Results 1 to 10 of 1320

Thread: SPAM frauds, fakes, and other MALWARE deliveries...

Threaded View

Previous Post Previous Post   Next Post Next Post
  1. #11
    Adviser Team AplusWebMaster's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    6,881

    Thumbs down Fake 'voice mail' SPAM, Apple Phish...

    FYI...

    Fake 'voice mail' SPAM ...
    - http://blog.dynamoo.com/2014/09/this...-leads-to.html
    19 Sep 2014 - "This -fake- voice mail message leads to malware:
    From: Microsoft Outlook [no-reply@ victimdomain .com]
    Date: 19 September 2014 11:59
    Subject: You have received a voice mail
    You received a voice mail : VOICE976-588-6749.wav (25 KB)
    Caller-Id: 976-588-6749
    Message-Id: D566Y5
    Email-Id: <REDACTED>
    Download and extract to listen the message.
    We have uploaded voicemail report on dropbox, please use the following link to download your file...
    Sent by Microsoft Exchange Server


    The link in the email messages goes to www .prolococapena .com/yckzpntfyl/mahlqhltkh.html first and then downloads a file from www .prolococapena .com/yckzpntfyl/Invoice102740_448129486142_pdf.zip which contains exactly the -same- malicious executable being pushed in this earlier spam run*."
    * http://blog.dynamoo.com/2014/09/natw...yet-again.html
    19 Sep 2014 - "... shows network activity to hallerindia .com on 192.185.97.223. I would suggest that this is a good domain to -block- ..."
    Screenshot: https://2.bp.blogspot.com/-Oo5Lnrowt...00/natwest.png

    192.185.97.223: https://www.virustotal.com/en/ip-add...3/information/

    - http://myonlinesecurity.co.uk/natwes...e-pdf-malware/
    19 Sep 2014
    Screenshot: http://myonlinesecurity.co.uk/wp-con...-statement.png
    Current Virus total detections: 1/54*
    * https://www.virustotal.com/en/file/a...is/1411120481/
    ... Behavioural information
    UDP communications
    137.170.185.211: https://www.virustotal.com/en/ip-add...1/information/
    ___

    Fake 'Police Suspect' SPAM - PDF malware
    - http://myonlinesecurity.co.uk/city-l...e-pdf-malware/
    19 Sep 2014 - "'City of London Police Homicide Suspect' pretending to come from City of London Police is another one from the current bot runs which try to download various Zbots, cryptolocker, ransomware and loads of other malware on your computer. They are using email addresses and subjects that will entice a user to read the email and open the attachment... The email looks like:
    Bulletin Headline: HOMICIDE SUSPECT
    Sending Agency: London City Police
    Sending Location: GB – London – London City Police
    Bulletin Case#: 14-62597
    Bulletin Author: BARILLAS #1169
    Sending User #: 92856
    APBnet Version: 684593
    The bulletin is a pdf attachment to this email.
    The Adobe Reader (from Adobe .com) will display and print the bulletin best.
    You can Not reply to the bulletin by clicking on the Reply button in your email software.


    Of course it is -fake- and -not- from any Police force or Police service in UK or worldwide.
    19 September 2014: Homicide-case#15808_pdf.zip : Extracts to: Homicide-case#15808_pdf.exe
    Current Virus total detections: 4/55* . This 'City of London Police Homicide Suspect' is another one of the spoofed icon files that unless you have “show known file extensions enabled“, will look like a proper PDF file instead of the .exe file it really is, so making it much more likely for you to accidentally open it and be infected..."
    * https://www.virustotal.com/en/file/a...is/1411120670/
    ... Behavioural information
    TCP connections
    188.165.204.210: https://www.virustotal.com/en/ip-add...0/information/
    192.185.97.223: https://www.virustotal.com/en/ip-add...3/information/
    ___

    Fake 'Courier Svc' SPAM - PDF malware
    - http://myonlinesecurity.co.uk/tnt-co...e-pdf-malware/
    19 Sep 2014 - "'TNT UK Limited Package tracking' pretending to come from TNT COURIER SERVICE <tracking@tnt.co.uk> is another one from the current bot runs which try to download various Zbots, cryptolocker, ransomware and loads of other malware on your computer. They are using email addresses and subjects that will entice a user to read the email and open the attachment... The email looks like:
    TNT COURIER SERVICE (TCS)
    Customer/Delivery Services Department
    Central Pk Est/Mosley Rd, Trafford Park
    Manchester, M17 1TT UK.
    DETAILS OF PACKAGE
    Reg order no: 460911612900
    Your package have been picked up and is ready for dispatch.
    Connote # : 460911612900
    Service Type : Export Non Documents – Intl
    Shipped on : 18 Sep 14 12:00
    Order No : 4240629
    Status : Driver’s Return
    Description : Wrong Address
    Service Options: You are required to select a service option below.
    The options, together with their associated conditions.
    Please check attachment to view information about the sender and package.


    19 September 2014: Label_GB1909201488725UK_pdf.zip: Extracts to: Label_GB1909201488725UK_pdf.exe
    Current Virus total detections: 5/55* . This 'TNT UK Limited Package tracking' is another one of the spoofed icon files that unless you have “show known file extensions enabled“, will look like a proper PDF file instead of the .exe file it really is, so making it much more likely for you to accidentally open it and be infected..."
    * https://www.virustotal.com/en/file/a...is/1411121703/
    ... Behavioural information
    DNS requests
    hallerindia .com (192.185.97.223)
    TCP connections
    188.165.204.210: https://www.virustotal.com/en/ip-add...0/information/
    192.185.97.223: https://www.virustotal.com/en/ip-add...3/information/
    ___

    Bitcoin Ponzi scheme ...
    - http://www.reuters.com/article/2014/...0HE1Z820140919
    Sep 19, 2014 - "A U.S. federal judge in Texas ordered Bitcoin Savings and Trust and its owner to pay a combined $40.7 million after the Securities and Exchange Commission established that the company, which sold investments using the virtual currency, was a Ponzi scheme. In a decision dated Thursday, U.S. Magistrate Judge Amos Mazzant said Trendon Shavers "knowingly and intentionally" operated his company "as a sham and a Ponzi scheme," misleading investors about the use of their bitcoin, how he would generate promised returns and the safety of their investments... The SEC said Shavers used the online moniker "pirateat40" to raise more than 732,000 bitcoin from February 2011 to August 2012, promising investors up to 7 percent in weekly interest to be paid based on his ability to trade the currency. But according to the decision, Shavers used new bitcoin to repay earlier investors, diverted some to personal accounts at the now-bankrupt Mt. Gox exchange and elsewhere, and spent some investor funds on rent, food, shopping and casino visits..."
    ___

    Apple Phish ...
    - https://isc.sans.edu/diary.html?storyid=18669
    2014-09-18 23:58:53 UTC - "... this in this morning:
    Dear Client,
    We inform you that your account is about to expire in less 48 hours, it's imperative to update your information with our audit forms, otherwise your session and/or account will be a limited access.
    just click the link below and follow the steps our request form
    Update now...
    This is an automatically generated message. Thank you not to answer. If you need help, please visit the Apple Support.
    Apple Client Support.


    A variation on the -many- phishing emails we see regularly, just taking advantage of two public events, the celebrity photos and the release of the new phone. Maybe a reminder to staff as well as friends and family to -ignore- emails that say "click here" ..."
    ___

    Hack the ad network like a boss...
    - https://www.virusbtn.com/blog/2014/08_15.xml
    4 Sep 2014 - "... Exploit kits have been the scourge of the web for many years. Typically starting with a single line of inserted code, they probe for a number of vulnerabilities in the browser or its plug-ins and use this to drop malware onto the victim's machine. Given the high proportion of Internet users that haven't fully patched their systems, it is a successful way to spread malware.
    > https://www.virusbtn.com/images/news...icious_ads.png
    ... in order for exploit kits to do their work, a vulnerable website must first be infected, or the user must be enticed into clicking a malicious link. But by purchasing ad space, and using this to place malicious ads, attackers have discovered a cheap and effective way to get their malicious code to run inside the browser of many users. They can even tailor their advertisements to target specific languages, regions or even website subjects... We learned last month that this is a serious problem - when researchers found that cybercriminals had purchased advertising space on Yahoo in order to serve the 'Cryptowall' ransomware.
    > https://www.virusbtn.com/images/news...icious_ads.png
    Ideally... advertising networks would block malicious ads as they are added to their systems... this is easier said than done: given the size of such networks, it would take a lot of time and resources - plus, technically, it's difficult to block most malicious ads without a certain percentage of false positives..."

    Last edited by AplusWebMaster; 2014-09-20 at 12:33.
    The machine has no brain.
    ......... Use your own.
    Browser check for updates here.
    YOU need to defend against -all- vulnerabilities.
    Hacks only need to find -1- to get in...
    .

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •