Results 1 to 10 of 1320

Thread: SPAM frauds, fakes, and other MALWARE deliveries...

Threaded View

Previous Post Previous Post   Next Post Next Post
  1. #34
    Adviser Team AplusWebMaster's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    6,881

    Thumbs down Fake NACHA / ScanJet SPAM ...

    FYI...

    Fake NACHA SPAM / encodeshole .org
    - http://blog.dynamoo.com/2013/03/nacha-spam.html
    21 March 2013 - "This fake NACHA spam leads to malware on encodeshole .org:
    From: "Тимур.Родионов @direct.nacha .org" [mailto:biker @wmuttkecompany .com]
    Sent: 20 March 2013 18:51
    Subject: Payment ID 454806207096 rejected
    Importance: High
    Dear Sirs,
    Herewith we are informing you, that your latest Direct Deposit payment (ID431989197078) was cancelled,due to your current Direct Deposit software being out of date. Please use the link below to enter the secure section of our web site and see the details::
    Click here for more information
    Please apply to your financial institution to get the necessary updates of the Direct Deposit software.
    Best regards,
    ACH Network Rules Department
    NACHA - The Electronic Payments Association
    10933 Sunrise Valley Drive, Suite 771
    Herndon, VA 20190
    Phone: 703-561-0849 Fax: 703-787-0548


    The malicious payload is at [donotclick]encodeshole.org/closest/209tuj2dsljdglsgjwrigslgkjskga.php (report here) hosted on 91.234.33.187 (FOP Sedinkin Olexandr Valeriyovuch, Ukraine). The following suspect domains are on the same IP:
    91.234.33.187
    encodeshole .org
    rotariesnotify .org
    rigidembraces .info
    storeboughtmodelers .info
    * http://urlquery.net/report.php?id=1536940
    ... Detected BlackHole v2.0 exploit kit URL pattern... Detected live BlackHole v2.0 exploit kit 91.234.33.187

    - https://www.google.com/safebrowsing/...?site=AS:56485
    "... over the past 90 days, 54 site(s)... served content that resulted in malicious software being downloaded and installed without user consent. The last time Google tested a site on this network was on 2013-03-21, and the last time suspicious content was found was on 2013-03-21... Over the past 90 days, we found 8 site(s) on this network... that appeared to function as intermediaries for the infection of 23 other site(s)... this network has hosted sites that have distributed malicious software in the past 90 days. We found 13 site(s)... that infected 30 other site(s)..."
    ___

    Fake ScanJet SPAM / hillaryklinton .ru
    - http://blog.dynamoo.com/2013/03/scan...t-spam_21.html
    21 March 2013 - "This fake printer spam leads to malware on the amusingly-named hillaryklinton .ru:
    From: messages-noreply@bounce .linkedin .com [mailto:messages-noreply @bounce.linkedin .com] On Behalf Of LinkedIn Password
    Sent: 21 March 2013 06:56
    Subject: Scan from a Hewlett-Packard ScanJet #269644
    Attached document was scanned and sent
    to you using a Hewlett-Packard HP Officejet 6209P.
    Sent by: SANDIE
    Images : 1
    Attachment Type: .HTM [INTERNET EXPLORER]
    Hewlett-Packard Officejet Location: machine location not set


    In this case there is an attachment called Scanned_Document.htm which leads to a malicious payload at [donotclick]hillaryklinton .ru:8080/forum/links/column.php (report here*) hosted on:
    50.22.0.2 (SoftLayer, US)
    62.75.157.196 (Inergenia, Germany)
    109.230.229.156 (High Quality Server, Germany)
    Blocklist:
    50.22.0.2
    62.75.157.196
    109.230.229.156

    foruminanki .ru
    forumla .ru
    forumny .ru
    gulivaerinf .ru
    gxnaika .ru
    hanofk .ru
    heelicotper .ru
    hifnsiiip .ru
    hillaryklinton .ru
    himalayaori .ru
    humalinaoo .ru
    * http://urlquery.net/report.php?id=1535161
    ... Detected suspicious URL pattern... Blackhole 2 Landing Page 109.230.229.156
    ___

    Fake CNN emails lead to BlackHole Exploit Kit
    - http://blog.webroot.com/2013/03/21/f...-exploit-kit/?
    March 21, 2013 - "... thousands of malicious ‘CNN Breaking News’ themed emails... exploit-serving and malware-dropping links found within. Once users click on any of the links found in the bogus emails, they’re automatically exposed to the client-side exploits served by the Black Hole Exploit Kit...
    Sample screenshot of the spamvertised email:
    > https://webrootblog.files.wordpress....xploit_kit.png
    ... Malicious domain name reconnaissance:
    webpageparking .net – 109.74.61.59; 24.111.157.113; 58.26.233.175; 155.239.247.247...
    Responding to 24.111.157.113 ... malicious domains...
    Upon successful clienet-side exploitation, the campaign drops MD5: 24d406ef41e9a4bc558e22bde0917cc5 * ... Worm:Win32/Cridex.E...
    * https://www.virustotal.com/en/file/3...89be/analysis/
    File name: deskadp.dll
    Detection ratio: 23/45
    Analysis date: 2013-03-21 10:46
    ___

    Fake "Data Processing Service" spam / airtrantran .com
    - http://blog.dynamoo.com/2013/03/data...vice-spam.html
    21 Mar 2013 - "This spam leads to malware on airtrantran .com
    Date: Thu, 21 Mar 2013 15:55:22 +0000 [11:55:22 EDT]
    From: Data Processing Service [customerservice @dataprocessingservice .com]
    Subject: ACH file ID "973.995" has been processed successfully
    Files Processing Service
    SUCCESS Notification
    We have successfully complete ACH file 'ACH2013-03-20-8.txt' (id '973.995') submitted by user '[redacted]' on '2013-03-20 23:24:14.9'.
    FILE SUMMARY:
    Item count: 21
    Total debits: $17,903.59
    Total credits: $17,903.59
    For addidional info review it here


    24.111.157.113 (Midcontinent Media, US)
    58.26.233.175 (TMnet, Malaysia)
    109.74.61.59 (Ace Telecom, Hungary)
    155.239.247.247 (Centurion Telkom, South Africa)
    Blocklist:
    24.111.157.113
    58.26.233.175
    109.74.61.59
    155.239.247.247
    ..."
    ___

    Fake Facebook SPAM / scriptuserreported .org
    - http://blog.dynamoo.com/2013/03/face...portedorg.html
    21 Mar 2013 - "This Facebook spam has undergone some sort of failure during construction, revealing some of the secrets of how these messages are constructed. It leads to malware on scriptuserreported .org:
    Date: Thu, 21 Mar 2013 10:56:28 -0500
    From: Facebook [update+oi=MKW63Z @facebookmail .com]
    Subject: John Jenkins commented photo of you.
    facebook
    John Jenkins commented on {l5}.
    reply to this email to comment on this photo.
    see comment
    this message was sent to {mailto_username}@{mailto_domain}. if you don't want to receive these emails from facebook in the future, please unsubscribe.
    facebook, inc., attention: department 415, po box 1000{digit}, palo alto, ca 9{digit}3{digit}


    The malicious payload is at [donotclick]scriptuserreported .org/close/keys-importance-mention.php hosted on 5.39.37.31 and there are no surprises that this is OVH in France.. but wait a minute because this is in a little suballocated block thusly:
    inetnum: 5.39.37.24 - 5.39.37.31
    netname: n2p3DoHost
    descr: DoHost n2 p3
    country: FR ...
    Let's start with the server at 5.39.37.31 which is distributing the Blackhole Exploit Kit (report here*). This server also hosts the following potentially malicious domains:
    pesteringpricelinecom .net
    resolveconsolidate .net
    scriptuserreported .org
    provingmoa .com
    Go back a few IPs to 5.39.37.28 and there is are a couple of work-at-home scam sites:
    workhomeheres01 .com
    workhomeheres02 .com
    There's also a work-at-home scam on 5.39.37.24:
    makeworkhome12 .pl
    5.39.37.26 appears to be hosting a control panel for the Neutrino Exploit kit:
    myadminspanels .info
    supermyadminspanels .info
    So you can pretty much assume that 5.39.37.24/29 is a sewer and you should block the lot. Who is n2p3DoHost? Well, I don't know.. but there's one more clue at 5.39.37.29 which is the domain rl-host .net...
    Does M. Queste own this /29? If he does, then it looks like he has some very bad customers..
    Minimum blocklist:
    5.39.37.31
    pesteringpricelinecom .net
    resolveconsolidate .net
    scriptuserreported .org
    provingmoa .com
    Recommended blocklist:
    5.39.37.24/29
    makeworkhome12 .pl
    myadminspanels .info
    supermyadminspanels .info
    workhomeheres01 .com
    workhomeheres02 .com
    rl-host .net
    pesteringpricelinecom .net
    resolveconsolidate.net
    scriptuserreported .org
    provingmoa .com"
    * http://urlquery.net/report.php?id=1539128
    ... Detected live BlackHole v2.0 exploit kit 5.39.37.31
    ___

    Fake Changelog SPAM / hillairusbomges .ru
    - http://blog.dynamoo.com/2013/03/chan...sbomgesru.html
    21 Mar 2013 - "This fake changelog spam leads to malware on hillairusbomges .ru:
    Date: Thu, 21 Mar 2013 03:01:59 -0500 [04:01:59 EDT]
    From: LinkedIn Email Confirmation [emailconfirm @linkedin .com]
    Subject: Re: Changelog Oct.
    Good morning,
    as prmised updated changelog - View
    L. LOYD


    The malicious payload is at [donotclick]hillairusbomges .ru:8080/forum/links/column.php (report here*) hosted on:
    50.22.0.2 (Softlayer / Monday Sessions Media, US)
    66.249.23.64 (Endurance International Group, US)
    188.165.202.204 (OVH, France)
    Blocklist:
    50.22.0.2
    66.249.23.64
    188.165.202.204
    ..."
    * http://urlquery.net/report.php?id=1540852
    ... Detected suspicious URL pattern... Blackhole 2 Landing Page 188.165.202.204

    Last edited by AplusWebMaster; 2013-03-22 at 05:01.
    The machine has no brain.
    ......... Use your own.
    Browser check for updates here.
    YOU need to defend against -all- vulnerabilities.
    Hacks only need to find -1- to get in...
    .

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •