balance: -$8,902.58
    Minimum Payment Due: $211.00
    Payment Due Date: Tue, January 01, 2013
    Statement Date: December 13, 2012
    Statement Balance: -$9,905.95
    Minimum Payment Due: $535.00
    Payment Due Date: Tue, January 01, 2013


    The malicious payload is at [donotclick]4.whereintrentinoaltoadige .com/string/obscure-logs-useful.php hosted on 198.74.54.28 (Linode, US)... malicious domains are also on the same server..."
    (More detail at the dynamoo URL above.)
    ___

    More Citibank SPAM / 6.bbnsmsgateway .com
    - http://blog.dynamoo.com/2012/12/citi...atewaycom.html
    14 Dec 2012 - "This fake Citibank spam leads to malware on 6.bbnsmsgateway .com:
    Date: Fri, 14 Dec 2012 19:27:56 +0530
    From: Citi Cards [citicards @info.citibank .com]
    Subject: Your Citi Credit Card Statement
    Add citicards @info.citibank .com to your address book to ensure delivery.
    Your Account: Important Notification
    Your Citi Credit Card statement is ready to view online
    Dear customer,
    Your Citi Credit Card statement is now available for you to view online. Here are some key pieces of information from your statement:
    Statement Date: December 13, 2012
    Statement Balance: -$4,873.54
    Minimum Payment Due: $578.00
    Payment Due Date: Tue, January 01, 2013
    Want help remembering your payment due date? Sign up for automated alerts such as Payment Due reminders with Alerting Service.
    To set up alerts sign on to www.citicards.com and go to Account Profile.
    Iprefer not to have this email contain specific information from my statement. Please send me just the announcement that my statement is ready to view online.
    View Your Account Pay Your Bill Contact Us
    Privacy | Security
    Email Preferences
    This message is from Citi Cards. Your credit card is issued by Citibank, N.A. If you'd like to refine the types of email messages you receive, or if you'd prefer to stop receiving email from us, please go to: http://www.email.citicards.com. Citibank manages email preferences by line of business. Changing your email preferences with Citi Cards does not change your email preferences for messages from Citibank?s other businesses which include retail branch banking among others.
    Should you want to contact us in writing concerning this email, please direct your correspondence to:
    Citibank Customer Service
    P. O. Box 6500
    Sioux Falls, SD 57117
    Help / Contact Us
    If you have questions about your account, please use our secure message center by signing on at... and choosing "Contact Us" from the "Help / Contact Us" menu. You can also call the customer service phone number on the back of your card.
    (c) 2012 Citibank, N.A.
    All rights reserved.
    Citi, Citibank and Citi with Arc Design are registered service marks of Citigroup Inc.


    The malicious payload is at [donotclick]6.bbnsmsgateway .com/string/obscure-logs-useful.php hosted on 192.155.81.9 (Linode, US). There are probably some other bad domains on this server, so blocking access to that IP could be prudent."
    ___

    Changelog SPAM / aviaonlolsio .ru
    - http://blog.dynamoo.com/2012/12/chan...nlolsioru.html
    14 Dec 2012 - "This fake Changelog spam leads to malware on aviaonlolsio .ru:
    From: messages-noreply @bounce .linkedin .com [mailto :messages-noreply @bounce .linkedin .com] On Behalf Of Earlean Gardner via LinkedIn
    Sent: 13 December 2012 20:22
    Subject: Re: Changelog as promised (upd.)
    Hi,
    as promised - View
    I. SWEET
    ====================
    Date: Fri, 14 Dec 2012 05:22:54 +0700
    From: "Kaiya HIGGINS" [fwGpEzHIGGINS @hotmail .com]
    Subject: Re: Fwd: Changelog as promised(updated)
    Hi,
    as promised chnglog updated - View
    I. HIGGINS


    The malicious payload is at [donotclick]aviaonlolsio .ru:8080/forum/links/column.php hosted on the same IPs as used in this attack:
    75.148.242.70 (Comcast Business, US)
    91.142.208.144 (Axarnet, Spain)..."
    ___

    Fake Chase emails lead to malware
    - http://blog.webroot.com/2012/12/14/f...ad-to-malware/
    Dec 14, 2012 - "Cybercriminals are currently mass mailing tens of thousands of emails, impersonating Chase in an attempt to trick its customers into executing the malicious attachment found in the fake email. Upon execution, the sample downloads additional malware on the affected hosts, and opens a backdoor allowing the cybercriminals behind the campaign complete access to the host...
    Sample screenshot of the spamvertised email:
    > https://webrootblog.files.wordpress....ing.png?w=1024
    ... the cybercriminal/cybercriminals behind it applied low QA (Quality Assurance) since the actual filename found in the malicious archive exceeds 260 characters, resulting in a failed extraction process on Windows hosts.
    “C:\Users\Workstation\Desktop\Statement_random_number.pdf.zip: Cannot create Statement_ID_random_number.pdf.exe
    Total path and file name length must not exceed 260 characters. The system cannot find the path specified.“

    Sample detection rate for the spamvertised attachment: MD5: 676c1a01739b855425f9492126b34d23 * ... Trojan-PSW.Win32.Tepfer.cbrv.
    Makes DNS request to 3.soundfactor .org, then it establishes a TCP connection with 184.184.247.60 :14511, as well as UDP connections to the following IPs:
    184.184.247.60 :23089
    99.124.198.193 :13197
    78.93.215.24 :14225
    68.167.50.61 :28650 ..."
    (More detail at the webroot URL above.)
    * https://www.virustotal.com/file/543a...is/1355442736/
    File name: Statement_ID.pdf.exe
    Detection ratio: 42/46
    Analysis date: 2012-12-13

    Last edited by AplusWebMaster; 2012-12-14 at 22:02.
    The machine has no brain.
    ......... Use your own.
    Browser check for updates here.
    YOU need to defend against -all- vulnerabilities.
    Hacks only need to find -1- to get in...
    .

  6. #6
    Adviser Team AplusWebMaster's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    6,881

    Thumbs down Pharma SPAM - pillscarehealthcare .com

    FYI...

    Pharma SPAM - pillscarehealthcare .com
    - http://blog.dynamoo.com/2012/12/pill...ecom-spam.html
    17 Dec 2012 - "There has been a massive amount of pharma spam pointing to pillscarehealthcare .com over the past 48 hours or so. Here are some examples:
    Date: Mon, 17 Dec 2012 02:47:56 +0000 (GMT)
    From: "Account Info Change" [tyjinc @palmerlakearttour .com]
    To: [redacted]
    Subject: Updated information
    Updated information
    Hello,
    The following information for your ID [redacted] was updated on 12/17/2012: Date of birth, Security question and answer.
    If these changes were made in error, or if you believe an unauthorized person accessed your account, please reset your account password.
    This is an automated message. Please do not reply to this email. If you need additional help, visit our Support Center.
    Thanks,
    Customer Support
    ==================
    Date: Mon, 17 Dec 2012 01:22:56 -0700
    From: "Angela Snider" [directsales @tyroo .com]
    To: [redacted]
    Subject: Pending ticket status
    Ticketing System
    Hello,
    You have been successfully registered in our Ticketing System
    Please, login and check status of your ticket, or close the ticket here
    Go To Profile
    See All tickets
    This message was sent to [redacted]. Should you have any questions, or if you believe that you have received this in error please contact us at support center.
    ==================
    Date: Sat, 15 Dec 2012 21:37:47 -0700
    From: "Alexis Houston" [cmassuda @agf .com .br]
    To: [redacted]
    Subject: Pending ticket notification
    Ticketing System
    Hello,
    You have been successfully registered in our Ticketing System
    Please, login and check status of your ticket, or report new ticket here
    Go To Profile
    See All tickets
    This message was sent to [redacted]. Should you have any questions, or if you believe that you have received this in error please contact us at support center.
    ==================
    Date: Sat, 15 Dec 2012 07:06:30 -0800
    From: "Account Sender Mail" [daresco @excite .com]
    To: [redacted]
    Subject: Account is now available
    Login unavailable due to maintenance ([redacted])
    Hello,
    Your Account is now available.
    Our systems were unavailable due to maintenance and upgrading system. We apologizes for any inconvenience and appreciates the patience while this critical maintenance was performed. If you still face the problem then it would be better if you contact our team.
    Access Your Account
    Hope this information helps you.
    Thanks,
    Support team
    ==================
    From: Kennedi Marquez [mailto:cwtroutn @naturalskincarereviews .info]
    Sent: 17 December 2012 11:18
    Subject: Updated information
    Updated information
    Hello,
    The following information for your ID [redacted] was updated on 12/17/2012: Date of birth, Security question and answer.
    If these changes were made in error, or if you believe an unauthorized person accessed your account, please reset your account password.
    This is an automated message. Please do not reply to this email. If you need additional help, visit our Support Center.
    Thanks,
    Customer Support


    This appears to be punting fake drugs rather than malware. pillscarehealthcare .com is hosted on 95.58.254.74 (Kazakh Telecom, Kazakhstan). In my opinion blocking 95.58.254.0/24 will probably do you no harm. These other fake pharma web sites can be found on the same IP address..."
    (More detail at the dynamoo URL above.)

    The machine has no brain.
    ......... Use your own.
    Browser check for updates here.
    YOU need to defend against -all- vulnerabilities.
    Hacks only need to find -1- to get in...
    .

  7. #7
    Adviser Team AplusWebMaster's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    6,881

    Thumbs down Fake UPS/USPS SPAM - apensiona .ru

    FYI...

    Fake UPS/USPS SPAM / apensiona .ru
    - http://blog.dynamoo.com/2012/12/ups-...ensionaru.html
    18 Dec 2012 - "Spammers often get UPS and the USPS mixed up. They're not the same thing at all. And this one throws FilesTube into the mix as well. Anyway, this fake UPS/USPS/ FilesTube spam leads to malware on apensiona .ru:
    From: FilesTube [mailto: filestube @filestube .com]
    Sent: 17 December 2012 06:01
    Subject: Your Tracking Number H7300014839
    USPS Customer Services for big savings!
    Can't see images? CLICK HERE.
    UPS - UPS TEAM 60 >>
    Already Have an Account?
    Enjoy all UPS has to offer by linking your My UPS profile to your account.
    Link Your Account Now >>
    UPS - UPS .com Customer Services
    Good Evening, [redacted].
    DEAR USER , Recipient's address is wrong
    Track your Shipment now!
    With Respect To You , Your UPS .com Customer Services.
    Shipping | Tracking | Calculate Time & Cost | Open an Account
    @ 2011 United Parcel Service of America, Inc. Your USPS .us Customer Services, the UPS brandmark, and the color brown are
    trademarks of United Parcel Service of America, Inc. All rights reserved.
    This is a marketing e-mail for UPS services. Click here to update your e-mail preferences or to unsubscribe to
    USPS Team marketing e-mail. For information on UPS's privacy practices, please refer to UPS Privacy Policy.
    Your USPS .us Customer Services, 8 Glenlake Parkway, NE - Atlanta, GA 30585
    Attn: Customer Communications Department


    The malicious payload is at [donotclick]apensiona .ru:8080/forum/links/column.php which is hosted on 217.112.40.69 (Utransit, claims to be from the UK but probably Russia). The following malicious domains are also on that IP address..."
    (More detail at the dynamoo URL above.)
    ___

    GFI Labs Email Roundup for the Week
    - http://www.gfi.com/blog/gfi-labs-ema...or-the-week-6/
    Dec 18, 2012 - "... noteworthy email threats for the week... covering the dates of December 10 to 14...

    “Mailbox Upgrade” Email is a Phish...
    > http://gfisoftware.tumblr.com/post/3...dentials-phish
    ... Malicious URLs: my3q .com/survey/458/webgrade2052/77717.phtml

    Unsolicited “Adobe CS4 License” Leads to Malware...
    > http://gfisoftware.tumblr.com/post/3...e-spam-returns
    ... Malicious URLs: safeshopper .org.nz/redirecting.htm, happy-school .edu.pl/redirecting.htm, amnaosogo .ru:8080/forum/links/column.php...

    Spammers Target Citibank Clients.
    > http://gfisoftware.tumblr.com/post/3...statement-spam
    ... Malicious URLs... (See the gfisoftware.tumblr URL above.)
    ___

    LinkedIn SPAM / apensiona .ru
    - http://blog.dynamoo.com/2012/12/link...ensionaru.html
    18 Dec 2012 - "This fake LinkedIn spam leads to malware on apensiona .ru:
    From: messages-noreply @bounce .linkedin .com on behalf of LinkedIn Connections
    Sent: Tue 18/12/2012 14:01
    Subject: Join my network on LinkedIn
    LinkedIn
    Hien Lawson has indicated you are a Friend
    I'd like to add you to my professional network on LinkedIn.
    - Hien Lawson
    Accept
    View invitation from Hien Lawson
    WHY MIGHT CONNECTING WITH Hien Lawson BE A GOOD IDEA?
    Hien Lawson's connections could be useful to you
    After accepting Hien Lawson's invitation, check Hien Lawson's connections to see who else you may know and who you might want an introduction to. Building these connections can create opportunities in the future.
    2012, LinkedIn Corporation


    The malicious payload is at [donotclick]apensiona .ru:8080/forum/links/column.php (the same payload as here*) although this time the IPs have changed to:
    109.235.71.144 (Serveriai, Lithunia)
    176.31.111.198 (OVH, France)
    217.112.40.69 (Utransit , UK)
    Here's a plain list if you want to block the lot:
    109.235.71.144
    176.31.111.198
    217.112.40.69
    ..."
    * http://blog.dynamoo.com/2012/12/ups-...ensionaru.html

    Last edited by AplusWebMaster; 2012-12-18 at 22:44.
    The machine has no brain.
    ......... Use your own.
    Browser check for updates here.
    YOU need to defend against -all- vulnerabilities.
    Hacks only need to find -1- to get in...
    .

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •