Rogue Chrome extension - tech support scam
Feb 21, 2017 - "... Google Chrome... no surprise to see it being more and more targeted these days. In particular, less than reputable -ad- networks are contributing to the distribution of malicious Chrome extensions via very deceptive means... Google Chrome users are profiled based on the user-agent string they show whenever they visit a website. Rather than redirecting them to an exploit kit, they are often redirected to fake software updates, scams, or rogue browser extensions... Once installed, this extension ensures it stays in hiding by using a 1×1 pixel image as its logo... and by hooking chrome://extensions and chrome://settings such that any attempt to access those is automatically redirected to chrome://apps. That makes it much more difficult for the average user to see what extensions they have, let alone uninstalling one of them... 'wouldn’t be complete without a tech support scam which it seems one can’t avoid these days. If the user clicked on a new tab or typed a ‘forbidden’ keyword, the redirection chain would then deliver a -fake- Microsoft warning:
... We detect and remove this one as Rogue.ForcedExtension.
Fake extension: pakistance .club: 18.104.22.168: https://www.virustotal.com/en/ip-add...7/information/
Backend server (ad fraud/malvertising):
amserver .info: 22.214.171.124: https://www.virustotal.com/en/ip-add...8/information/
qma0.2dn .xyz: 126.96.36.199: https://www.virustotal.com/en/ip-add...3/information/
Tech support scam:
microsoft-official-warning .info: 188.8.131.52: https://www.virustotal.com/en/ip-add...1/information/
Fake 'Western Union' SPAM - delivers java adwind
21 Feb 2017 - "... -fake- financial themed emails containing java adwind or Java Jacksbot attachments. I have previously mentioned many of these HERE. We have been seeing these sort of emails almost every day...
The java Adwind versions are exactly the same as Yesterday’s versions detailed HERE. The zip once again contains -2- different sized and named java files, although named differently to yesterday’s versions, they are identical.
DETAILS OF PROHIBITED INDIVIDUALS SCREENED FOR THIS TRANSACTION AND MTCN.jar (507kb) VirusTotal 8/58*
WESTERN UNION RTRA RULES AND REFUND IN FULL..jar (333kb) VirusTotal 8/57*** | Payload Security
... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
BoA 'Access Locked' - phish
21 Feb 2017 - "A slightly different phishing scam for a change. The phishing site is a FTP site which is very unusual...
The link-in-the-email goes to: ftp ://184.108.40.206 /License/logon.htm
where you see a site looking like:
> https://myonlinesecurity.co.uk/wp-co...FTP_signon.png "
'TurboTax' - phish
21 Feb 2017 - "Another phishing scam, this time TurboTax:
The link goes to http ://whitesandscampground .com/images/www.turbotax.com/index.html where you see this page, asking for all the usual details to steal your identity as well as all your bank and credit card accounts and all your money:
> https://myonlinesecurity.co.uk/wp-co...shing-page.png "
whitesandscampground .com: 220.127.116.11: https://www.virustotal.com/en/ip-add...4/information/