Page 84 of 132 FirstFirst ... 347480818283848586878894 ... LastLast
Results 831 to 840 of 1320

Thread: SPAM frauds, fakes, and other MALWARE deliveries...

  1. #831
    Adviser Team AplusWebMaster's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    6,881

    Thumbs down Fake 'OUTSTANDING INVOICES', 'Amendment/Agreement' SPAM, New crypto-ransomware

    FYI...

    Fake 'OUTSTANDING INVOICES' SPAM - malicious attachment
    - http://blog.dynamoo.com/2015/11/malw...ces-steve.html
    9 Nov 2015 - "This -fake- financial email does not come from Resimac but is instead a simple -forgery- with a malicious attachment.
    From "Steve McDonnell" [stevem@ resimac .co.uk]
    Date Mon, 09 Nov 2015 18:24:23 +0530
    Subject OUTSTANDING INVOICES
    Dear,
    Please find attached invoices 1396 & 1406 which are now outstanding.
    I should be grateful if you would let me know when they are going to be paid.
    Kind Regards
    Steve McDonnell
    Company Secretary
    Resimac Ltd
    Unit 11, Poplars Industrial Estate ...


    I have only seen a single sample of this with an attachment named Invoices001396,1406-11.2015.xls which has a VirusTotal detection rate of 3/54* ... which contains this malicious macro... which (according to this Hybrid Analysis report**) in this case downloads a binary from:
    www .davidcaballero .com/87yte55/6t45eyv.exe
    The VirusTotal detection rate for this binary is 3/55***. That report indicates network traffic to:
    89.108.71.148 (Agava Ltd, Russia)
    Other analyses are pending, however I strongly recommend that you block traffic to that IP. The payload is likely to be the Dridex banking trojan."
    * https://www.virustotal.com/en/file/6...8fc3/analysis/

    ** https://www.hybrid-analysis.com/samp...nvironmentId=1

    *** https://www.virustotal.com/en/file/3...a673/analysis/
    TCP connections
    89.108.71.148: https://www.virustotal.com/en/ip-add...8/information/
    191.234.4.50: https://www.virustotal.com/en/ip-add...0/information/

    213.229.173.59: https://www.virustotal.com/en/ip-add...9/information/

    - http://myonlinesecurity.co.uk/outsta...sheet-malware/
    9 Nov 2015
    Screenshot: http://myonlinesecurity.co.uk/wp-con...S-1024x561.png
    "... 9 November 2015: Invoices001396,1406-11.2015.xls
    Current Virus total detections 8/55* ... Downloads Dridex banking malware from
    www .davidcaballero .com/87yte55/6t45eyv.exe ... DO NOT follow the advice they give to enable macros or enable editing to see the content... look something like these images when opened in protected view mode, which should be the default in Office 2010, 2013 and 365:
    > http://myonlinesecurity.co.uk/wp-con...1-1024x412.png
    ... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
    * https://www.virustotal.com/en/file/6...8fc3/analysis/
    ___

    Fake 'Amendment/Agreement' SPAM - sharefile .com malware
    - http://blog.dynamoo.com/2015/11/malw...me-shared.html
    5 Nov 2015 - "This -fake- Dropbox spam appears to come from randomly-generated people..
    From: Sandy Schmitt via Dropbox [no-reply@ dropbox .com]
    Date: 9 November 2015 at 11:41
    Subject: Sandy Schmitt shared "Amendment or the Agreement_09-11-2015.zip" with you
    Sandy used Dropbox to share a file with you!
    Click here to view...

    > https://1.bp.blogspot.com/-cua7HAy0d...ke-dropbox.png

    The link in the email actually goes to sharefile .com where it downloads a file Amendment or the Agreement_09-11-2015.zip containing a malicious executable Amendment or the Agreement_09-11-2015.scr which has a VirusTotal detection rate of 2/54*. Automated analysis is inconclusive [1] [2] but you can guarantee that this is nothing good. Because of the low detection rates, it might be worth -temporarily- blocking sharefile .com."
    * https://www.virustotal.com/en/file/4...is/1447072746/

    1] https://www.hybrid-analysis.com/samp...nvironmentId=1

    2] https://malwr.com/analysis/MTU3N2U2Z...JjNzE2MDFiYmE/
    ___

    New crypto-ransomware targets Linux web servers
    - http://net-security.org/malware_news.php?id=3148
    09.11.2015 - "There's a new piece of crypto-ransomware out there, but unlike most malware of this particular type, this one is mainly directed at web servers running on Linux. The threat has been dubbed Linux Encoder by Dr. Web researchers, and is currently detected by a small fraction of AV solutions*:
    > http://www.net-security.org/images/a...112015-big.jpg
    ... "Once launched with administrator privileges, the Trojan (...) downloads files containing cybercriminals' demands and a file with the path to a public RSA key. After that, the malicious program starts as a daemon and deletes the original files," the researchers explained**. "Subsequently, the RSA key is used to store AES keys which will be employed by the Trojan to encrypt files on the infected computer"... It encrypts a wide variety of files - including Office, documents, image files, HTML and PHP files, archives, DLLs and EXE files - and adds the .encrypted extension to them. Instructions on what to do in order to get the files decrypted are included in each directory. Dr. Web researchers are working on a technology that can help decrypt data encrypted by this malware, but in the meantime the best protection against its destructiveness is to backup crucial files regularly..."
    * https://www.virustotal.com/en/file/f...0956/analysis/

    ** https://news.drweb.com/show/?i=9686&lng=en&c=5

    Last edited by AplusWebMaster; 2015-11-09 at 22:26.
    The machine has no brain.
    ......... Use your own.
    Browser check for updates here.
    YOU need to defend against -all- vulnerabilities.
    Hacks only need to find -1- to get in...
    .

  2. #832
    Adviser Team AplusWebMaster's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    6,881

    Thumbs down Fake 'Itinerary', 'PayPal' SPAM, Linux Encoder 'fix'

    FYI...

    Fake 'Itinerary' SPAM - malcious attachment
    - http://blog.dynamoo.com/2015/11/malw...03ns39-no.html
    10 Nov 2015 - "This rather terse -fake- business spam does not come from Click Travel but is instead a simple -forgery- with a malcious attachment:
    From: no-reply@ clicktravel .com [mailto:no-reply@ clicktravel .com]
    Sent: Tuesday, November 10, 2015 11:21 AM
    Subject: Itinerary #C003NS39
    Please see document attached


    Attached is a file Hotel-Fax-V0045G2B_8308427510989318361.xls which contains this malicious macro... which (according to this Hybrid Analysis report*) downloads a component from:
    www .clemenciaortiz .com/87yte55/6t45eyv.exe
    So far I have only seen one sample of this, there are likely to be others with different download locations but the same binary. This executable file has a detection rate of 2/55** and that VirusTotal report and this Malwr report*** indicate traffic to the following IP:
    89.108.71.148 (Agava Ltd, Russia)
    I strongly recommend blocking traffic to that IP address. The payload is the Dridex banking trojan."
    * https://www.hybrid-analysis.com/samp...nvironmentId=1

    ** https://www.virustotal.com/en/file/1...is/1447152223/
    TCP connections
    89.108.71.148: https://www.virustotal.com/en/ip-add...8/information/
    191.234.4.50: https://www.virustotal.com/en/ip-add...0/information/

    *** https://malwr.com/analysis/MjI4MmQzN...gzOTM5MmZjYTA/
    ___

    Linux Encoder victims catch a lucky break: flaw in the malware
    - http://net-security.org/malware_news.php?id=3151
    10.11.2015 - "... the good news is that the malware makers have made a mistake that allowed Bitdefender researchers to recover the AES encryption key without having to decrypt it with the RSA private key held by the criminals... "We looked into the way the key and initialization vector are generated by reverse-engineering the Linux.Encoder.1 sample in our lab," they added. "We realized that, rather than generating secure random keys and IVs, the sample would derive these two pieces of information from the libc rand() function seeded with the current system timestamp at the moment of encryption. This information can be easily retrieved by looking at the file’s timestamp. This is a huge design flaw that allows retrieval of the AES key without having to decrypt it with the RSA public key sold by the Trojan’s operator(s)." This knowledge allowed them to create an effective decryption script, and given that this piece of ransomware targets more tech savvy users, they should not have a problem deploying it (check out this blog post* for the download link and instructions on how to use it)... They advised users never to run applications that they don’t completely trust, and to backup often - and keep the backup away from the system. In this particular case, that was the initial way to avoid paying the ransom, as the Trojan also encrypted backups found on the server."
    * http://labs.bitdefender.com/2015/11/...ncryption-key/
    ___

    Fake 'PO99631' SPAM - xls malware
    - http://myonlinesecurity.co.uk/po9963...sheet-malware/
    10 Nov 2015 - "An email with the subject of 'PO99631' pretending to come from Mark Singleton <m.singleton@ gilkes .com> with a malicious Excel XLS spreadsheet attachment is another one from the current bot runs... The email looks like:
    Please find PO99631 attached.
    Kind Regards
    Mark Singleton Sourcing Specialist Gilkes Pumping Systems Direct: +44 (0) 1539 790051
    Tel: +44 (0) 1539 720028 Fax: +44 (0) 1539 732110 Gilbert Gilkes & Gordon Ltd ・Kendal ・Cumbria ・LA9 7BZ・United Kingdom
    Registered Office: Gilbert Gilkes & Gordon Ltd. Kendal, Cumbria, LA9 7BZ Registration No: 173768 England & Wales


    10 November 2015 : 99631 RBE.xls - Current Virus total detections 4/42*
    ... Same Dridex banking malware is downloaded as described in today’s earlier malspam run of malicious office documents**..."
    * https://www.virustotal.com/en/file/8...is/1447173398/

    ** http://myonlinesecurity.co.uk/itiner...sheet-malware/
    ___

    Fake 'PayPal' SPAM - PDF malware
    - http://myonlinesecurity.co.uk/your-p...e-pdf-malware/
    9 Nov 2015 - "An email with the subject of 'Your PayPal Extras MasterCard bill payment' has been sent pretending to come from admin@ eight-point .com with a zip attachment is another one from the current bot runs... The content of the email says :
    Hello customer,
    Your payment for 654.35 USD has been sent.
    Recipient: PayPal Extras MasterCard® Payment Method: Echeck Payment Amount: 654.35 USD Payment Date: Mon, 09 Nov 2015 22:04:27 +0100 Details in the attachment
    Thanks for choosing the PayPal Extras MasterCard®.
    Sincerely, PayPal ...
    PayPal Email ID PP0822 – yrV3fNFlU5JL13 ...


    9 November 2015: firm prices swordplay.zip: Extracts to: 353444754788.exe
    Current Virus total detections 8/54* . This is another one of the spoofed icon files that unless you have “show known file extensions enabled“, will look like a proper PDF file instead of the .exe file it really is, so making it much more likely for you to accidentally open it and be infected..."
    * https://www.virustotal.com/en/file/a...669f/analysis/

    Last edited by AplusWebMaster; 2015-11-10 at 18:38.
    The machine has no brain.
    ......... Use your own.
    Browser check for updates here.
    YOU need to defend against -all- vulnerabilities.
    Hacks only need to find -1- to get in...
    .

  3. #833
    Adviser Team AplusWebMaster's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    6,881

    Thumbs down Fake 'scanner', 'PayPal', 'Invoice' SPAM, AV alone is not enough

    FYI...

    Fake 'scanner' SPAM - xls macro malware
    - http://myonlinesecurity.co.uk/scanne...sheet-malware/
    11 Nov 2015 - "An email with -no- subject pretending to come from a scanner at your own email domain about a document from 'Aficio MP C5000' with a malicious Excel XLS spreadsheet attachment is another one from the current bot runs... The email looks like:
    This E-mail was sent from “RNPF137EA” (Aficio MP C5000).
    Scan Date: Wed, 11 Nov 2015 12:53:35 +0300
    Queries to: scanner@ [redacted]


    11 November 2015: 20151029110925329.xls - Current Virus total detections 4/54*
    ... downloads http ://conesulmodelismo .com.br/87yte55/6t45eyv.exe ... likely to be Dridex banking malware although completely undetected at the moment (VirusTotal 0/54**)... DO NOT follow the advice they give to enable macros or enable editing to see the content. Most of these malicious word documents appear to be blank or look something like these images when opened in protected view mode, which should be the default in Office 2010, 2013 and 365:
    > http://myonlinesecurity.co.uk/wp-con...1-1024x412.png
    ... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
    * https://www.virustotal.com/en/file/b...is/1447235888/

    ** https://www.virustotal.com/en/file/a...is/1447236803/
    TCP connections
    95.154.203.249: https://www.virustotal.com/en/ip-add...9/information/
    8.253.82.142: https://www.virustotal.com/en/ip-add...2/information/

    conesulmodelismo .com.br: 200.169.17.48: https://www.virustotal.com/en/ip-add...8/information/
    ___

    Fake 'PayPal' refund SPAM - malicious link
    - http://blog.dynamoo.com/2015/11/malw...m-bowater.html
    11 Nov 2015 - "This -fake- PayPal email leads to malware:
    From: service@ paypal .co.uk
    Date: 11 November 2015 at 16:27
    Subject: Refund from Bowater Incorporated
    Bowater Incorporated has just sent you a refund
    Wed, 11 Nov 2015 17:27:26 +0100
    Transaction ID: 47E30904DC4145388
    Dear Customer,
    Bowater Incorporated has just sent you a full refund of £7849.90 GBP for your purchase.
    If you have any questions about this refund, please contact Bowater Incorporated
    The refund will go to your PayPal account. It may take a few moments for this transaction to appear in your account.
    To see all the transaction details, please download and view from the link below ...
    Merchant information
    Bowater Incorporated Note from merchant
    None provided
    Original transaction details
    Description Unit price Qty Amount
    Purchase from Bowater Incorporated £7849.90 GBP 1 £7849.90 GBP
    Insurance: ----
    Total: £7849.90 GBP
    Refund to PayPal Balance: £7849.90 GBP
    Invoice Number: 59266315
    Yours sincerely,
    PayPal ...


    The -link- in the email goes to a download location at sharefile .com which leads to a file transaction details.zip containing a malicious executable 'transaction details.scr'. This binary has a VirusTotal detection rate of just 1/55*. The Hybrid Analysis report** shows network traffic consistent with Upatre download the Dyre banking trojan. One key IP address in 197.149.90.166 (Cobranet, Nigeria) which is well worth blocking."
    * https://www.virustotal.com/en/file/6...is/1447260291/

    ** https://www.hybrid-analysis.com/samp...nvironmentId=1

    - http://myonlinesecurity.co.uk/refund...e-pdf-malware/
    11 Nov 2015 - "An email that looks like it comes from -PayPal- with the subject of 'Refund from AGCO Corporation' pretending to come from service@ paypal .co.uk with a zip attachment is another one from the current bot runs...

    Screenshot: http://myonlinesecurity.co.uk/wp-con...n-1024x544.png

    11 November 2015: transaction details.zip: Extracts to: transaction details.scr
    Current Virus total detections 1/53* . This is another one of the spoofed icon files that unless you have “show known file extensions enabled“, will look like a proper PDF file instead of the .exe file it really is, so making it much more likely for you to accidentally open it and be infected..."
    * https://www.virustotal.com/en/file/6...is/1447256652/
    ___

    Fake 'Invoice' SPAM - malicious attachment
    - http://blog.dynamoo.com/2015/11/malw...3610-from.html
    11 Nov 2015 - "This -fake- invoice does not come from OfficeFurnitureOnline .co.uk but is instead a simple -forgery- with a malicious attachment.
    From accounts [accounts@ equip4work .co.uk]
    Date Wed, 11 Nov 2015 14:54:33 +0400
    Subject Invoice SI823610 from OfficeFurnitureOnline .co.uk Order Ref 4016584
    Please find attached a sales invoice from OfficeFurnitureOnline .co.uk.
    This email address is only for account enquiries, please check your confirmation
    for any information regarding the order details or delivery lead times.
    Thank you for your order.


    Attached is a file SI823610.XLS which I have seen only one version of in several samples of the email. Usually there are different variants. In this case, the spreadsheet contains this malicious macro... and has a VirusTotal score of 4/54*. According to this Hybrid Analysis report** it then downloads a malicious binary from:
    kdojinyhb .wz.cz/87yte55/6t45eyv.exe
    In turn, this binary has a detection rate of zero***. Those two reports plus this Malwr report[4] show between them malicious traffic to the following IPs:
    95.154.203.249 (Iomart / Rapidswitch, UK)
    182.93.220.146 (Ministry Of Education, Thailand)
    89.32.145.12 (Elvsoft SRL / Coreix , Romania / UK)
    The payload is the Dridex banking trojan.
    Recommended blocklist:
    95.154.203.249
    182.93.220.146
    89.32.145.12
    wz.cz
    "
    * https://www.virustotal.com/en/file/1...is/1447239924/

    ** https://www.hybrid-analysis.com/samp...nvironmentId=1

    *** https://www.virustotal.com/en/file/a...is/1447240051/
    TCP connections
    95.154.203.249: https://www.virustotal.com/en/ip-add...9/information/
    8.253.82.142: https://www.virustotal.com/en/ip-add...2/information/

    4] https://malwr.com/analysis/YjVhM2M1M...NkNzk3MTQ5ZDI/
    ___

    Anti-Virus alone is not enough ...
    - https://blog.malwarebytes.org/securi...longer-enough/
    Nov 11, 2015 - "... The malware ecosystem has changed drastically in the past 10 years, to the point that the old precautions are just no longer enough. Here are the three top reasons for this:
    You don’t have to click to get hit. In the past, it was sufficient to simply avoid clicking on suspect links or visiting bad sites. This is no longer the case because of new attack vectors like malvertising. In a malvertising attack, a legitimate site unknowingly pulls malicious content from a bad site, and the malicious content seeks ways (often exploits) to install itself on your computer. You may have heard these attacks called “drive by downloads.” Just by visiting a good site on the wrong day, you get infected...
    Traditional AV response times to new threats are too slow. According to data compiled by Panda Research, traditional AV only stops 30-50 percent of new zero-hour malware when it’s first seen. A few take up to eight hours to reach even the 90 percent level, with the majority needing a full 24 hours. And it takes them a full seven days to get to the high 90’s. That’s a whole lot of time to be missing protection. A recent study by the Enterprise Strategy Group showed that almost -half- of the enterprises polled had suffered a successful malware attack even though they were running anti-virus.
    Exploits are everywhere. Many software products, notably including Java and Flash, were designed in an era when computer security was a much less serious concern. And the worst part of exploit based malware is that the time from the initial exploit to detection and remediation – is on average almost a year...
    ... we believe in what’s called a layered approach to security.
    • The layered approach is just like using a seat belt and an airbag – they both help keep you safe, but they work in different ways. In layered security, you don’t put all your eggs in the AV basket – you use multiple types of defense, each of which has its own strengths, and does different things. An anti-malware program is a zero-day focused, lightweight product that works with your traditional anti-virus product to block threats that AV misses. An anti-exploit program takes a different – yet still complimentary – approach. While anti-malware concerns itself with the what – files, URLs, domains, and so forth, anti-exploit worries about the how. How is a particular application behaving, and is it only performing actions which are expected? Using advanced behavior analysis, anti-exploit can stop a compromise at the beginning of the attack chain, rather than waiting until malware is already installed. And of course, you can augment your vendor provided protection by simply maintaining your computer according to the Three Basic Rules of Online Security, written by expert Brian Krebs:
    • Don’t install software you didn’t explicitly request
    • Keep your installed software up to date
    • If you no longer need a piece of software, uninstall it..."

    Last edited by AplusWebMaster; 2015-11-11 at 22:30.
    The machine has no brain.
    ......... Use your own.
    Browser check for updates here.
    YOU need to defend against -all- vulnerabilities.
    Hacks only need to find -1- to get in...
    .

  4. #834
    Adviser Team AplusWebMaster's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    6,881

    Thumbs down Fake 'Invoice', 'Remittance Advice', 'e-Transfer' SPAM

    FYI...

    Fake 'Invoice' SPAM - xls malware
    - http://myonlinesecurity.co.uk/debbie...sheet-malware/
    12 Nov 2015 - "An email with the subject of 'Invoice' pretending to come from Debbie Haydon <debbie@ mvmilk .co.uk> with a malicious Excel XLS spreadsheet attachment is another one from the current bot runs... The email looks like:
    Thank you for your order. Your Invoice – V414980 – is attached.
    As agreed this invoice will NOT be sent via post.
    If you have any questions regarding the attached invoice please telephone our office on 01708 688422.
    kind regards


    12 November 2015: V414980.XLS - Current Virus total detections 3/54*
    ... Downloads Dridex banking malware from:
    http ://aniretak .wz.cz/5t546523/lhf3f334f.exe -or-
    http ://sanoko .jp/5t546523/lhf3f334f.exe (VirusTotal **)... DO NOT follow the advice they give to enable macros or enable editing to see the content. Most of these malicious word documents appear to be blank or look something like these images when opened in protected view mode, which should be the default in Office 2010, 2013 and 365:
    > http://myonlinesecurity.co.uk/wp-con...1-1024x412.png
    ... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
    * https://www.virustotal.com/en/file/b...is/1447326664/

    ** https://www.virustotal.com/en/file/7...dc39/analysis/
    TCP connections
    95.154.203.249: https://www.virustotal.com/en/ip-add...9/information/
    191.234.4.50: https://www.virustotal.com/en/ip-add...0/information/
    ___

    Fake 'Remittance Advice' SPAM - malicious attachment
    - http://blog.dynamoo.com/2015/11/malw...ce-advice.html
    12 Nov 2015 - "This fake financial spam does -not- come from Norfolk County Council but is instead a simple -forgery- with a malicious attachment:
    From AccountsPayable@ Norfolk .gov.uk
    Date Thu, 12 Nov 2015 14:09:46 +0430
    Subject Remittance Advice
    Dear Sir/Madam,
    Please find attached your remittance advice.
    Regards,
    NCC ...


    Attached is a file 6134443_101115_141851.xls which apparently comes in two or three versions, although I have only seen one with a VirusTotal detection rate of 3/54* and containing this malicious macro... These documents then download a malicious binary from:
    aniretak .wz.cz/5t546523/lhf3f334f.exe
    sanoko .jp/5t546523/lhf3f334f.exe
    www .delianfoods .com/5t546523/lhf3f334f.exe
    This binary has a VirusTotal detection rate of 3/54**, and that report plus this Hybrid Analysis report*** show malicious traffic to:
    95.154.203.249 (Iomart Hosting / Rapidswitch, UK)
    182.93.220.146 (Ministry of Education, Thailand)
    The payload is the Dridex banking trojan.
    Recommended blocklist:
    95.154.203.249
    182.93.220.146
    "
    * https://www.virustotal.com/en/file/b...is/1447326664/

    ** https://www.virustotal.com/en/file/1...is/1447326681/

    *** https://www.hybrid-analysis.com/samp...nvironmentId=1
    ___

    Fake 'e-Transfer' SPAM - Dyre banking trojan
    - http://blog.dynamoo.com/2015/11/malw...ansfer-to.html
    12 Nov 2015 - "This -fake- financial spam leads to malware:
    From: Bank of Montreal [notify@ payments .interac.ca]
    Date: 30 September 2015 at 13:34
    Subject: FYI: INTERAC e-Transfer to Guillaume Davis accepted
    Dear Customer
    The INTERAC e-Transfer for $2997.60 (CAD) you sent to Guillaume Davis was accepted. The transfer is now complete.
    Recipient's message: A message was not provided
    Thank you for using Bank of Montreal INTERAC e-Transfer Service.
    Please follow the link below to download the transaction details ...


    The -link- in the email downloads a file INTERAC e-Transfer transaction details.doc which has a VirusTotal detection rate of just 1/53*. Analysis of the malicious code within the downloaded document is pending, however the use of sharefile .com is consistent with the delivery of the Dyre banking trojan."
    * https://www.virustotal.com/en/file/f...is/1447342765/

    - http://myonlinesecurity.co.uk/fyi-in...d-doc-malware/
    12 Nov 2015 - "... These are spoofing loads of different Canadian Banks. So far I have also seen Canadian Imperial Bank of Commerce, Royal Bank of Canada, Bank of Montreal all with random names for the recipients of the -fake- INTERAC 'e-Transfer' Service...

    12 November 2015: INTERAC e-Transfer transaction details.doc - Current Virus total detections 1/53*
    MALWR** which contains an embedded rtf file(VirusTotal 2/54***) , which in turn has an embedded dyre / dyreza banking malware (VirusTotal[4])... DO NOT follow the advice they give to enable macros or enable editing to see the content... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
    * https://www.virustotal.com/en/file/f...is/1447344188/

    ** https://malwr.com/analysis/OGUxMTUyM...YzNTQ4NDFkNjI/

    *** https://www.virustotal.com/en/file/a...is/1447345292/

    4] https://www.virustotal.com/en/file/8...is/1447345341/
    ___

    Buhtrap gang distributed malware thru Ammyy’s remote desktop software
    - http://net-security.org/malware_news.php?id=3154
    12.11.2015 - "... Researchers noticed in late October that, for about a week, visitors to ammyy .com were downloading an installer that contained malware along with the Ammyy product. While Ammyy Admin is legitimate software, it has a long history of being used by fraudsters, and several security products detect it as a Potentially Unsafe Application. Similarly, Download .com, a major download site, doesn’t provide a direct-download link to Ammyy software to users, instead listing the Ammyy Admin page for information purposes only. However, Ammyy Admin is still widely used: Ammyy’s website lists clients that include TOP500 Fortune companies as well as Russian banks. According to the investigation, -five- different malware families were distributed through Ammyy’s website during the recent incident. The first malware, the Lurk downloader, was distributed on October 26. Next was Corebot on October 29, then Buhtrap on October 30, and finally Ranbyus and Netwire RAT on November 2.
    Although these families are not linked, the droppers that could potentially have been downloaded from Ammyy’s website were the same in every case. Thus it is quite possible that the cybercriminals responsible for the website hack sold the access to different groups. Of the malware distributed via Ammyy’s website, of particular interest is the install package used in Operation Buhtrap. “The fact that cybercriminals now use strategic web compromises is another sign of the gap closing between techniques used by cybercriminals and by actors behind so called Advanced Persistent Threats,” said Jean-Ian Boutin, Malware Researcher at ESET."
    - http://www.welivesecurity.com/2015/1...via-ammyy-com/

    Last edited by AplusWebMaster; 2015-11-12 at 18:24.
    The machine has no brain.
    ......... Use your own.
    Browser check for updates here.
    YOU need to defend against -all- vulnerabilities.
    Hacks only need to find -1- to get in...
    .

  5. #835
    Adviser Team AplusWebMaster's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    6,881

    Thumbs down 'Magnitude EK', Fake 'Telstra bill', 'Invoice', 'Statements', 'Payment' SPAM

    FYI...

    'Magnitude EK' activity increases via Malvertising attacks
    - https://blog.malwarebytes.org/exploi...ising-attacks/
    Nov 13, 2015 - "During the past few days we have noticed a higher than usual number of 'malvertising attacks' pushing the Magnitude exploit kit – which had been relatively quiet – to drop ransomware. Magnitude EK is one of those exploit kits we don’t hear about as much in comparison to others such as Angler EK or Nuclear EK. Its unique URL pattern makes it easy to spot from the clutter of network traffic captures because it uses chained subdomains typically ending in a shady Top Level Domain like -pw- (Palau Pacific island)... Perhaps this increased activity is due to the fact that Magnitude EK is the third exploit kit to leverage the latest Flash Player vulnerability (CVE-2015-7645*) recently patched by Adobe... CryptoWall was dropped via two separate malware binaries..."

    * Latest Flash version is -19.0.0.245- check yours to avoid trouble:
    > https://www.adobe.com/software/flash/about/
    ___

    Fake 'Telstra bill' SPAM - xls malware
    - http://myonlinesecurity.co.uk/our-ne...sheet-malware/
    13 Nov 2015 - "An email with the subject of 'our new Telstra bill for account 2000514059862 is attached' pretending to come from telstraemailbill_noreply8@ online .telstra .com with a malicious Excel XLS spreadsheet attachment is another one from the current bot runs...

    Screenshot: http://myonlinesecurity.co.uk/wp-con...d-1024x580.png

    13 November 2015: TRPB_1_1107991874.pxls - Current Virus total detections 3/54*
    ... some of these emails have a plxs attachment which I never heard of. It is either a mistake by the malware bot sender or it is a new excel extension that needs a new version of excel to open it. My gut feel is that it was a mistake and the P added in error. Renaming the file to a simple xls makes it work as normal and shows a download of Dridex banking malware from
    http ://rgr-sa .ch/~testing/345u754/433fd.exe (VirusTotal 3/53**). Many other copies of the email had a -normal- xls extension... DO NOT follow the advice they give to enable macros or enable editing to see the content. Most of these malicious word documents appear to be blank or look something like these images when opened in protected view mode, which should be the default in Office 2010, 2013 and 365:
    > http://myonlinesecurity.co.uk/wp-con...-macros_21.png
    ...The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
    * https://www.virustotal.com/en/file/9...is/1447408547/

    ** https://www.virustotal.com/en/file/0...is/1447409290/
    TCP connections
    78.47.66.169: https://www.virustotal.com/en/ip-add...9/information/
    88.221.14.122: https://www.virustotal.com/en/ip-add...2/information/
    ___

    Fake 'Invoice' SPAM - xls malware
    - http://myonlinesecurity.co.uk/novemb...sheet-malware/
    13 Nov 2015 - "An email with the subject of 'November Invoice INV-9771' from 'Eye on Books' pretending to come from Charles Klvana <message-service@ post .xero .com> with a malicious Excel XLS spreadsheet attachment is another one from the current bot runs... The email looks like:
    Hi,
    Please find attached this months invoice for Xero & Receiptbank software. You’ve completed a direct debit form, so this will have been paid from your nominated account, so please don’t send through payment separately.
    Thanks again for your business, it’s greatly appreciated.
    Kind regards,
    Charles Klvana
    EYE ON BOOKS


    13 November 2015 : Invoice INV-9771.xls - Current Virus total detections 3/52* ... the same malware downloading the same Dridex banking malware as described in this post**..."
    * https://www.virustotal.com/en/file/c...is/1447409851/

    ** http://myonlinesecurity.co.uk/our-ne...sheet-malware/
    ___

    Fake 'Statements' SPAM - xls malware
    - http://myonlinesecurity.co.uk/statem...sheet-malware/
    13 Nov 2015 - "The -third- version of a Dridex dropper today so far is an email with the subject of 'Statement(s) and related document(s) for October' pretending to come from David Bartels <davebartels228@ gmail .com> with a malicious Excel XLS spreadsheet attachment is another one from the current bot runs... The email looks like:
    Dear Sir/Madam
    Please find attached:
    Your Statement(s) and related document(s) for October.
    Regards,
    Miriam Benda
    Professionals Ashgrove


    13 November 2015: Mai49621.xls Same malware although -renamed- that downloads the same Dridex banking malware from the same locations as described in today’s earlier malspam runs [1] [2]...
    1] http://myonlinesecurity.co.uk/novemb...sheet-malware/

    2] http://myonlinesecurity.co.uk/our-ne...sheet-malware/
    ___

    Fake 'Invoice' SPAM - doc malware
    - http://myonlinesecurity.co.uk/novemb...d-doc-malware/
    13 Nov 2015 - "An email with the subject of 'November Invoice #78909675' pretending to come from Logan Courtney <CourtneyLogan8935@ olivainsurance .com> (probably random, -faked- headers) with a malicious word doc attachment is another one from the current bot runs... The email looks like:
    Hello ,
    Please review the attached copy of your Electronic document.
    A paper copy of this document is being mailed, but this email is being sent in addition for your convenience.
    Thank you for your business,
    Wahl Canada Inc.
    NOTICE OF CONFIDENTIALITY. This communication, including any information transmitted with it, is intended only for the use of the individual(s) to which it is addressed and is confidential. If you are not an intended recipient...


    13 November 2015: INVOICE-78909675.doc - Current Virus total detections 0/54*
    This has an embedded ole object in base 64 format that I couldn’t manually decode however MALWR** showed it connecting to http ://109.234.37.214 /alikaps/terminator.php where it downloaded ulysse.exe (VirusTotal 1/51***)... DO NOT follow the advice they give to enable macros or enable editing to see the content. Most of these malicious word documents appear to be blank or look something like these images when opened in protected view mode, which should be the default in Office 2010, 2013 and 365:
    > http://myonlinesecurity.co.uk/wp-con...1-1024x412.png
    ... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
    * https://www.virustotal.com/en/file/8...is/1447416661/

    ** https://malwr.com/analysis/NWYyMzAwN...c2MjFiZjIzMTg/

    *** https://www.virustotal.com/en/file/7...is/1447417050/
    TCP connections
    85.214.152.31: https://www.virustotal.com/en/ip-add...1/information/
    191.234.4.50: https://www.virustotal.com/en/ip-add...0/information/

    109.234.37.214: https://www.virustotal.com/en/ip-add...4/information/
    > https://www.virustotal.com/en/file/e...33d2/analysis/
    ulysse.exe 0/54
    ___

    Fake 'Payment Confirmation' SPAM - doc malware
    - http://myonlinesecurity.co.uk/transa...d-doc-malware/
    13 Nov 2015 - "An email with the subject of 'Transaction and Payment Confirmation' from Spilo Worldwide pretending to come from random names, companies and email addresses with a malicious word doc attachment is another one from the current bot runs... The email looks like:

    Transaction and Payment Confirmation from Spilo Worldwide

    13 November 2015: Spilo_Worldwide_payment_17650687.doc - Current Virus total detections 0/54*
    This is another one of the -new- type macro downloaders that I first saw earlier today that have an embedded base 64 file inside the word doc that uses a post command to a php file on a remote server instead of the more usual -get- to download malware. MALWR analysis shows that this one contacts http ://91.223.88.54 /alikaps/terminator.php to download a different Dridex version by the same file name ulysse.exe from today’s earlier one (VirusTotal 0/54**)... DO NOT follow the advice they give to enable macros or enable editing to see the content. Most of these malicious word documents appear to be blank or look something like these images when opened in protected view mode, which should be the default in Office 2010, 2013 and 365:
    > http://myonlinesecurity.co.uk/wp-con...1-1024x412.png
    ... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
    * https://www.virustotal.com/en/file/4...is/1447423504/

    ** https://www.virustotal.com/en/file/e...is/1447425228/

    91.223.88.54: https://www.virustotal.com/en/ip-add...4/information/
    > https://www.virustotal.com/en/file/e...33d2/analysis/
    ulysse.exe 0/54
    ... Behavioural information
    TCP connections
    85.214.152.31: https://www.virustotal.com/en/ip-add...1/information/
    > https://www.virustotal.com/en/file/e...33d2/analysis/
    191.234.4.50: https://www.virustotal.com/en/ip-add...0/information/

    Last edited by AplusWebMaster; 2015-11-13 at 17:45.
    The machine has no brain.
    ......... Use your own.
    Browser check for updates here.
    YOU need to defend against -all- vulnerabilities.
    Hacks only need to find -1- to get in...
    .

  6. #836
    Adviser Team AplusWebMaster's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    6,881

    Thumbs down Fake 'DHL', 'Toll', 'Invoices', 'Remittance', 'DoT' SPAM, 'Google', 'Outlook' PHISH

    FYI...

    Fake 'DHL' SPAM - PDF malware
    - http://myonlinesecurity.co.uk/dhl-ex...e-pdf-malware/
    16 Nov 2015 - "... An email with the subject of 'DHL Express – Credit Card Billing Adjustment. Ref# 3383095' pretending to come from eInvoicing <groupadminstubbinsDONOTREPLY@ tnt .com> with a zip attachment is another one from the current bot runs... The content of the email says :
    DHL Express Customer:
    The attached file details adjustments that have been made to shipping charges originally billed to your credit card. These adjustments are for charges or credits that have occurred after the initial processing of your shipment(s). These adjustments have been applied to your credit card and will appear on your next credit card statement.
    All shipments are subject to the terms and conditions contained in the DHL Express Tariff and the DHL Express Terms and Conditions of Service...


    16 November 2015: dhl16112015_6987878544212.zip: Extracts to: dhl16112015_6987878544212exe
    Current Virus total detections 2/54* . This is another one of the spoofed icon files that unless you have “show known file extensions enabled“, will look like a proper PDF file instead of the .exe file it really is, so making it much more likely for you to accidentally open it and be infected..."
    * https://www.virustotal.com/en/file/9...is/1447663550/
    ___

    Fake 'Toll' SPAM - xls malware
    - http://myonlinesecurity.co.uk/toll-i...sheet-malware/
    16 Nov 2015 - "An email with the subject of 'Toll IPEC invoice/statement (80458249)' pretending to come from ipecar@ tollgroup .com with a malicious Excel XLS spreadsheet attachment is another one from the current bot runs... The email looks like:
    Please find attached your current Toll IPEC invoice/statement..
    Should you have a query with your account, please contact the telephone number detailed on your invoice/statement or email your enquiry to ipecar@ tollgroup .com


    16 November 2015 : 80458249_1519.pxls - Current Virus total detections 3/55*
    ... Downloads Dridex banking malware from http ://gospi .eu/~gospi/45yfqfwg/6ugesgsg.exe (VirusTotal 1/55**)... the xls spreadsheet has been accidentally renamed to pxls, so windows doesn’t know what to do with it. Some versions then were PXLS and some proper XLS... Other download locations include www .kolumbus .fi/~kf0963/45yfqfwg/6ugesgsg.exe and piotrektest .cba .pl/45yfqfwg/6ugesgsg.exe ... DO NOT follow the advice they give to enable macros or enable editing to see the content. Most of these malicious word documents appear to be blank or look something like these images when opened in protected view mode, which should be the default in Office 2010, 2013 and 365:
    > http://myonlinesecurity.co.uk/wp-con...1-1024x412.png
    ... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
    * https://www.virustotal.com/en/file/c...is/1447675709/

    ** https://www.virustotal.com/en/file/4...is/1447675703/
    TCP connections
    182.93.220.146: https://www.virustotal.com/en/ip-add...6/information/
    191.234.4.50: https://www.virustotal.com/en/ip-add...0/information/
    ___

    Fake 'Invoices' SPAM - doc malware
    - http://myonlinesecurity.co.uk/accoun...d-doc-malware/
    16 Nov 2015 - "An email with the subject of '2 Invoices Attached' pretending to come from random names, companies and email addresses with a malicious word doc attachment is another one from the current bot runs... The email looks like:
    Good morning,
    Please see the attached invoices and remit payment according to the terms listed at the bottom of the invoice. If you have any questions please let us know.
    Thank you!
    Loris Lecomte
    Accounting Specialist| Metropolitan, An RR Donnelley Company


    16 November 2015 : invoices_59830277.doc - Current Virus total detections 2/55*
    ... Downloads Dridex banking malware from http ://185.80.53.15 /bermuda/triangle.php and other locations (VirusTotal 2/54**)... DO NOT follow the advice they give to enable macros or enable editing to see the content. Most of these malicious word documents appear to be blank or look something like these images when opened in protected view mode, which should be the default in Office 2010, 2013 and 365:
    > http://myonlinesecurity.co.uk/wp-con...1-1024x412.png
    ... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
    * https://www.virustotal.com/en/file/f...is/1447685993/

    ** https://www.virustotal.com/en/file/2...is/1447692609/
    TCP connections
    85.214.152.31: https://www.virustotal.com/en/ip-add...1/information/
    88.221.14.130: https://www.virustotal.com/en/ip-add...0/information/

    185.80.53.15: https://www.virustotal.com/en/ip-add...5/information/
    ___

    Fake 'Remittance' SPAM - doc malware
    - http://myonlinesecurity.co.uk/cook-m...d-doc-malware/
    16 Nov 2015 - "An email with the subject of 'COOK Remittance Advice-ACH' pretending to come from random companies, names and email addresses with a malicious word doc or attachment is another one from the current bot runs... The email looks like:
    Please find attached your Remittance Details for the funds that will be deposited to your bank account, PLEASE ALLOW 1-2 BUSINESS DAYS.
    Cook Medical is now sending through the bank the addenda information including your remit information.
    If you are not seeing your addenda information in your bank reporting you may have to contact your local bank representative.
    Accounts Payable


    16 November 2015: invoice_details_59282006.doc - Current Virus total detections 3/54*
    ... Downloads the same Dridex banking malware from the same locations as described in this earlier post**..."
    * https://www.virustotal.com/en/file/b...is/1447694373/

    ** http://myonlinesecurity.co.uk/accoun...d-doc-malware/
    ___

    Fake 'DoT' SPAM - xls malware
    - http://myonlinesecurity.co.uk/dot-pa...sheet-malware/
    16 Nov 2015 - "An email with the subject of 'DoT Payment Receipt' pretending to come from donotreply@ transport .gov .uk with a malicious Excel XLS spreadsheet attachment is another one from the current bot runs... The email looks like:
    [Automated message. Do not reply]
    Thank you for your payment. It is important that you print this receipt and record the receipt number as proof of your payment. You may be asked to provide your receipt details should you have an enquiry regarding this payment.
    DISCLAIMER
    This email and any attachments are confidential and may contain legally privileged
    and/or copyright material. You should not read, copy, use or disclose any of the
    information contained in this email without authorisation. If you have received it in
    error please contact us at once by return email and then delete both emails. There is
    no warranty that this email is error or virus free.


    16 November 2015: PaymentReceipt.xls - Current Virus total detections 3/53*
    ... Same downloader that downloads the same Dridex banking malware from different locations as described in today’s other malspam run** ..."
    * https://www.virustotal.com/en/file/a...is/1447676687/

    ** http://myonlinesecurity.co.uk/toll-i...sheet-malware/

    - http://blog.dynamoo.com/2015/11/malw...t-receipt.html
    16 Nov 2015 - "... This binary has a detection rate of 3/53* and that VirusTotal report and this Malwr report** indicates malicious traffic to:
    182.93.220.146 (Ministry Of Education, Thailand)
    78.47.66.169 (Hetzner, Germany)
    89.108.71.148 (Agava, Ltd)
    221.132.35.56 (Post And Telecom Company, Vietnam)
    The payload is the Dridex banking trojan...
    Recommended blocklist:
    cba.pl
    182.93.220.146
    78.47.66.169
    89.108.71.148
    221.132.35.56
    "
    * https://www.virustotal.com/en/file/e...is/1447681458/

    ** https://malwr.com/analysis/NDU0ZGQxZ...liYTllNzFlMDc/
    ___

    Google ID: Profile Inaccurate – Phish...
    - http://myonlinesecurity.co.uk/google...rate-phishing/
    15 Nov 2015 - "An email saying 'Google ID: Profile Inaccurate' pretending to come from Google Support [secure@ googleaccountaudit .com] is a phishing attempt. One of the major common subjects in this sort of phishing attempt is 'Your password will expire soon' or 'update your email' or 'your profile is inaccurate' or 'needs updating' or something very similar. This one wants your Google Account log in details, name, credit/debit card, birthdate, address, telephone etc. In fact just about everything that will identify you & take over your accounts and identity... The original email looks like:
    From: Google Support [mailto: secure@ googleaccountaudit .com]
    Sent: 15 November 2015 13:30 To: [REDACTED]
    Subject: Google ID: Profile Inaccurate
    [redacted] Account Notice
    Please confirm your Google Account [redacted]
    We have attempted to get in touch with you on three previous occasions with reference to the European Commissions eID service Regulation (EU) N°910/2014 that requires us ‘Google Inc’ to check the authenticity of Google users in Europe. Because your Google account [redacted] has now passed the deadline it’s at risk of termination within 48 hours unless you review your details... We apologize for any inconivnece this may cause but unless this is addressed your Google account [redacted] will be suspended pending deletion from all Google services.
    Confirm Google Account
    Forgot your password? Reset it now
    Sincerely, Google Support Team
    © 2015 Google Inc. 3488 Amphitheatre Drive, Mountain View, CA 41845 You [redacted] have received this mandatory email service announcement to update you about important changes to your Google product or account .


    ... [DO NOT] follow the link, you see a webpage looking like:
    > http://myonlinesecurity.co.uk/wp-con...1-1024x550.png
    ... If you do fill in the details you get sent on to the next page:
    > http://myonlinesecurity.co.uk/wp-con...2-1024x561.png
    All of these emails use Social engineering tricks to persuade you to follow the links or open the attachments that come with the email... make sure you have “show known file extensions enabled“..."
    ___

    MS 'Outlook Web Access' – Phish ...
    15 Oct 2015 - "... a lot of phishing attempts against Microsoft Outlook Web Access (Microsoft Outlook Web App (formerly known as Outlook on the Web or Outlook Web Access) is a browser-based email client. Outlook Web App lets you access your Microsoft Exchange Server mailbox from almost any web browser.) These sort of phishing attempts are much harder to protect against, because the OWA web address will -not- be a Microsoft website or any common site name but is normally a subdomain or part of your own company web domain. To make it harder, many companies do have numerous different email domains, so email messages might come from any of the company domains. To make it even more plausible, many companies have policies that insist on a user updating and changing their passwords every 30 or 60 or 90 days... One of the major common subjects in this sort of phishing attempt is Your password will expire soon or update your email or something very similar. This one wants only wants your email log in details...

    Screenshot: http://myonlinesecurity.co.uk/wp-con...l-1024x420.png

    ... The from address is -spoofed- to read from Administrator <s.moran@ whitgift .co.uk> whereas a very high proportion of them will be spoofed to appear to come from Administrator @ your own email domain. If you are unwise enough to follow the link you see a webpage looking like:
    > http://myonlinesecurity.co.uk/wp-con...n-1024x514.png
    ... If you do fill in the details you get sent on to the next page saying :
    Your information was successfully submitted, please ensure that you entered your email details correctly; to enable us complete your security updates. If you have entered your details wrongly kindly click back and refill in details correctly.
    N.B Please be informed that filling in the wrong details will be resulting to the deactivation of your email address.

    > http://myonlinesecurity.co.uk/wp-con...2-1024x355.png
    All of these emails use Social engineering tricks to persuade you to open the attachments that come with the email... Or whether it is a straight forward attempt, like this one, to steal your personal, bank, credit card or email and social networking log in details..."

    Last edited by AplusWebMaster; 2015-11-16 at 20:17.
    The machine has no brain.
    ......... Use your own.
    Browser check for updates here.
    YOU need to defend against -all- vulnerabilities.
    Hacks only need to find -1- to get in...
    .

  7. #837
    Adviser Team AplusWebMaster's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    6,881

    Exclamation Britain to build cyber attack forces, Casino Malvertising Campaign, Blackhole EK

    FYI...

    Britain to build cyber attack forces to tackle IS, hackers
    - http://www.reuters.com/article/2015/...0T604K20151117
    Nov 17, 2015 - "British spies are building elite cyber offensive forces to strike at Islamic State fighters, hackers and hostile powers, finance minister George Osborne said on Tuesday after warning militants wanted to launch deadly digital attacks. Islamic State was trying to develop the capability to attack British infrastructure such as hospitals, power networks and air traffic control systems with potentially lethal consequences, Osborne said. In response, Britain will bolster spending on cyber defenses, simplify its state cyber structures and build its own offensive cyber capability to attack adversaries... Britain's new cyber attack forces will be run jointly between GCHQ and the Defence Ministry and will target individual hackers, criminal gangs, militant groups and hostile powers, using a "full spectrum" of actions, Osborne said..."
    ___

    Casino Malvertising Campaign
    - https://blog.malwarebytes.org/malver...sing-campaign/
    Nov 17, 2015 - "We identified one of the largest malvertising campaigns in recent months going through -10- different ad domains receiving massive volumes of Internet traffic. Although we only recently uncovered and reported this campaign, telemetry data indicates that it actually started on October 21, making this at least a three-week operation. This malvertising attack preyed on visitors to sketchy websites offering anything from torrents of copyrighted movies, live streams of the latest flicks, or pirated software. The malicious ads would automatically (no click required) redirect users to a casino website used as decoy to silently load malicious iframes from disposable domains which ultimately lead to the Angler exploit kit. In one case, the casino website was a direct gateway to Angler EK. The ad networks were almost all registered via Domains By Proxy LLC, meaning -no- information was available about the registrant but they were all through GoDaddy and on the same ASN: AS15169. This made us believe that they were actually all related to one another. Moreover, one of them, AdCash, did have a point of contact and this is how we were able to report the incidents. A look at some of the stats behind those ad domains shows some staggering numbers. According to SimilarWeb a service that estimates website traffic and provides various analytics, these ad networks generated over 2 -billion- visits in October. To be clear, this is -not- how many people were exposed to malvertising since this only affected a few particular rogue campaigns, and not all campaigns running on these networks... before September, the traffic on those three domains was quasi nonexistent but all of the sudden spiked through the roof for a combined total of over 1 million visits:
    > https://blog.malwarebytes.org/wp-con...similarweb.png
    ... a very large number of people were exposed to malware because of this campaign. Over the three-week course, several different payloads were dropped by Angler EK. We found the infamous CryptoWall ransomware as well as the Bunitu Trojan... We contacted AdCash on November 10th and the following day the malvertising attacks appeared to have stopped. However, on November 14th we observed -another- incident again also using one of the casino websites but with a .space domain now to redirect to Angler EK... We will continue to monitor and report future incidents we encounter via this ad network and take necessary actions to protect our users from malware.
    Highlights:
    • Torrent, crack, video sites targeted
    • Malvertising via AdCash and related networks (> 2 billion traffic)
    • Casino websites used a decoy/redirectors ( > 1 million traffic)
    • Angler exploit kit
    • Over 30 different malware payloads
    • Three-week campaign ..."
    > https://blog.malwarebytes.org/wp-con...asino_Flow.png
    ___

    Blackhole EK resurfaces...
    - https://blog.malwarebytes.org/exploi...-live-attacks/
    Nov 17, 2015 - "... a threat actor is using the defunct Blackhole exploit kit in active drive-by download campaigns via -compromised- websites. We noticed Java and PDF exploits collected by our honeypot which we haven’t seen in ages. Looking closer at the structure of this attack, we were surprised when we realized this was the infamous Blackhole. Blackhole’s author, Paunch, was arrested in October 2013 and while criminals kept using the kit for the next few months, the exploits slowly deprecated and lost value because of lack of development. The new drive-by download attacks we caught over the weekend rely on the same structure as the original Blackhole, even reusing the old PDF and Java exploits. The only difference is the malware payload being dropped, which is current and had very -low- detection on VirusTotal... Although the exploits are old, there are probably still vulnerable computers out there who could get compromised. We also noticed that the author behind this Blackhole edition was working on new landing pages, so it is possible there might be additional changes in the future... Indicators of compromise: Server IP: 88.208.0.217 ..."

    Last edited by AplusWebMaster; 2015-11-17 at 22:20.
    The machine has no brain.
    ......... Use your own.
    Browser check for updates here.
    YOU need to defend against -all- vulnerabilities.
    Hacks only need to find -1- to get in...
    .

  8. #838
    Adviser Team AplusWebMaster's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    6,881

    Thumbs down Fake 'Statement', 'Invoices', 'Receipt', 'InTuIT' SPAM, EK threat jumps

    FYI...

    Fake 'Statement' SPAM - xls malware
    - http://myonlinesecurity.co.uk/paul-b...sheet-malware/
    18 Nov 2015 - "An email with the subject of 'Copy Statement' pretending to come from Barnett, Paul <Paul.Barnett@ bausch .com> with a malicious Excel XLS spreadsheet attachment is another one from the current bot runs...

    Screenshot: http://myonlinesecurity.co.uk/wp-con...t-1024x509.png

    18 November 2015 : Statement client 0091293(1).xls - Current Virus total detections 4/54*
    ... Downloads Dridex banking malware from one of these locations http ://www.samsoncontrols .co.uk/h64gf3/89j6cx.exe -or-
    http ://iraqiairways .co.uk/h64gf3/89j6cx.exe (VirusTotal 2/39**)
    ... DO NOT follow the advice they give to enable macros or enable editing to see the content. Most of these malicious word documents appear to be blank or look something like these images when opened in protected view mode, which should be the default in Office 2010, 2013 and 365:
    > http://myonlinesecurity.co.uk/wp-con...1-1024x412.png
    ... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
    * https://www.virustotal.com/en/file/e...is/1447836428/

    ** https://www.virustotal.com/en/file/6...is/1447837417/
    TCP connections
    182.93.220.146: https://www.virustotal.com/en/ip-add...6/information/
    191.234.4.50: https://www.virustotal.com/en/ip-add...0/information/
    ___

    Fake 'Invoices' SPAM – PDF malware
    - http://myonlinesecurity.co.uk/cic-in...e-pdf-malware/
    18 Nov 2015 - "An email about CIC Group Invoices with the subject of 'Invoices' pretending to come from CIC Group <admin@ cic .fr> with a zip attachment is another one from the current bot runs... The content of the email says:
    ... Please review the attached invoices and pay them at your earliest convenience. Feel free to contact us if you have any questions.
    Thank you.


    18 November 2015: facture_37854634_181115.zip: Extracts to: facture_37854634_181115.exe
    Current Virus total detections 3/54*
    This is another one of the spoofed icon files that unless you have “show known file extensions enabled“, will look like a proper PDF file instead of the .exe file it really is, so making it much more likely for you to accidentally open it and be infected..."
    * https://www.virustotal.com/en/file/2...is/1447850791/
    ___

    Fake 'invoice' SPAM - doc malware
    - http://myonlinesecurity.co.uk/invoic...d-doc-malware/
    18 Nov 2015 - "An email with random subjects that are 2 or 3 letters and then the word invoice or payment, like 'ZV Payment' or 'MU Invoice' or 'SBN Payment' pretending to come from random names, companies and email addresses with a random named malicious word doc attachment is another one from the current bot runs... The email looks like:
    Processing Number: M19Q0R5VG842B
    A new Status: Error
    Total Amount: 20741.84 Great Britain Pounds
    Please click the document attached with this email to see more info.

    -Or-
    Payment: L6174S1E
    Status: Authorised
    Transaction Total: 23018.32 GBP
    Please click the document attached with this email to get more information.

    -Or-
    Transaction: S1970110
    A new State: Voided
    Total Amount: 35079.44 Great Britain Pounds
    Please check the file attached with this email to have more info.


    18 November 2015: VTJ0W7M7VX5.doc - Current Virus total detections 4/55*
    MALWR analysis** shows a connection to http ://classic-eng .com/ge.jpg?7538 and a download AhkD7UHKJjGS08990.exe (VirusTotal 4/55**). Full analysis of this download is pending but is very likely to be Dridex banking malware... DO NOT follow the advice they give to enable macros or enable editing to see the content. Most of these malicious word documents appear to be blank or look something like these images when opened in protected view mode, which should be the default in Office 2010, 2013 and 365:
    > http://myonlinesecurity.co.uk/wp-con...1-1024x412.png
    ... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
    * https://www.virustotal.com/en/file/e...is/1447830052/

    ** https://malwr.com/analysis/OTY2Y2QwM...QxMmU1NWUzMjQ/

    *** https://www.virustotal.com/en/file/9...is/1447831128/
    TCP connections
    78.129.133.249: https://www.virustotal.com/en/ip-add...9/information/
    191.234.4.50: https://www.virustotal.com/en/ip-add...0/information/
    ___

    Fake 'Receipt' SPAM - xls malware
    - http://myonlinesecurity.co.uk/here-i...sheet-malware/
    18 Nov 2015 - "An email saying 'Here is your credit card receipt attached' with the subject of 'Receipt' pretending to come from Mike <mike@xencourier .co .uk> with a malicious Excel XLS spreadsheet attachment is another one from the current bot runs... The email looks like:
    Hi
    Here is your credit card receipt attached. VAT invoice to follw in due course.
    Best regards
    Mike
    This email is free from viruses and malware ...


    18 November 2015: scan0001.xls - Current Virus total detections 6/55*
    MALWR analysis** shows me that this is the -same- malware dropper attempting to download an updated version of the Dridex banking malware as described in today’s earlier malspam run***
    http ://www .samsoncontrols .co .uk/h64gf3/89j6cx.exe (the company has removed the malware and hopefully cleaned and fixed the vulnerabilities that allowed them to be used as a conduit for malware distribution). Warning: there were other locations mentioned earlier that might still be live. The http ://iraqiairways .co.uk/h64gf3/89j6cx.exe is still -live- and giving an updated version (virustotal[4])... DO NOT follow the advice they give to enable macros or enable editing to see the content. Most of these malicious word documents appear to be blank or look something like these images when opened in protected view mode, which should be the default in Office 2010, 2013 and 365:
    > http://myonlinesecurity.co.uk/wp-con...1-1024x412.png
    ... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
    * https://www.virustotal.com/en/file/2...is/1447851533/

    ** https://malwr.com/analysis/N2JiNDk1Z...cwZjE3Zjg4MTM/

    *** http://myonlinesecurity.co.uk/paul-b...sheet-malware/

    4] https://www.virustotal.com/en/file/5...is/1447851743/
    TCP connections
    203.172.180.195: https://www.virustotal.com/en/ip-add...5/information/
    8.253.82.62: https://www.virustotal.com/en/ip-add...2/information/

    - http://blog.dynamoo.com/2015/11/malw...eipt-mike.html
    18 Nov 2015 - "... it has a malicious attachment scan0001.xls which appears to come in at least -three- different versions... These contain a malicious macro... they attempt to download a malicious binary from the following locations:
    www .eurocontainers .it/h64gf3/89j6cx.exe
    www .asnp .it/h64gf3/89j6cx.exe
    www .samsoncontrols .co.uk/h64gf3/89j6cx.exe [file not found]
    This binary has a detection rate of 7/54* and that VirusTotal report and this Malwr report** both indicate malicious network traffic to:
    203.172.180.195 (Ministry Of Education, Thailand)..."
    * https://www.virustotal.com/en/file/5...is/1447858997/
    TCP connections
    203.172.180.195: https://www.virustotal.com/en/ip-add...5/information/
    8.253.82.62: https://www.virustotal.com/en/ip-add...2/information/

    ** https://malwr.com/analysis/MTU2YTZiM...NlOTYyMzljZDY/
    ___

    Fake 'InTuIT' SPAM - malware
    - http://myonlinesecurity.co.uk/quickb...ation-malware/
    Nov 18, 2015 - "An email saying you need to update your InTuIT QuickBooks with the subject of 'INTUIT Important Notification' pretending to come from INTUIT QB <qbsupport@ services .intuit .com> with a zip attachment is another one from the current bot runs... Other subjects in this malspam series include:
    • INTUIT QB
    • INTUIT Please Notify!
    • INTUIT QB
    • INTUIT QuickBooks
    • INTUIT QB Security Warning
    • INTUIT Attention
    • Intuit QuickBooks Online: Browser Update
    • Intuit QuickBooks Online: Supported Browsers
    • INTUIT Supported Browsers Update
    • INTUIT Security Warning
    Other alleged senders include:
    • INTUIT QB <services@ quickbooks .intuit .com>
    • quickbooks <qbsecuritycenter@ intuit .com>
    • INTUIT QB <services@ quickbooks .intuit .com>
    • QuickBooks Online <security@ services .qb .intuit .com> ...

    Screenshot: http://myonlinesecurity.co.uk/wp-con...n-1024x662.png

    18 November 2015: INTUIT-Browser-up1247.zip: Extracts to: up1247.exe
    Current Virus total detections 2/55*
    This is another one of the spoofed icon files that unless you have “show known file extensions enabled“, will look like an icon of an excel file instead of the .exe file it really is, so making it much more likely for you to accidentally open it and be infected..."
    * https://www.virustotal.com/en/file/4...is/1447857402/
    TCP connections
    89.163.249.75: https://www.virustotal.com/en/ip-add...5/information/
    188.247.102.215: https://www.virustotal.com/en/ip-add...5/information/
    UDP communications
    8.8.8.8: https://www.virustotal.com/en/ip-add...8/information/

    - http://blog.dynamoo.com/2015/11/myst...-leads-to.html
    18 Nov 2015 - "... Screenshot:
    > https://1.bp.blogspot.com/-jqzrc2_aW...400/intuit.png
    The -link- in the email goes to:
    kompuser .com/system/logs/update/doc.php?r=download&id=INTUIT-Browser-up1247.zip
    This downloads a file INTUIT-Browser-up1247.zip which in turn contains a malicious executable up1247.exe ... which has a VirusTotal detection rate of 2/54*. That VirusTotal report and this Hybrid Analysis report** show that the malware POSTs data to:
    onbrk .in/p7yqpgzemv/index.php
    The payload is unknown... the same nameservers and have also been used for malicious activity going back to August... Recommended blocklist:
    31.210.116.68
    188.247.102.215
    89.163.249.75
    95.173.164.212
    kompuser .com
    onbrk .in
    ..."
    (More at the dynamoo URL above.)
    * https://www.virustotal.com/en/file/4...is/1447863072/
    TCP connections
    89.163.249.75: https://www.virustotal.com/en/ip-add...5/information/
    188.247.102.215: https://www.virustotal.com/en/ip-add...5/information/
    UDP communications
    8.8.8.8: https://www.virustotal.com/en/ip-add...8/information/

    ** https://www.hybrid-analysis.com/samp...nvironmentId=1

    - https://security.intuit.com/alert.php?a=271
    11/18/15
    - https://security.intuit.com/alert.php?a=270
    11/18/15
    ___

    Infoblox - DNS Threat report
    - http://net-security.org/malware_news.php?id=3155
    18.11.2015 - "The creation of DNS infrastructure by cybercriminals to unleash exploit kits increased 75 percent in the third quarter of 2015 from the same period in 2014, according to Infoblox:
    > http://www.net-security.org/images/a...lox-112015.jpg
    ... Highly skilled attackers can create exploit kits, which are packages for delivering a malware payload, and then sell or rent these toolkits to those with little technical experience - vastly increasing the ranks of malicious attackers capable of going after individuals, businesses, schools, and government agencies. -Four- exploit kits - Angler, Magnitude, Neutrino, and Nuclear - accounted for -96- percent of total activity in the category for the third quarter. Most exploit kit attacks are distributed through spam emails or compromised web sites, or are embedded in online ads. When users click a link in the emails or ads, the exploit kit takes advantage of vulnerabilities in popular software to deliver a malware payload that can perform actions such as planting ransomware, capturing passwords for bank accounts, or stealing an organization’s data. Cybercriminals need the DNS to register domains for building the “drive-by” locations where exploit kits lie in wait for users, and for communicating with command-and-control servers that send instructions to infected devices and extract information..."

    > https://www.infoblox.com/dns-threat-index
    Video: 2:49

    Last edited by AplusWebMaster; 2015-11-19 at 15:39.
    The machine has no brain.
    ......... Use your own.
    Browser check for updates here.
    YOU need to defend against -all- vulnerabilities.
    Hacks only need to find -1- to get in...
    .

  9. #839
    Adviser Team AplusWebMaster's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    6,881

    Thumbs down Fake 'Shipping notification', 'Google invoice', 'VAT Receipt' SPAM, EK's tactics

    FYI...

    Fake 'Shipping notification' SPAM - malicious attachment
    - http://blog.dynamoo.com/2015/11/malw...ification.html
    19 Nov 2015 - "This rather terse spam does -not- come from Ceva Logistics but is instead a simple -forgery- with a malicious attachment.
    From: noreply@ cevalogistics .com
    Date: 19 November 2015 at 10:27
    Subject: [Shipping notification] N3043597 (PB UK)


    There is -no- body text and the "N" number is randomly generated. All samples I have seen contain a file called shipping-notification.xls which is in the same in all cases, containing this malicious macro... it has a VirusTotal detection rate of 2/54*. The comments on that VirusTotal report plus this Hybrid Analysis report** indicate a malicious binary is downloaded from:
    iwcleaner .co.uk/8i65h4g53/o97i76u54.exe
    This has an MD5 of e0d24cac5fb16c737f5f016e54292388 and a detection rate of 2/54*** and this Hybrid Analysis report[4] shows malicious traffic to the following IP (which I recommend you block):
    182.93.220.146 (Ministry of Education, Thailand)
    The payload is almost definitely the Dridex banking trojan."
    * https://www.virustotal.com/en/file/f...is/1447929870/

    ** https://www.hybrid-analysis.com/samp...nvironmentId=1

    *** https://www.virustotal.com/en/file/4...is/1447930055/
    TCP connections
    182.93.220.146: https://www.virustotal.com/en/ip-add...6/information/
    191.234.4.50: https://www.virustotal.com/en/ip-add...0/information/

    4] https://www.hybrid-analysis.com/samp...nvironmentId=2
    ___

    Fake 'Google invoice' SPAM - malicious attachment
    - http://blog.dynamoo.com/2015/11/malw...nvoice-is.html
    19 Nov 2015 - "This -fake- invoice does not come from Google, but is instead a simple -forgery- with a malicious attachment:
    From: billing-noreply@ google .com
    Date: 19 November 2015 at 12:40
    Subject: Your Google invoice is ready
    Attached to this email, please find the following invoice:
    Invoice number: 1630884720
    Due date: 19-Nov-2015
    Billing ID: 34979743806
    Please follow instructions on the invoice for remitting payment. If you have questions, please contact collections-uk@ google .com.
    Yours Sincerely,
    The Google Billing Team
    Billing ID: 0349-7974-3806


    The attachment is named 1630884720.doc which comes in at least two versions (VirusTotal analysis [1] [2]) and which contains a malicious macro... Analysis of the documents is still pending (please check back), although the payload is almost definitely the Dridex banking trojan."
    1] https://www.virustotal.com/en/file/b...is/1447936837/

    2] https://www.virustotal.com/en/file/0...is/1447937222/

    - http://myonlinesecurity.co.uk/your-g...d-doc-malware/
    19 Nov 2015
    "19 November 2015: 1630884720.doc - Current Virus total detections 3/54*
    ... Downloads Dridex banking malware from bhoomiconsultants .com/8i65h4g53/o97i76u54.exe (VirusTotal 1/54**)..."
    * https://www.virustotal.com/en/file/b...is/1447942173/

    ** https://www.virustotal.com/en/file/5...is/1447944295/
    TCP connections
    182.93.220.146: https://www.virustotal.com/en/ip-add...6/information/
    8.254.218.142: https://www.virustotal.com/en/ip-add...2/information/
    ___

    Fake 'Invoice and VAT Receipt' SPAM - xls malware
    - http://myonlinesecurity.co.uk/invoic...sheet-malware/
    19 Nov 2015 - "An email with the subject of 'Invoice and VAT Receipt EDMUN11118_181859 [Account:EDMUN11118]' pretending to come from support@ postcodeanywhere .com with a malicious Excel XLS spreadsheet attachment is another one from the current bot runs...

    Screenshot: http://myonlinesecurity.co.uk/wp-con...8-1024x559.png

    19 November 2015: EDMUN11118_181859.xls - Current Virus total detections 5/54*
    ... tries to download Dridex banking malware from http ://lapelsbadges .com/8i65h4g53/o97i76u54.exe which at the present time is not resolving for me. Usually there are several download locations all delivering the same dridex malware... DO NOT follow the advice they give to enable macros or enable editing to see the content. Most of these malicious word documents appear to be blank or look something like these images when opened in protected view mode, which should be the default in Office 2010, 2013 and 365:
    > http://myonlinesecurity.co.uk/wp-con...1-1024x412.png
    ... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
    * https://www.virustotal.com/en/file/3...is/1447943292/

    - http://blog.dynamoo.com/2015/11/malw...t-receipt.html
    19 Nov 2015 - "... The attachment is EDMUN11118_181859.xls... download(s) a file... has a VirusTotal detection rate of 1/54* and that VirusTotal report indicates it phoning home to:
    182.93.220.146 (Ministry Of Education, Thailand)
    I strongly recommend that you -block- that IP address. The payload is the Dridex banking trojan..."
    * https://www.virustotal.com/en/file/5...is/1447949778/
    TCP connections
    182.93.220.146: https://www.virustotal.com/en/ip-add...6/information/
    8.254.218.142: https://www.virustotal.com/en/ip-add...2/information/
    ___

    Exploit kits... change tactics
    - https://isc.sans.edu/diary.html?storyid=20391
    Last Updated: 2015-11-19 - "... computers directed to an EK? It often happens through compromised websites. Threat actors compromise legitimate websites, and pages from these compromised servers have injected script that connects the user's computer to an EK server. This happens behind the scenes, and the user is unaware... Threat actors often use another server as a gate between the compromised website and the EK server. I often call it a "redirect" because it redirects traffic from a compromised website to the EK... The gate is most often another compromised website. Less often, the gate is a dedicated server established by the threat actor. At times, threat actors have used Pastebin or a URL shortner like goo.gl as the gate. In some cases, you might find a second or -third- gate before you get to the EK... All of this is transparent to the unsuspecting user. Fortunately, many security professionals study EK traffic. Specific trends are quickly identified, security professionals share the data, and automated detection is usually available within a day or two. Threat actors know this. Criminals occasionally change tactics in how they direct traffic from compromised websites to their EK servers. For example, earlier this week I noticed a change by an actor using Rig EK. On Monday 2015-11-16, this threat actor was using a distinct gate path. By Wednesday 2015-11-18, the gate patterns had distinctly changed... On Monday 2015-11-16, this actor was using a two gates between the compromised website and Rig EK...
    > https://isc.sans.edu/diaryimages/ima...y-image-01.jpg
    On Wednesday 2015-11-18, the same actor had switched to a single gate. These single gates appeared to be hosted on -other- compromised websites...
    > https://isc.sans.edu/diaryimages/ima...y-image-02.jpg
    ... The first group of Rig EK intercept came from Monday 2015-11-16. The second group came from Wednesday 2015-11-18. Although I could not identify this actor, the traffic represents the -same- criminal group. I'm basing my assessment on the malware payload. Each payload exhibited the -same- behavior on both occasions... I saw Rig EK and the same post-infection traffic after viewing -more- compromised websites on Wednesday 2015-11-18. You'll find the compromised legitimate website, followed by a single gate. Rig EK was on 46.40.46.146 using the domains ftg .askgreatquestions .com, ghf .askmoregetmore .com -or- erf .closelikeapro .com. Post-infection traffic was seen on 62.76.42.21 using the domain alohajotracks .com, just like we saw before on Monday... I've seen a wide variety of paths from compromised websites to an EK server, so this isn't a comprehensive review on the topic. This is just one example. Don't get me started on -malvertizing- which is a much more complicated chain of events..."
    (More detail at the isc URL at the top.)

    46.40.46.146: https://www.virustotal.com/en/ip-add...6/information/

    62.76.42.21: https://www.virustotal.com/en/ip-add...1/information/

    Last edited by AplusWebMaster; 2015-11-19 at 18:24.
    The machine has no brain.
    ......... Use your own.
    Browser check for updates here.
    YOU need to defend against -all- vulnerabilities.
    Hacks only need to find -1- to get in...
    .

  10. #840
    Adviser Team AplusWebMaster's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    6,881

    Thumbs down Fake 'transfer', 'Reprint Document' SPAM

    FYI...

    Fake 'transfer' SPAM - malicious attachment
    - http://blog.dynamoo.com/2015/11/malw...re-kibung.html
    20 Nov 2015 - "This spam looks like an advanced free fraud, but instead it comes with a malicious attachment. The email appears to originate from within the victim's own domain, but this is a simple -forgery- and does -not- mean that you have been hacked.
    From: Jean Pierre Kibungu [jpie.kibungu@ victimdomain]
    Date: 20 November 2015 at 09:56
    Subject: 0150363108788101_02416060_1.xls
    Please find attached the swift of the transfer of $30000.
    Kind regards
    Jean Pierre Kibungu
    INCAT
    JEAN PIERRE KIBUNGU AVAR-DA-VISI
    GENERAL MANAGER
    INCAT OILFIELD LOGISTICS (DRC) LTD
    Site:
    Mob: + 243 998 01 95 01
    Headoffice:
    Tel. +44(0) 1534 758859
    Fax: +44(0) 1534 758834


    The telephone number does match that of a genuine company in Jersey, but they are -not- sending this spam. The attachment is named 0150363108788101_02416060_1.xls and so far I have seen just one version of this with a VirusTotal detection rate of 4/53*. It contains this malicious macro...
    UPDATE: Sources tell me there are at least two variants with download locations of:
    betterimpressions .com/~impressions/65y3fd23d/87i4g3d2d2.exe
    192.186.227.64 /~irma1026/65y3fd23d/87i4g3d2d2.exe
    This has an MD5 of d410a45dc4710ea0d383dee81fbbcb6f and a VirusTotal detection rate of 4/52**. According to that VirusTotal report and this Malwr report***, it makes a network connection to:
    157.252.245.32 (Trinity College, US)
    I strongly recommend that you -block- traffic to that IP."
    * https://www.virustotal.com/en/file/5...is/1448014325/

    ** https://www.virustotal.com/en/file/7...is/1448014994/
    TCP connections
    157.252.245.32: https://www.virustotal.com/en/ip-add...2/information/
    88.221.14.145: https://www.virustotal.com/en/ip-add...5/information/

    *** https://malwr.com/analysis/Y2FhM2MzZ...Q2ODJjZDY2MGM/

    - http://myonlinesecurity.co.uk/jean-p...sheet-malware/
    20 Nov 2015 - "... The email looks like:
    Please find attached the swift of the transfer of $30000.
    Kind regards
    Jean Pierre Kibungu ...


    20 November 2015 : 0150363108788101_02416060_1.xls - Current Virus total detections 4/53*
    ... Analysis of this is pending but is almost certain to be a Dridex banking malware downloader... DO NOT follow the advice they give to enable macros or enable editing to see the content. Most of these malicious word documents appear to be blank or look something like these images when opened in protected view mode, which should be the default in Office 2010, 2013 and 365:
    > http://myonlinesecurity.co.uk/wp-con...1-1024x412.png
    ... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
    * https://www.virustotal.com/en/file/e...is/1448011659/
    ___

    Fake 'Reprint Document' SPAM - doc malware
    - http://myonlinesecurity.co.uk/reprin...d-doc-malware/
    20 Nov 2015 - "A concurrent malspam run involving malicious word docs is an email with the subject of 'Reprint Document archive' pretending to come from tracey.beedles@ eurocarparts .com with a malicious word doc attachment is another one from the current bot runs... The email simply says:
    Attached is a Print Manager form.
    Format = Word Document Format File (DOC)


    20 November 2015 : pmB3A6.doc - Current Virus total detections 4/53*
    This also downloads the same Dridex malware from a -different- location irisbordados .com/65y3fd23d/87i4g3d2d2.exe than I saw in the other malspam run**... DO NOT follow the advice they give to enable macros or enable editing to see the content. Most of these malicious word documents appear to be blank or look something like these images when opened in protected view mode, which should be the default in Office 2010, 2013 and 365:
    > http://myonlinesecurity.co.uk/wp-con...1-1024x412.png
    ... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
    * https://www.virustotal.com/en/file/8...is/1448020152/

    ** http://myonlinesecurity.co.uk/jean-p...sheet-malware/

    - http://blog.dynamoo.com/2015/11/malw...t-archive.html
    20 Nov 2015 - "... if you look at the Hybrid Analysis report* and others, the executable masquerades as mbar.exe / Malwarebytes Anti-Rootkit. The payload is most likely to be the Dridex banking trojan.
    Screenshot: https://4.bp.blogspot.com/-VtkH94G_s.../fake-mbar.png
    ... Recommended blocklist:
    157.252.245.32
    89.32.145.12
    "
    * https://www.hybrid-analysis.com/samp...nvironmentId=1

    Last edited by AplusWebMaster; 2015-11-20 at 16:00.
    The machine has no brain.
    ......... Use your own.
    Browser check for updates here.
    YOU need to defend against -all- vulnerabilities.
    Hacks only need to find -1- to get in...
    .

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •