Results 1 to 10 of 1320

Thread: SPAM frauds, fakes, and other MALWARE deliveries...

Threaded View

Previous Post Previous Post   Next Post Next Post
  1. #34
    Adviser Team AplusWebMaster's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    6,881

    Thumbs down Bogus USPS, SMS SPAM lead to malware

    FYI...

    Bogus USPS emails lead to malware
    - http://blog.webroot.com/2012/11/06/u...ad-to-malware/
    Nov 6, 2012 - "... mass mailing millions of emails impersonating The United States Postal Service (USPS), in an attempt to trick its customers into downloading and executing the malicious .zip archive linked in the bogus emails. Upon execution, the malware opens a backdoor on the affected host, allowing the cybercriminals behind the campaign to gain complete control over the host...
    Sample screenshot of the spamvertised email:
    > https://webrootblog.files.wordpress....am_malware.jpg
    Spamvertised compromised URL: hxxp ://www .unser-revier-bruchtorf-ost .de/FWUJKKOGMP.html
    Actual malicious archive URL: hxxp ://www .unser-revier-bruchtorf-ost .de/Shipping_Label_USPS.zip
    Detection rate: MD5: 089605f20e02fe86b6719e0949c8f363 * ... UDS:DangerousObject.Multi.Generic
    Upon execution, the sample phones back to the following URLs...
    (See the 1st webroot URL above - long list of IPs.) ... 64.151.87.152, 66.7.209.185, 173.224.211.194, 46.105.121.86, 222.255.237.132, 64.151.87.152, 79.170.89.209, 217.160.236.108, 88.84.137.174, 46.105.112.99, 50.22.136.150, 130.88.105.45, 91.205.63.194, 95.173.180.42, 217.160.236.108 ..."
    * https://www.virustotal.com/file/372b...is/1351876562/
    File name: Shipping_Label_USPS.exe
    Detection ratio: 5/44
    Analysis date: 2012-11-02
    ___

    SMS SPAM: "Records passed to us show you're entitled to a refund approximately £2130"
    - http://blog.dynamoo.com/2012/11/sms-...o-us-show.html
    6 Nov 2012 - "More SMS spam from.. well, I think the ICO will shortly reveal who. It's not just a spam, but it's also a scam because the spammers are attempting to persuade you to make fraudulent claims. Not everyone is eligible for a PPI refund, and I'm certainly not.. no "records" exist, it's just a scammy sales pitch. Avoid.
    Records passed to us show you're entitled to a refund approximately £2130 in compensation from mis-selling of PPI on your credit card or loan.Reply INFO or stop

    In this case, the sender's number is +447585858897, although it will change as it gets blocked by the networks. If you get one of these, you should forward the spam and the sender's number to your carrier. In the case of T-Mobile, O2 and Orange the number to report to is 7726 ("SPAM"). Vodafone customers should use 87726 ("VSPAM") and Three customers should use 37726 ("3SPAM"). Hopefully the carriers will act if there are enough complaints."
    ___

    Fake Apple "Account Info Change" SPAM / welnessmedical .com
    - http://blog.dynamoo.com/2012/11/appl...ange-spam.html
    6 Nov 2012 - "Not malware this time, but Pharma spam.. the links in this fake Apple message lead to welnessmedical .com.
    From: Apple [ appleid @ id.arcadiadesign .it]
    Sent: Tue 06/11/2012 18:30
    Subject: Account Info Change
    Hello,
    The following information for your Apple ID [redacted] was updated on 11/06/2012:
    Date of birth
    Security question(s) and answer(s)
    If these changes were made in error, or if you believe an unauthorized person accessed your account, please reset your account password immediately by going to iforgot.apple.com.
    To review and update your security settings, sign in to appleid.apple.com.
    This is an automated message. Please do not reply to this email. If you need additional help, visit Apple Support.
    Thanks,
    Apple Customer Support
    TM and copyright © 2012 Apple Inc. 1 Infinite Loop, MS 96-DM, Cupertino, CA 95014.
    All Rights Reserved / Keep Informed / Privacy Policy / My Apple ID


    The fake pharma site (welnessmedical.com) is hosted on 84.22.127.43 along with a bunch of other ones, plus some additional sites one IP over at 84.22.127.44... Oddly, 84.22.127.43 doesn't seem to be registered at RIPE. No matter, we know who the owner of 84.22.127.0 is.. our old friends Cyberbunker again, who have registered the block with fake details. How RIPE lets them get away with this I don't know. If you can, I recommend blocking the entire 84.22.96.0/19 range as almost everything here is pretty seedy. You can read more about Cyberbunker's very dark grey hat activities over at Wikipedia* if you want more information."
    * http://en.wikipedia.org/wiki/CyberBunker
    ___

    Fake "Scan from a Xerox WorkCentre Pro" / peneloipin .ru
    - http://blog.dynamoo.com/2012/11/scan...entre-pro.html
    6 Nov 2012 - "This fake printer spam leads to malware on peneloipin .ru:
    From: Keshawn Burns - MaribelParchment @ hotmail .com
    Sent: 06 November 2012 05:09
    Subject: Scan from a Xerox WorkCentre Pro #47938830
    Please open the attached document. It was scanned and sent
    to you using a Xerox WorkCentre Pro.
    Sent by: Keshawn
    Number of Images: 5
    Attachment File Type: .HTML [Internet Explorer file]
    Xerox WorkCentre Location: machine location not set


    The attachment contains some obfuscated Javascript that redirects the visitor to a malicious payload on [donotclick]peneloipin .ru:8080/forum/links/column.php hosted on some IPs that have been used several times before for malware:
    65.99.223.24 (RimuHosting, US)
    103.6.238.9 (Universiti Putra, Malaysia)
    203.80.16.81 (MYREN, Malaysia)
    The following malicious domains are also hosted on the same servers:
    forumibiza .ru
    kiladopje .ru
    donkihotik .ru
    lemonadiom .ru
    peneloipin .ru
    panacealeon .ru
    finitolaco .ru
    fidelocastroo .ru
    ponowseniks .ru
    dianadrau .ru
    panalkinew .ru
    fionadix .ru ..."

    Last edited by AplusWebMaster; 2012-11-06 at 21:03.
    The machine has no brain.
    ......... Use your own.
    Browser check for updates here.
    YOU need to defend against -all- vulnerabilities.
    Hacks only need to find -1- to get in...
    .

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •