SPAM frauds, fakes, and other MALWARE deliveries...

Fake Apple email Phish Scam-SPAM ...

FYI...

Fake Apple Account 'Update to New SSL Servers' Phishing Scam/SPAM
- http://www.hoax-slayer.com/apple-new-ssl-servers-phishing-scam.shtml
Jan 21, 2014 - "Email purporting to be from Apple claims that the user's online access has been blocked because customers are required to update their information in order to use new ssl servers... The email is not from Apple. It is a phishing scam designed to trick recipients into giving their Apple account details and other personal and financial information to Internet criminals.
> http://www.hoax-slayer.com/images/apple-ssl-servers-scam-1.jpg
... According to an email that -appears- to come from Apple, the recipient's Apple account has been blocked until account information is updated. The email claims that Apple is implementing new SSL servers to increase customer protection and therefore all customers need to update their details or risk suspension of their accounts. The email includes a link to the "account update process". However, the message is -not- from Apple and the claim that users must update their details is a lie. Instead, the email is a phishing scam designed to steal Apple ID's and a large amount of other personal and financial information. Those who fall for the trick and click the update link in the email will be taken to a fake Apple login page as shown in the following screenshot:
> http://www.hoax-slayer.com/images/apple-ssl-servers-scam-3.jpg
... be wary of any message purporting to be from Apple that claims there is an issue with your account that needs to be rectified or you are required to perform an account update..."

... as in: DELETE.
___

Data-stealing malware targets Mac users in "undelivered courier item" attack
- http://nakedsecurity.sophos.com/201...mac-users-in-undelivered-courier-item-attack/
Jan 21, 2014 - "... you receive an email that claims to be a courier company that is having trouble delivering your article. In the email is a link to, or an attachment containing, what purports to be a tracking note for the item. You are invited to review the relevant document and respond so that delivery can be completed. We've seen a wide variety of courier brands "borrowed" for this purpose, including DHL, the UK's Royal Mail and even, in one bewildering case, a made-up courier company called TNS24, with its very own website... Here's what the emails looked like in this attack, with some details changed or redacted for safety:
> http://sophosnews.files.wordpress.com/2014/01/osx-fed-email-500.png?w=500&h=446
If you are a native speaker of English, you will notice that the wording of the email is clumsy and unidiomatic, and if you were to receive a message like this you might well be suspicious on those grounds alone... The link, of course, doesn't really lead to fedex .com .ch, but instead takes you to a domain name that is controlled by the attackers... If you are using a desktop browser that isn't Safari, you receive a ZIP file containing a Windows program detected by Sophos Anti-Virus as Mal/VBCheMan-C, a vague relative of the Zbot or Zeus malware. But if you are using Safari, you receive Mac malware, delivered as an Application bundle packaged inside a ZIP file. By default, on OS X 10.9.1 (the latest update to Mavericks, Apple's most recent operating system version), Safari directly downloads the file, showing you an -empty- Safari window with the icon of the downloaded file in the Dock at the bottom of the screen:
> http://sophosnews.files.wordpress.com/2014/01/osx-fed-pdf-appears-500.png?w=500&h=376
Clicking on the download button shows you what -looks- like a PDF file... There is no PDF file, as a visit to the Terminal windows quickly reveals. Safari has automatically unzipped the download, producing an Application bundle (actually just a subdirectory tree with a special structure) that has deliberately been given a PDF icon... the temptation is to click on what looks like a PDF file to see what it contains. OS X does try to advise you that you aren't opening a document, although you can argue that the warning would be more compelling if it explicitly said that you were about to "run a software program", rather than merely to "open" the file... prevention is better than cure. And that "undelivered courier item" almost certainly doesn't exist."
___

Something evil on 5.254.96.240 and 185.5.55.75
- http://blog.dynamoo.com/2014/01/something-evil-on-525496240-and-18555575.html
21 Jan 2014 - "This malware attack appears to be aimed at German speakers, and is presumably spreading through spam although I don't have a sample of the email message. What I -do- have is a nasty EXE-in-ZIP payload that masquerades as a bill or other communication from Deutsche Telekom, Vodafone, Fiducia or Volksbank. URLquery shows one such download in this example*, the victim has been directed to [donotclick]gf-58 .ru/telekom_deutschland which in turn downloads a ZIP file Rechnungsruckstande_9698169830015295.zip which in turn contains a malicious executable Mitteilung, Rechnungsruckstande 9901169820005294 Telekom Deutschland GmbH vom Januar 2014.exe which has a VirusTotal detection rate of 7/48**.
> https://lh3.ggpht.com/-icNtor0_pdM/Ut6DaRXAgGI/AAAAAAAACb4/XqfuRAlLjFU/s1600/telekom.png
The malware is downloaded from a server at 5.254.96.240 (Voxility, Romania). Sample URLs on this server according to URLquery*** and VirusTotal****... The Anubis report and ThreatExpert report show that the malware calls home to dshfyyst .ru on 185.5.55.75 (UAB "Interneto vizija", Lithunia). There are some other suspect sites on the same server which may be worth blocking (see below). All these sites are .ru domains registered to the infamous "Private Person" so there are no clues as to their ownership.
Recommended blocklist:
5.254.96.240
gf-58 .ru
uiuim .ru
okkurp .ru
gdevseesti .ru
goodwebtut .ru
mnogovsegotut .ru
185.5.55.75
gossldirect .ru
dshfyyst .ru
..."

* http://urlquery.net/report.php?id=8907792

** https://www.virustotal.com/en-gb/fi...fe0e69364ce53e90dadbfabc/analysis/1390310958/

*** http://urlquery.net/search.php?q=5.254.96.240&type=string&start=2014-01-06&end=2014-01-21&max=50

**** https://www.virustotal.com/en-gb/ip-address/5.254.96.240/information/

Update: this appears to be Cridex aka Feodo: http://www.abuse.ch/?p=6713

:mad: :fear:
 
Last edited:
Fake PayPal Scams ...

FYI...

Fake PayPal Scams ...
- http://www.hoax-slayer.com/look-out-for-paypal-scam-warning-message.shtml
Jan 22, 2014 - "Message that circulates via social media and online forums warns users to watch out for an email from PayPal... PayPal is almost continually targeted by phishing scammers using a wide variety of phishing techniques... This warning message has been circulating via various social media channels as well as online forums and blogs since around May 2013. The message warns users to look out for an email from PayPal that claims that £35.50 has been taken from the recipient's PayPal account and used to pay a Skype bill... Since at least 2011 scammers have been using and reusing a phishing technique that comprises scam emails that supposedly notify recipients that a Skype TopUp payment has been made via their PayPal account. Links in the scam emails open -fake- PayPal sites that entice users to enter their PayPal login details, and - in some cases - other personal and financial information... it should also be noted that this particular phishing technique is just one among -dozens- of phishing attacks that continually target PayPal users... Because it conducts its business online and via email, PayPal is a primary target for phishing scammers. A quick rule of thumb. Genuine PayPal emails will always address you by your name, -not- via a generic greeting such as "Dear Customer". If you receive a suspected phishing scam email from PayPal you can submit it for analysis via the address listed on the PayPal website*."
* https://www.paypal.com/au/webapps/mpp/security/antiphishing-ppphishingreport
___

Sochi Olympics - Hoax threats
- http://www.reuters.com/article/2014/01/22/olympics-threat-idUSL5N0KW3RT20140122
Jan 22, 2014 - "At least five European countries' Olympic committees and the United States received letters in Russian on Wednesday making a "terrorist threat" before the Sochi Games, but Olympic chiefs said they posed no danger. Despite the assurances, the letters to committees in Italy, Hungary, Germany, Slovenia and Slovakia briefly caused alarm and underlined nervousness about security at the $50 billion event... The U.S. Olympic Committee later confirmed that it also received a letter by email. Suicide bombers killed at least 34 people in a city in southern Russia last month, Islamist militants have threatened to attack the Winter Games and security forces are hunting a woman suspected of planning a suicide bombing and of being in Sochi already..."
___

Facebook Survey Scams
- http://www.hoax-slayer.com/facebook-survey-scam-list.shtml
Jan 21, 2014 - Last:
- http://www.hoax-slayer.com/royal-caribbean-international-survey-scam.shtml
Jan 22, 2014
___

Fake NatWest Mortgage Spam
- http://threattrack.tumblr.com/post/74170286889/natwest-mortgage-spam
Jan 22, 2014 - "Subjects Seen:
Mortgage update - Completion date
Typical e-mail details:
NatWest Intermediary Solutions
Mortgage Ref number: 9080338
We are pleased to advise that we have received a mortgage completion request from the solicitor acting on the case for your customer named above. The acting solicitor has confirmed that the mortgage will complete on 22.01.2014.
For more details please check attached file.
Kind Regards
NatWest Mortgage Team


Malicious File Name and MD5:
Morg_9080338.zip (C02B5FA63331394B6ADFF54952646A16)
Morg_220114.exe (BE295E5E51F2354EF6396AFAB4225783)


Screenshot: https://31.media.tumblr.com/943447252d5a4ba04b541425281a7959/tumblr_inline_mzt3y3xdNK1r6pupn.png

Tagged: NatWest, Upatre
___

Threat Outbreak Alerts
- http://tools.cisco.com/security/center/threatOutbreak.x?i=77
Email Messages with Malicious Attachments - 2014 Jan 22
Fake Account Payment Notification Email Messages - 2014 Jan 22
Fake Application Confirmation Email Messages - 2014 Jan 22
Fake Transaction Details Notification Email Messages - 2014 Jan 22
Fake Electricity Bill Notification Email Messages - 2014 Jan 22
Fake Court Appearance Request Email Messages - 2014 Jan 22
Fake Product Order Notification Email Messages - 2014 Jan 22
Fake Travel Information Email Messages - 2014 Jan 22
Fake Product Order Email Messages - 2014 Jan 22
Fake UPS Payment Document Attachment Email Messages - 2014 Jan 22
Fake Photograph Sharing Email Messages - 2014 Jan 22
Fake Court Appearance Request Email Messages - 2014 Jan 22
Fake Account Payment Information Email Messages - 2014 Jan 22
Fake Failed Delivery Notification Email Messages - 2014 Jan 22
Fake Company Complaint Email Messages - 2014 Jan 22
Fake Fax Message Delivery Email Messages - 2014 Jan 22
Fake Fax Delivery Email Messages - 2014 Jan 22
Fake Payroll Invoice Email Messages - 2014 Jan 22
Malicious Personal Pictures Attachment Email Messages - 2014 Jan 22
Fake German Payment Form Attachment Email Messages - 2014 Jan 22
(More detail and links at the cisco URL above.)

:fear: :mad:
 
Last edited:
Fake "Legal Business Proposal" SPAM ...

FYI...

Fake "Legal Business Proposal" SPAM ...
- http://blog.dynamoo.com/2014/01/legal-business-proposal-spam-has.html
23 Jan 2014 - "This email looks like it should be an advanced fee fraud, but instead it comes with a malicious attachment. I love the fact that this is a Legal Business Proposal as opposed to an Illegal one.
Date: Thu, 23 Jan 2014 12:45:11 +0000 [07:45:11 EST]
From: Webster Bank [WebsterWeb-LinkNotifications@ WebsterBank .com]
Subject: Legal Business Proposal
Hello, I'm Norman Chan Tak-Lam, S.B.S., J.P, Chief Executive, Hong Kong Monetary Authority (HKMA).
I have a Business worth $47.1M USD for you to handle with me.
Detailed scheme of business can be seen in the attached file.


Attached is a file business-info.zip which in turn contains a malicious executable business-info.exe with a VirusTotal detection rate of 16/49*. Automated analysis tools... show attempted connections to dallasautoinsurance1 .com on 38.102.226.239 and wiwab .com on 38.102.226.82. Both those IPs are Cogent Communications ones that appear to be rented out to a small web hosting firm called HostTheName .com. For information only, that host has these other IPs in the same range:
38.102.226.82
38.102.226.5
38.102.226.7
38.102.226.10
38.102.226.12
38.102.226.14
38.102.226.17
38.102.226.19
38.102.226.21
"
* https://www.virustotal.com/en-gb/fi...b905adf431f7981a54b59be4/analysis/1390482190/

- https://www.virustotal.com/en/ip-address/38.102.226.82/information/
___

Mint.Com.Uk 'Minimum Credit Card Payment Due' Phish
- http://www.hoax-slayer.com/mint-credit-card-payment-due-phishing.shtml
Jan 23, 2014 - "Message, which pretends to be from UK based credit card provider Mint, claims that the recipient's minimum credit card payment is due and advises that the latest bill can be found in an attached file. The email is -not- from Mint. It is a -phishing- scam designed to trick recipients into divulging their account login details to cybercriminals... According to this message, which purports to be from UK credit card provider Mint, the recipient's minimum credit card payment is now due. The message instructs the recipient to open an attached file to view the latest Mint credit card bill. However, the email is not from Mint and the attachment does not contain a credit card bill. Instead, the email is a typical phishing scam designed to trick Mint customers into giving account login details to cybercriminals. Those taken in by the email will find that clicking the attachment loads a html file in their browser. The file contains a link supposedly leading to the credit card bill. However, clicking the link opens a fraudulent website that asks users to supply their account login details, ostensibly to access the "bill". However, users will never reach the supposed bill. They have instead sent their account login details to criminals who can then use it to hijack their accounts, steal information therein, and conduct further fraud..."
___

Gateway.gov.uk Spam
- http://threattrack.tumblr.com/post/74280913157/gateway-gov-uk-spam
Jan 23, 2014 - "Subjects Seen:
Your Online Submission for Reference 435/GB1678208 Could not process
Typical e-mail details:
The submission for reference 435/GB1678208 was successfully received and was not processed.
Check attached copy for more information.


Malicious File Name and MD5:
GB1678208.zip (1BD4797C93A4837777397CE9CB13FC8C)
GB001231401.exe (05FB8AD05E87E12F5E6E4DAE20168194)


Screenshot: https://31.media.tumblr.com/efe7c609820416483d66a4d348eababb/tumblr_inline_mzv11lghEd1r6pupn.png

Tagged: UK Government, Upatre

:fear: :mad:
 
Last edited:
Fake Customer Service malware Emails ...

FYI...

Fake 'Customer Service Center' malware Emails
- http://www.hoax-slayer.com/customer-service-center-malware-emails.shtml
Jan 24, 2014 - "Email claiming to be from the "Customer Service Center" informs recipients that an order has been received and invites them to click a link to find out more about the order.
Brief Analysis: The email is not from any legitimate customer service center. The email is designed to trick users into installing a malicious file on their computer. Clicking the link in the email downloads a .zip file that contains a malware .exe file...
Example:
Subject: Customer Service Center
Hello, Customer
We have got your order and we will process it for 3 days.
You can find specification of the order:
[Link to .zip file removed]
Best regards
Customer Service Center


... The message makes no effort to identify either the company that supposedly sent the message or the product that the recipient supposedly ordered. The message is fraudulent and was not sent by any legitimate customer service center. The goal of the criminals who sent the email is to trick the recipient into downloading and installing malware... Details in different incarnations of the malware emails may vary. Some may claim to be from the "Client Management Department" rather than the "Customer Service Center"..."
___

Fake Amazon Local Spam
- http://threattrack.tumblr.com/post/74407933494/amazon-local-spam
Jan 24, 2014 - "Subjects Seen:
Fwd: Your order report id 2531
Typical e-mail details:
Hi,
Thank you for your order. We ll let you know once your item(s) have dispatched.You can check the status of your order or make changes to it by visiting Your Orders on Amazon.com.
Order Details
Order DA6220062 Placed on December 11, 2013
Order details and invoice in attached file.


Malicious File Name and MD5:
report.creditcard2735.zip (333794D9592CE296A6FE15CDF58756EA)
report.9983.exe (3B81614E62963AC5336946B87F9487FE)


Screenshot: https://31.media.tumblr.com/747295f5d77e9ee97623058f2135eeec/tumblr_inline_mzx8bt1SLW1r6pupn.png

Tagged: Amazon Local, Androm

:fear: :mad:
 
Last edited:
Fake "MVL Company" job offer

FYI...

Fake "MVL Company" job offer
- http://blog.dynamoo.com/2014/01/mvl-company-fake-job-offer.html
25 Jan 2014 - "This job offer is a -fake- and in reality probably involves money laundering or handling stolen goods:
From: Downard Bergstrom [downardkrjbergstrom@ outlook .com]
Subject: Longmore
Date: Fri, 24 Jan 2014 18:52:49 +0000
Hello,
Today our Company, MVL Company, is in need of sales representatives in United Kingdom.
Our Company deals with designer goods and branded items. We've been providing our customers with exclusive products for more than five years, and we believe that the applicant for the position must have great communication skills, motivation, desire to earn money and will to go up the ladder. All charges related to this opening are covered by the Company. Your main duties include administrative support on orders and correspondence, controlling purchase orders and expense reports.
Part-time job salary constitutes 460GBP a week.
Full-time job is up to 750GBP per week .
Plus we have bonus system for the best workers!
To apply for the vacancy or to get more details about it, please email us directly back to this email.
Hope to hear from you soon!
Best regards,
Downard Bergstrom


The spam is somewhat unusual in that it addresses me by my surname, indicating that the email data might have been stolen from a data breach (Adobe perhaps). The email originates from a free Microsoft Outlook .com account and gives no clues as to its real origins. A look at Companies House Webcheck confirms that there is no company of this exact name, although there are several innocent companies with similar names.
Avoid."

:fear: :mad:
 
Fake Voice Message contains trojan in attachment

FYI...

Fake Voice Message contains trojan in attachment
- http://blog.mxlab.eu/2014/01/27/voi...xx-xxxx-contains-trojan-in-attached-zip-file/
Jan 27, 2014 - "... intercepted a new trojan distribution campaign by email with the subject Voice Message from Unknown (xxx-xxx-xxxx) – where x is replaced by a phone number. This email is sent from the spoofed address “Unity Messaging System <Unity_UNITY5@ xxx .xxx>”and has the following very short body (where x is replaced by phone number):
From: xxx-xxx-xxxx
The attached ZIP file has the name VoiceMail.zip and contains the 18 kB large file VoiceMail.exe. At the time of writing, 0 of the 50 AV engines did detect the trojan at Virus Total. Use the Virus Total* permalink and Malwr** permalink for more detailed information..."
* https://www.virustotal.com/en/file/...bf29ee6ae7a0144b79f7f9dba64df8a6fba/analysis/

** https://malwr.com/analysis/ZjU0NzBlZDFjNTZkNDQ5MmIyYjUyMzFjMGMxOTBkMmM/
___

Fake "Carnival Cruise Line Australia" job offer
- http://blog.dynamoo.com/2014/01/carnival-cruise-line-australia-fake-job.html
27 Jan 2014 - "This -fake- job offer does NOT come from Carnival Cruise lines:
From: Mrs Vivian Mrs Vivian carnjob80@ wp .pl
Date: 27 January 2014 09:59
Subject: JOB ID: AU/CCL/AMPM/359/14-00
Signed by: wp.pl
Carnival Cruise Line Australia
15 Mount Street North Sydney
NSW 2060, Australia
Tel (2) 8424 88000
http ://www .carnival .com .au/
http ://www .carnivalaustralia .com/
carnivalcareer@ globomail .com
JOB ID: AU/CCL/AMPM/359/14-00
What is your idea of a great career? Is it a job that allows you to travel to beautiful destinations on a spectacular floating resort, being part of a multi-cultural team with co-workers from more than 120 different nationalities? Or is it a job that allows you to earn great money while you learn, grow and fulfill your dreams and career ambitions?
It’s Carnival Cruise Line policy not to discriminate against any employee or applicant for employment because of RACE, COLOR, RELIGION, SEX, NATIONAL ORIGIN, AGE, DISABILITY, MARITAL OR VETERAN STATUS.
PLEASE NOTE THESE FOLLOWING:
Employment Type: Full-Time/Part-Time
Salary: USD $45,000/ USD $125,000 per annual
Preferred Language of Resume/Application: English
Type of work: Permanent / Temporary
Status: All Vacancies
Job Location: Australia
Contract Period: 6 Months, 1 Year, 2 Years and 3 Years
Visa Type: Three Years working permit
The management will secure a visa/working permit for any qualified applicant. VISA FEE, ACCOMMODATION & FLIGHT TICKET will be paid by the company
We have more than 320 different positions available, interested applicants should forward their RESUME/CV or application letter to Mrs Vivian Oshea via email on (carnivalcareer@ globomail .com) so we can forward the list of positions available and our employment application form
Email: carnivalcareer@ globomail .com
Note: Applicants from AMERICA, EUROPE, ASIAN, CARIBBEAN and AFRICA can apply for these vacancies.
Regards
Management
Carnival Cruise Line Australia
carnivalcareer@ globomail .com


Despite the appearance of Carnival's actual web sites in the email, the reply address is NOT a genuine Carnival address and is instead a free email account. The email actually originates from 212.77.101.7 in Poland. The basic idea behind this scam is to offer a job and then charge the applicant for some sort of processing fees or police check or come up with some other reason why the applicant needs to pay money. Once the money has been taken (and perhaps even the victim's passport or other personal documents stolen) then the job offer will evaporate. More information on this type of scam can be found here* and here**."
* http://www.cruiseshipjobs.com/cruise-ship-job-scams.htm

** http://www.hoax-slayer.com/disney-cruise-line-job-offer-scam.shtml
___

Fake "Your FED TAX payment" SPAM
- http://blog.dynamoo.com/2014/01/your-fed-tax-payment-spam.html
27 Jan 2014 - "This -fake- "Tax payment" spam comes with a malicious attachment:
Date: Mon, 27 Jan 2014 14:24:42 +0100 [08:24:42 EST]
From: "TaxPro_PTIN@ irs .gov" [TaxPro_PTIN@ irs .gov]
Subject: Your FED TAX payment ( ID : 34KIRS821217111 ) was Rejected
*** PLEASE DO NOT RESPOND TO THIS EMAIL ***
Your federal Tax payment (ID: 34KIRS821217111), recently sent from your checking account was returned by the your financial institution.
For more information, please download notification, using your security PIN 55178.
Transaction Number: 34KIRS821217111
Payment Amount: $ 9712.00
Transaction status: Rejected
ACH Trace Number: 768339074172506
Transaction Type: ACH Debit Payment-DDA
Internal Revenue Service, Metro Plex 1, 8401 Corporate Drive, Suite 300, Landover, MD 20785.


Screenshot: https://lh3.ggpht.com/-UNIXkf1KrEo/UuZ_8WP-v1I/AAAAAAAACc8/ObemHBUxulA/s1600/irs.png

Attached is a file Tax payment.zip which in turn contains a malicious executable Tax payment.exe which has a VirusTotal detection rate of 11/50*. Automated analysis by Malwr is inconclusive, other analysis tools are currently down or under DDOS at the moment.
* https://www.virustotal.com/en-gb/fi...3c8372bc63137c3a14e8fe0b/analysis/1390837447/
___

TNT Courier Service Spam
- http://threattrack.tumblr.com/post/74723096757/tnt-courier-service-spam
Jan 27, 2014 - "Subjects Seen:
TNT UK Limited - Package tracking 525933498011
Typical e-mail details:
TNT COURIER SERVICE (TCS)
Customer/Delivery Services Department
Central Pk Est/Mosley Rd, Trafford Park
Manchester, M17 1TT UK.
DETAILS OF PACKAGE
Reg order no: 525933498011
Your package have been picked up and is ready for dispatch.
Connote # : 525933498011
Service Type : Export Non Documents - Intl
Shipped on : 25 Jan 13 00:00
Order No : 4134172
Status : Driver’s Return Description : Wrong Address
Service Options: You are required to select a service option below.
The options, together with their associated conditions


Malicious File Name and MD5:
Label_525933498011.zip (58985CC9AA284309262F4E59BC36E47A)
Label_27012014.exe (E0595C4F17056E5599B89F1F9CF52D83)


Screenshot: https://gs1.wac.edgecastcdn.net/801...df697f5d4/tumblr_inline_n02cy8Jn4u1r6pupn.png

Tagged: TNT Courier Service, Upatre
___

Fake "Skype Missed voice message" SPAM
- http://blog.dynamoo.com/2014/01/skype-missed-voice-message-spam.html
27 Jan 2014 - "This -fake- Skype email has a malicious attachment:
Date: Mon, 27 Jan 2014 19:37:11 +0300 [11:37:11 EST]
From: Administrator [docs1@ victimdomain .com]
Subject: Skype Missed voice message
Skype system:
You have received a voice mail message.
Date 01/27/2014
Message length is 00:01:18.


Attached to the email message is an archive file Skype-message.zip which in turn contains a malicious executable Voice_Mail_Message.exe which has a VirusTotal detection rate of 13/49*. Malwr reports** that the malware calls home to rockthecasbah .eu on 64.50.166.122 (LunarPages, US). This server has been compromised before and I recommend you -block- traffic to it."
* https://www.virustotal.com/en/file/...e91ae4460f3c97a36ae49836/analysis/1390858228/

** https://malwr.com/analysis/MzY1NTdiODY5M2MwNDcxZWEwMzdjZmYwMWM1NzIwMDg/

- http://threattrack.tumblr.com/post/74739263432/skype-missed-message-spam
Jan 27, 2014 - "Subjects Seen: Skype Missed voice message..."
Malicious File Name and MD5:
Skype-message.zip (79FB2E523FE515A6DAC229B236F796FF)
Voice_Mail_Message.exe (6E4857C995699C58D9E7B97BFF6E3EE6)


Tagged: Skype, Upatre

:fear::fear: :mad:
 
Last edited:
Fake Facebook 'Account Verification' Scam/SPAM

FYI...

Fake Facebook 'Account Verification' Scam/SPAM
- http://www.hoax-slayer.com/facebook-account-verification-2014-scam.shtml
Jan 28, 2014 - "Message purporting to be from the "Facebook Verification Team" claims that users must verify their profiles by March 15th 2014 to comply with the SOPA and PIPA Act. The message is a -scam- and -not- from any official Facebook Verification Team. Those who follow the link will be tricked into installing a rogue Facebook app and participating in -bogus- online surveys. Some variants may attempt to trick users into divulging their Facebook email address and password to criminals. Example:
Warning: Announcement from Facebook Verification Team:
All profiles must be verified before 15th March 2014 to
avoid scams under SOPA and PIPA Act.
Verify your Account by steps below
Invite your friends.

> http://www.hoax-slayer.com/images/facebook-account-verfication-2014-1.jpg
According to a message currently moving round Facebook, all users must verify their profiles by March 15th 2014 in order to comply with the SOPA and PIPA Act. The message, which comes in the form of a graphic, claims to be an announcement from the "Facebook Verification Team". Users are instructed to click an "Invite your Friends" button to begin the verification process... Users who fall for the ruse and click the button will first be asked to give a Facebook application permission to access their details. Once installed, this rogue app will spam out more fake messages in the name of the user. Victims will then be taken to another fake page where they are again told that that they must verify their account by clicking a further link. However, clicking the link takes them to various survey pages or tries to entice them to sign up for online games. Many of the surveys claim that users must provide their mobile phone number to enter in a prize draw. But, by giving out their number, users are actually signing up for very expensive SMS "subscriptions" charged at several dollars per message sent. Other surveys may ask victims to provide personal and contact information that will later be shared with third parties and used to inundate them with junk mail, emails, phone calls and text messages. The scammers responsible for the bogus "verification" messages will earn commissions via dodgy affiliate marketing systems each and every time a person participates in a survey or provides their personal information in an online "offer". Reports indicate that some versions of the scam may try to trick victims into divulging their account login details to criminals. The criminals can then -hijack- the compromised accounts and use them to distribute further scam messages..."
___

Fake RingCentral Fax msg SPAM
- http://blog.dynamoo.com/2014/01/this-fake-ringcentral-fax-spam-has.html
28 Jan 2014 - "This -fake- RingCentral fax spam has a malicious attachment:
Date: Tue, 28 Jan 2014 14:28:24 +0000 [09:28:24 EST]
From: Sheila Wise [client@ financesup .ru]
Subject: New Fax Message on 01/22/2013
You Have a New Fax Message
From: (691) 770-2954
Received: Wednesday, January 22, 2014 at 11:31 AM
Pages: 5
To view this message, please open the attachment
Thank you for using RingCentral.


Screenshot: https://lh3.ggpht.com/-96SG-7HQH2o/UufLIJSx1-I/AAAAAAAACdo/r6-QzTUmUtM/s1600/ringcentral.png

Attached is a file fax.zip which in turn contains a malicious exectable fax.doc.exe with an icon to make it look like a Word document. The VirusTotal detection rate for the document is 10/50*, and the Malwr analysis** shows an attempted callback to ren7oaks .co .uk on 91.238.164.2 (Enix Ltd, UK). The executable then downloads an apparently encrypted file..."
* https://www.virustotal.com/en-gb/fi...3b6a1b4a44dad0198580920f/analysis/1390921856/

** https://malwr.com/analysis/NTIxYTE4ZTFhZmU4NGExZWFhYjA5OWFhZmUyYzlmOTQ/
___

Fake flash update via .js injection and SkyDrive
- http://blog.dynamoo.com/2014/01/ongoing-fake-flash-update-via-js.html
28 Jan 2014 - "... ongoing injection attacks that were leading to Adscend Media LLC ads. Adscend say that the affiliate using their ad system was banned, although the ad code is -still- showing in the injection attacks themselves. F-Secure also covered the attacks* from a different aspect... this infection is -still- current..."
(More detail at the dynamoo URL above.)

* http://www.f-secure.com/weblog/archives/00002659.html

> http://www.f-secure.com/weblog/archives/5_flash1.PNG
___

Fake Flash Update aimed at Turkish users
- http://blog.trendmicro.com/trendlab...ke-adobe-flash-update-aimed-at-turkish-users/
Jan 27, 2014 - "... A recent attack that we found starts off with a video link sent to users via Facebook’s messaging system (sent in Turkish). This “video” prompts users to install a Flash Player update; it actually installs a browser extension that blocks access to various antivirus sites. It also sends a link to the “video” to the victim’s Facebook friends via the messaging system, restarting the cycle. This targeting appears to have worked: based on feedback from the Smart Protection Network, 93% of those who accessed pages related to this attack were from Turkey. The browser extension pushed to users was in the format used by Chromium-based browsers like Google Chrome. It would -not- work in other browsers, like Internet Explorer and Mozilla Firefox. It also stops the user from accessing the extension settings page, to prevent the user from removing or disabling the extension.
> http://blog.trendmicro.com/trendlabs-security-intelligence/files/2014/01/turkishflashplayer.jpg
... The fake update, detected as TROJ_BLOCKER.J, installs the extension (detected as JS_BLOCKER.J) that blocks the antivirus websites. JS_BLOCKER.J then downloads a malicious script which is used to send the Facebook messages with the link to the video. This script is detected as HTML_BLOCKER.K. In addition to Facebook messages, Twitter accounts “promoting” this page were also spotted:
> http://blog.trendmicro.com/trendlab...iles/2014/01/turkishtwitteraccountupdated.jpg
Turkey is one of the world’s most active Facebook-using countries, with 19 million daily active users and 33 million monthly active users... this attack’s behavior – blocking antivirus sites – ... would leave them vulnerable to future attacks..."
___

Malformed FileZilla - login stealer
- http://blog.avast.com/2014/01/27/malformed-filezilla-ftp-client-with-login-stealer/
Jan 27, 2014 - "Beware of malformed FileZilla FTP client versions 3.7.3 and 3.5.3. We have noticed an increased presence of these malware versions of famous open source FTP clients. The first suspicious signs are bogus download URLs. As you can see, the installer is mostly hosted on -hacked- websites with -fake- content (for example texts and user comments are represented by images.)
> https://blog.avast.com/wp-content/uploads/2014/01/web_01.jpg
Malware installer GUI is almost identical to the official version. The only slight difference is version of NullSoft installer where malware uses 2.46.3-Unicode and the official installer uses v2.45-Unicode. All other elements like texts, buttons, icons and images are the same. The installed malware FTP client looks like the official version and it is fully functional! You can’t find any suspicious behavior, entries in the system registry, communication or changes in application GUI.
The only differences that can be seen at first glance are smaller filesize of filezilla.exe (~6,8 MB), 2 dll libraries ibgcc_s_dw2-1.dll and libstdc++-6.dll (not included in the official version) and information in “About FileZilla” window indicates the use of older SQLite/GnuTLS versions. Any attempt to update the application fails, which is most likely a protection to prevent overwriting of malware binaries.
> https://blog.avast.com/wp-content/uploads/2014/01/about_windows.jpg
We found a hardcoded connection detail stealer after deeper analysis. Malware authors abuse open source code and add their own stealer function to the main code... The algorithm is part of a malformed FileZilla.exe binary, therefore sending stolen log in details which bypasses the firewall. The whole operation is very quick and quiet. Log in details are sent to attackers from the ongoing FTP connection only once. Malware doesn’t search bookmarks or send any other files or saved connections... Malware authors use very powerful and inconspicuous methods to steal FTP log in credentials in this case... We -strongly- recommend to download any software only from official, well-known or trusted sources. Avoid strange looking websites and portals offering software via their own downloaders or installers containing bundled adware and PUP applications..."

:fear: :mad:
 
Last edited:
Fake "Voice Message" SPAM again, Fake Flash Player installer, Fake Browser updates ..

FYI...

Fake "Voice Message" SPAM (again)
- http://blog.dynamoo.com/2014/01/voice-message-from-unknown-spam-again.html
29 Jan 2014 - "This -fake- voice message spam comes with a malicious attachment:
Date: Wed, 29 Jan 2014 14:45:36 +0100 [08:45:36 EST]
From: Administrator [docs0@ victimdomain .net]
Subject: Voice Message from Unknown (644-999-4348)
Unity Messaging System
- - -Original Message- - -
From: 644-999-4348
Sent: Wed, 29 Jan 2014 14:45:36 +0100
To: [redacted]
Subject: Important Message to All Employees


Attached is an archive Message.zip which in turn contains a malicious executable VoiceMessage.exe which has a VirusTotal detection rate of just 6/50*. Automated analysis tools... show attempted connections to kitchenrescue .com on 184.107.74.34 (iWeb, Canada) and ask-migration .com on 173.192.21.195 (Softlayer, US). In particular, it attempts to download some sort of -encrypted- file [donotclick]kitchenrescue .com/login.kitchenrescue.com/images/items/wav.enc which I have not been able to identify."
* https://www.virustotal.com/en/file/...bc22b0122d22ab69950b720c/analysis/1391006188/

- https://www.virustotal.com/en/ip-address/184.107.74.34/information/

- https://www.virustotal.com/en/ip-address/173.192.21.195/information/
___

Neutrino delivers Fake Flash malware hosted on SkyDrive
- http://blog.malwarebytes.org/online...livers-fake-flash-malware-hosted-on-skydrive/
Jan 29, 2014 - "As cloud computing becomes more popular, malware authors are also taking interest in using this technology to store their own files—except, of course, their files are usually bad. SkyDrive (recently renamed to OneDrive) is Microsoft’s cloud storage solution, and competes directly with other big-name storage products like Google Drive and Dropbox, all of which provide a convenient solution to accessing your files from virtually any location with internet access. Recently, I found a downloader collected from our honeypot that appears as a -fake- Flash Player installer. These type of programs usually deliver malware and are very successful at making people believe they’re installing or updating the real Flash Player. This particular downloader file currently is detected by 9/50 vendors on Virustotal* ... The downloader binary was a payload from the Neutrino Exploit Kit and delivered via a Java exploit... When the file runs, it beacons out to the SkyDrive URL and presents a dialog that states it’s installing Flash Player, and then says “Installation Finished!” if everything goes well.
> http://cdn.blog.malwarebytes.org/wp-content/uploads/2014/01/flash_install_finished.jpg
I visited the download server multiple times and managed to get different samples, each with their own icon (including a creepy skull). Meaning the samples stored on the SkyDrive folder are constantly being updated.
> http://cdn.blog.malwarebytes.org/wp-content/uploads/2014/01/flashplayer_samples.png
... To be fair to Microsoft, this isn’t the only instance where cloud storage was used for bad things. Last November, we reported on a malicious script that was hosted on Google Drive, and similar things have happened with Dropbox. Regardless, it appears more security measures need to be into place to prevent various malicious files and programs from being uploaded to cloud storage services."
* https://www.virustotal.com/en/file/...d435ba9b4b61857a7fd04909232c9135be8/analysis/
___

Fake Browser updates ...
- http://blog.malwarebytes.org/fraud-scam/2014/01/dont-fall-for-fake-browser-update-warnings/
Jan 28, 2014 - "... Any message asking end users to update browsers to ward off security issues can cause problems both at home and in the workplace. Neither “Relative who knows about computers” or the stressed IT guy from the fourth floor wants to waste time rolling back / uninstalling / deleting things from the target PC... I came across a fake browser update site doing the rounds located at
newbrowserversion(dot)org
which has pages for Chrome (C), Firefox (F) and IE (I) users... Here’s what you can expect to see on each of the three pages.
Chrome: http://cdn.blog.malwarebytes.org/wp-content/uploads/2014/01/browsupdate2.jpg
.
Firefox: http://cdn.blog.malwarebytes.org/wp-content/uploads/2014/01/browsupdate3.jpg
.
IE: http://cdn.blog.malwarebytes.org/wp-content/uploads/2014/01/browsupdate4.jpg
.
Regardless of page viewed, they all say the same thing... Should the end-user run the executable file (and all three have a different MD5) the install procedure kicks into gear. Sort of. We’re presented with the standard splash screen, and one would expect to see various offers, programs, maybe the odd toolbar... If you want to check the update status of your browser, rely on the browser itself rather than third-party websites offering up random downloads. More often than not, your browser will tell you about updates by clicking into “Help” and / or “About this browser” options in the various settings menus..."

68.233.240.26
- https://www.virustotal.com/en/ip-address/68.233.240.26/information/

:mad: :mad:
 
Last edited:
Fake Vodafone MMS SPAM, Twitter Follower Scam ...

FYI...

Fake Vodafone MMS SPAM - malicious attachment
- http://blog.dynamoo.com/2014/01/fake-vodafone-mms-spam-comes-with.html
30 Jan 2014 - "This -fake- Vodafone MMS spam comes with a nasty payload:
Date: Thu, 30 Jan 2014 03:55:04 -0500 [03:55:04 EST]
From: mms.service6885@ mms .Vodafone .co .uk
Subject: image Id 312109638-PicOS97F TYPE==MMS
Received from: 447219637920 | TYPE=MMS


Despite the Vodafone references in the header, this message comes from a random -infected- PC somewhere and not the Vodafone network. The email doesn't quite render properly in my sample:
> https://lh3.ggpht.com/-PSCY3ZpjEqc/Uuod0tnNmZI/AAAAAAAACeM/xFBm1YwPsAc/s1600/vodafone-mms.png
The spam is probably preying on the fact that most people have heard of MMS but very rarely use it. Attached is a file IMG0000008849902.zip which in turn contains a malicious executable IMG0000008849902.exe, this has a VirusTotal detection rate of just 2/50*. Automated analysis tools are inconclusive... as the sample appears to time out."
* https://www.virustotal.com/en-gb/fi...bb0fd1938591d4703a47809e/analysis/1391073258/
___

Twitter Follower Scam ...
- http://blog.trendmicro.com/trendlab...does-the-twitter-follower-scam-actually-work/
Jan 30 2014 - "... This -scam- tries to attract potential victims by using tweets with the phrase “GET MORE F0LL0WERS” and a URL that is apparently from Google. (In this particular case, Google is just used as a -redirector- to the scammer’s site.) It also uses Twitter’s Discover feature and trending topics to boost its visibility. It also uses tweets that mention random Twitter users.
Sample tweets promoting the site:
> http://blog.trendmicro.com/trendlabs-security-intelligence/files/2014/01/twitter1.jpg
When users click the link in the post, they will be redirected to a “get free followers” site. The site offers two options—a free and a premium service. The free option requires users to authorize a Twitter app named “LAAY PAAY” created by the scammers; this will grant them access to the user’s Twitter account. After the user is returned to the scam site from the app authorization process, the site will show a “processing” page. The user will gain random Twitter followers, including those with private accounts. The premium service boasts new followers per minute, no ads, and instant activation. This service costs five euros and can be paid via PayPal.
> http://blog.trendmicro.com/trendlabs-security-intelligence/files/2014/01/twitter2.jpg
What’s the catch? Yes, they get new followers, but these followers are other users who signed up for this service as well. By agreeing to the service, their accounts will also be used to follow other accounts as well. In addition, spam tweets will also be sent from the victim’s Twitter account. Even paying five euros will not stop these spam tweets. Note that to get more followers you have to log in repeatedly (otherwise you drop off the “list”), repeating the whole cycle... Gaining access to Twitter accounts and sending spam tweets is not the only goal of the scammers here. They also load various advertising-laden affiliate sites in the background, in order to gain pageviews and thus, revenue for the owners of the ads. We’ve seen -35- separate domains in this attack... Users are encouraged to -avoid- clicking links on social media posts unless the source can be verified. Users should also avoid giving access to their social media accounts unless the sites are established and well-known. Lastly, they should always remember that “free” services often aren’t. They may ask for something in exchange, be it information or access to accounts..."
___

s15443877[.]onlinehome-server[.]info ? ...
- http://blog.dynamoo.com/2014/01/wtf-is-s15443877onlinehome-serverinfo.html
30 Jan 2014 - "Something that caught my eye was this Google Safebrowsing diagnostic for [donotclick]s15443877.onlinehome-server .info * ... Not only are (exactly) one third of the pages crawled hosting -malware- but there are a staggering -198- domains spreading it. Usually it's just a handful of sites, but this is the most I've ever seen. VirusTotal also shows some historical evil** going on with the IP of 212.227.141.247 (1&1, Germany) and a Google of the site contents shows thousands of hits of what appears to be scraped content in Spanish. It's hard to say just what this site is, but with Google diagnostics like that then it is unlikely to be anything good and -blocking- s15443877.onlinehome-server .info or 212.227.141.247 might be prudent."
* http://www.google.com/safebrowsing/diagnostic?site=s15443877.onlinehome-server.info/
"... over the past 90 days, 582 page(s) resulted in malicious software being downloaded and installed without user consent. The last time Google visited this site was on 2014-01-29, and the last time suspicious content was found on this site was on 2014-01-29. Malicious software includes 166 scripting exploit(s), 166 trojan(s), 89 exploit(s). Successful infection resulted in an average of 5 new process(es) on the target machine. Malicious software is hosted on 198 domain(s)... 155 domain(s) appear to be functioning as intermediaries for distributing malware to visitors of this site..."

** https://www.virustotal.com/en-gb/ip-address/212.227.141.247/information/

AS8560 (ONEANDONE-AS)
- http://www.google.com/safebrowsing/diagnostic?site=AS:8560
___

Fake "Last Month Remit" SPAM
- http://blog.dynamoo.com/2014/01/last-month-remit-spam.html
30 Jan 2014 - "This -fake- "Last Month Remit" spam does a pretty good job of looking like it comes from your own organisation..
Date: Thu, 30 Jan 2014 12:22:05 +0000 [07:22:05 EST]
From: Administrator [victimdomain]
Subject: FW: Last Month Remit
File Validity: Thu, 30 Jan 2014 12:22:05 +0000
Company : http ://[victimdomain]
File Format: Office - Excel
Internal Name: Remit File
Legal Copyright: Microsoft Corporation. All rights reserved.
Original Filename: Last month remit file.xls ...


Going to to bother of inserting fake mail headers is odd, because anyone who knew enough to check the headers would probably also realise that the attached ZIP file with an EXE in it was probably bad news. In this case, the attachment is called Remit_[victimdomain].zip which in turn contains a malicious executable called Remit.exe which has an icon that makes it look like a PDF file.
> https://lh3.ggpht.com/-BiMee-Y7Kt4/UupYcxBdSgI/AAAAAAAACe0/qYuzePEaT1Y/s1600/remit2.png
This file has a VirusTotal detection rate of 10/49*. Automated analysis tools... show an attempted connection to poragdas .com on 182.18.143.140 (Pioneer Elabs, India) which is a server that has been seen before, and excelbizsolutions .com on 103.13.99.167 on (CtrlS Private, India).
Recommended blocklist:
103.13.99.167
182.18.143.140
poragdas .com
excelbizsolutions .com
"
* https://www.virustotal.com/en-gb/fi...b381accf76a0f1fa0c324542/analysis/1391089282/

:mad: :fear::fear:
 
Last edited:
Fake Fax2Email SPAM, Lloyds Banking phish ...

FYI...

Fake Fax2Email SPAM
- http://blog.dynamoo.com/2014/01/windsor-telecom-fax2email-spam.html
31 Jan 2014 - "... another -fake- Fax spam with a malicious payload:
Date: Fri, 31 Jan 2014 10:00:23 +0000 [05:00:23 EST]
From: Windsor Telecom Fax2Email [no-reply@ windsor-telecom .co .uk]
Subject: Fax Message on 08983092722 from FAX MESSAGE
You have received a fax on your fax number: 08983092722 from.
The fax is attached to this email.
PLEASE DO NOT REPLY BACK TO THIS MESSAGE.


Attached is an archive file FAX MESSAGE.ZIP which in turn contains a malicious executable FAX MESSAGE.EXE with a VirusTotal detection rate of 4/50*. Well, I say malicious but both Malwr and Anubis report that the payload does not execute properly, however that might just be an issue with those particular sandboxes and it does -not- mean that it will fail to run on all systems."
* https://www.virustotal.com/en-gb/fi...cd881610f323ea9018120822/analysis/1391163988/
___

Something evil on 192.95.10.208/28
- http://blog.dynamoo.com/2014/01/something-evil-on-192951020828.html
31 Jan 2014 - "192.95.10.208/28 (OVH, Canada) is being used to deliver -exploit- kits utlising .pw domains, for an example see this URLquery report*. The following domains are being used in these attacks (although there may be more):
(Long list at the dynamoo URL above.)
The IP forms part of a /28 block belonging to a known bad actor:
NetRange: 192.95.10.208 - 192.95.10.223
CIDR: 192.95.10.208/28
OriginAS: AS16276 ... **
Country: RU
RegDate: 2014-01-24
I believe that these IPs are connected with a black hat host -r5x .org- and IPs with these WHOIS details are very often used in exploit kit attacks. I would -strongly- recommend that you -block- 192.95.10.208/28 in addition to the domains listed above."
* http://urlquery.net/report.php?id=9140970

Diagnostic page for AS16276 (OVH)
** http://google.com/safebrowsing/diagnostic?site=AS:16276
"... over the past 90 days, 5074 site(s)... served content that resulted in malicious software being downloaded and installed without user consent. The last time Google tested a site on this network was on 2014-01-31, and the last time suspicious content was found was on 2014-01-31... we found 776 site(s) on this network... that appeared to function as intermediaries for the infection of 2156 other site(s)... We found 1092 site(s)... that infected 7551 other site(s)..."

- http://centralops.net/co/DomainDossier.aspx
canonical name r5x .org ...
addresses 176.124.111.130 ...
- https://www.virustotal.com/en-gb/ip-address/176.124.111.130/information/
___

Lloyds Banking Group 'Online Access Suspended' Phish
- http://www.hoax-slayer.com/lloyds-online-access-suspended-phishing-scam.shtml
Jan 31, 2014 - "Email that pretends to come from Lloyds Banking Group -claims- that the recipient's online account access has been suspended because login details are incorrectly entered several times... The email is -not- from Lloyds. It is a -phishing- scam designed to trick users into giving their account login details and other personal information to Internet criminals. Example:
> http://www.hoax-slayer.com/images/llyods-phishing-scam-2014.1.jpg
... According to this email, which purports to be from the UK's Lloyds Bank, the recipient's bank account has been suspended. Supposedly, account login details were entered several times, so the bank suspended access in order to protect the customer from online fraud attempts... the email itself is the online fraud attempt. The message is a typical phishing scam. Customers who are taken in by the false claims and click the link as instructed will be taken to a fake website where they will be asked to login to their Lloyds online account. After logging in on what they believe is the genuine Lloyds website, victims may then be asked to provide further personal data such as their credit card details and ID information. At the end of the sequence, victims may be automatically redirected to the genuine Lloyds website. Meanwhile, the criminals can hijack their bank accounts, transfer funds, conduct fraudulent transactions and perhaps even steal their identities..."
- http://www.lloydsbank.com/help-guidance/security/phishing.asp

:fear: :mad:
 
Last edited:
Fake Human Rights SCAM/SPAM ...

FYI...

Fake Human Rights SCAM/SPAM ...
- http://blog.dynamoo.com/2014/02/african-human-right-and-refugees.html
1 Feb 2014 - "This spam email is actually part of an advanced fee fraud setup:
From: fernando derossi fernandderossi59@ gmail .com
To: fernandderossi59@ gmail .com
Date: 1 February 2014 13:22
Subject: URGENT FOOD STUFF SUPPLY NEED FOR REFUGEES
Signed by: gmail .com
Dear Sir:
My company has been mandated to look for a company capable of
supplying food stuffs product listed bellow by the AFRICAN HUMAN
RIGHT AND REFUGEES PROTECTION COUNCIL (AHRRPC) for assisting of the
refugee within the war affected countries IN middle east and Africa
like MALI,SYRIA, SOMALIA, CENTRAL AFRICA, and SOUTH SUDAN, which after
going through your company's profile, have decided to know if your company is interested.
Below are the list of food Stuffs and the targeted value needed by (AHRRPC) ...
We will be happy to work with you company only as representing agent
to secure an allocation for your company while in return your company
will give us comission as soon as your receive your contract value. We
will give you more details about the contract when we recieve your reply.
Regards,
Mr.Fernando Derossi
AHRRPC AGENT ...


The email links to a website at www .ahrrpc .8k .com which set off all sorts of -alarms- on my virus scanner, but I think it is just an ad-laden free web hosting site, and purports to be from the African Human Right and Refugees Protection Council (AHRRPC)...
> https://lh3.ggpht.com/-rmNQq0bAL6I/Uu0I-IzIiOI/AAAAAAAACfQ/jt3zycfz6Oo/s1600/ahrrpc.png
Of course, there is no such organisation as this and probably the main thrust of the scam is that there will be an "arrangement fee" payable in order to sell these goods.. and once the fee is paid the scammers will disappear... Give any approaches from the so-called African Human Right and Refugees Protection Council (AHRRPC) a very wide berth. And remember, if you want to verify who a photo actually belongs to then Google Images is an excellent resource."
___

Fake SMS SPAM ...
- http://blog.dynamoo.com/2014/02/unsure-if-you-qualify-for-refund-of-ppi.html
1 Feb 2014 - "... scammers are still at it, pumping away lead generation spam to persuade people to make PPI claims to which they are -not- entitled.

Unsure if you qualify for a refund of PPI paid on a loan or credit card? Reply PPI and we will run a no obligation check or reply STOP to opt out.
TPPCO


In this case the scammers used the contact number +447743623103 but they burn through dozens of SIM cards every day with their illegal spamming operations. If you get one of these, you should forward the spam and the sender's number to your carrier... T-Mobile, O2 and Orange the number to report to is 7726 ("SPAM"). Vodafone customers should use 87726 ("VSPAM") and Three customers should use 37726 ("3SPAM"). Hopefully the carriers will act if there are enough complaints. You can also report persistent spam like this via the ICO's page on the subject*. With any luck these spammers will end up on the receiving end of a massive fine**."
* http://ico.org.uk/for_the_public/topic_specific_guides/marketing/texts

** http://blog.dynamoo.com/2012/11/gary-mcneish-christopher-niebel-fined.html

:fear::fear: :mad:
 
Last edited:
Something evil on 192.95.7.224/28 + 64.120.137.32/27 + 192.95.43.160/28 ...

FYI...

Something evil on 192.95.7.224/28
- http://blog.dynamoo.com/2014/02/something-evil-on-19295722428.html
3 Feb 2014 - "Another OVH Canada range hosting criminal activity, 192.95.7.224/28 is being used for several malicious .pw domains being used to distribute malware (as used in this attack*). The malware domains seem to rotate through subdomains very quickly, possibly in an attempt to block analysis of their payload. This block is carrying out the same malicious activity that I wrote about a few days ago**. OVH have suballocated this IP block to an entity that I believe is connected with black hat host r5x .org.
CustName: Private Customer
Address: Private Residence
City: Penziatki ...
Country: RU
RegDate: 2014-01-24 ...
These IPs are particularly active:
192.95.7.232
192.95.7.233
192.95.7.234

There is nothing of value in this /28 block and I recommend that you -block- the entire IP range plus the following domains (which are all already flagged as being malicious by Google)
Recommended blocklist:
192.95.7.224/28
archerbocce .pw
athleticsmove .pw
.."
(Long list of .pw domains at the dynamoo URL above.)
* http://urlquery.net/report.php?id=9205587

** http://blog.dynamoo.com/2014/01/something-evil-on-192951020828.html

- https://www.virustotal.com/en/ip-address/192.95.7.232/information/
___

Something evil on 64.120.137.32/27
- http://blog.dynamoo.com/2014/02/something-evil-on-641201373227.html
3 Feb 2014 - "64.120.137.32/27 is a range of IP addresses belonging to Network Operations Center Inc in the US and suballocated to a customer which is currently being used in malware attacks as an intermediate step in sending victims to this malicious OVH range*.You can see an example of some of the badness in action here**. The range was formerly used by a company called TixDepot but may have been hijacked or reassigned. NOC report the following contact details for the block:
network:ID:NET-64.120.137.32/27
network:Auth-Area:64.120.128.0/17
network:network:NET-64.120.137.32/27
network:block:64.120.137.32/27 ...
network:country: US ...
About -half- the domains in this /27 have been flagged as -malicious- by Google, concentrated on the three IP addresses:
64.120.137.53
64.120.137.55
64.120.137.56

I would recommend -blocking- the entire /27, but this is the breakdown by IP address with domains tagged by Google highlighted (there's a plain list here***)"
* http://blog.dynamoo.com/2014/02/something-evil-on-19295722428.html

** http://urlquery.net/report.php?id=9196650

*** http://pastebin.com/hHGvXkJa

- https://www.virustotal.com/en/ip-address/64.120.137.53/information/

- https://www.virustotal.com/en/ip-address/64.120.137.55/information/

- https://www.virustotal.com/en/ip-address/64.120.137.56/information/
___

Something evil on 192.95.43.160/28
- http://blog.dynamoo.com/2014/02/something-evil-on-192954316028.html
3 Feb 2014 - "More badness hosted by OVH Canada, this time 192.95.43.160/28 which contains pretty much the same set of evil described here*. Here is a typical IP flagged by VirusTotal** and a failed resolution by URLquery*** which frankly gives enough information to make it suspicious. However, the key thing is the registrant details which have been used in -many- malware attacks before****.
CustName: Private Customer
Address: Private Residence
Country: RU
RegDate: 2014-01-24...
I can see the following .pw domains active in this range:
basecoach .pw
crewcloud .pw
boomerangfair .pw
kickballmonsoon .pw
martialartsclub .pw
runningracer .pw

All those domains are flagged by Google as malicious and I recommend that you block them along with 192.95.43.160/28."
* http://blog.dynamoo.com/2014/02/something-evil-on-19295722428.html

** https://www.virustotal.com/en-gb/ip-address/192.95.43.160/information/

*** http://urlquery.net/report.php?id=9209750

**** http://blog.dynamoo.com/search?q=Penziatki
___

Fake inTuit/TurboTax/IRS Refund Notice
- http://security.intuit.com/alert.php?a=97
2/3/14 - "People are receiving -fake- emails with the title "IRS Refund Notice":
Screenshot: http://security.intuit.com/images/phish97_tt_refund.jpg
This is the end of the -fake- email.
Steps to Take Now:
Do -not- open the attachment in the email.
-Delete- the email..."
___

German email accounts hacked - Scams circulate ...
- http://blog.trendmicro.com/trendlab...ulate-after-german-email-accounts-get-hacked/
Feb 3, 2014 - "Recently, the German Federal Office for Information Security disclosed that the email accounts of up to 16 million users had been compromised. The computers of these users were infected with information-stealing malware which were used to steal these login credentials. The German government has set up a page where users can check if their email accounts have been compromised*. We recommend that users in Germany check their accounts, as we’re seeing a re-occurrence of certain -scams- which rely on compromised email accounts...
Protecting email accounts should be a top priority, considering the amount of sensitive information stored in them and the other accounts that can be controlled via password resets. Users should remember a few key safety tips:
• Always use different complex passwords or passphrases for different accounts. Password managers can help create and manage multiple online accounts.
• Opt for two-factor authentication when possible.
• Only log in using secure and trusted devices. Think twice before logging in from public devices such as Internet cafes.
• Users can also opt for encryption services for added protection."
* https://www.sicherheitstest.bsi.de/
___

ANZ 'Upgrade to New System' Phish ...
- http://www.hoax-slayer.com/anz-upgrade-new-system-phishing-scam.shtml
Feb 3, 2014 - "Email pretending to be from large Australian and New Zealand bank ANZ claims that customers must click a link to upgrade to a new system technology designed to give users maximum protection... The email is a phishing scam that tries to trick users into divulging their personal information to criminals. The "Log on" button opens a -bogus- website designed to steal the user's ANZ account login details...
> http://www.hoax-slayer.com/images/anz-upgrade-phishing-2014-1.jpg
According to this email, which purports to be from the ANZ bank, customers are required to upgrade to a new system by logging into their accounts. The message claims that the new system will offer maximum protection and invites users to click a "Log on" button. The email is formatted with ANZ's logo and colour scheme to make it appear more genuine... the message is -not- from ANZ and the claim that users must login due to a system upgrade is untrue. The email is a simple phishing scam designed to grab account login credentials from unsuspecting ANZ customers... If users enter their customer number and password on the fake page and click the "Log on" button, they will be automatically redirected to the genuine ANZ site. They may believe that they have successfully "upgraded" to the new system and may remain unaware that they have been scammed until the next time they try to login... ANZ has published information about phishing scams on its website*..."
* http://www.anz.com/auxiliary/securi...ct-yourself/identifying-fraud/internet-fraud/
___

Fake Evernote - Malware Email
- http://www.hoax-slayer.com/evernote-image-sent-malware-email.shtml
Feb 2, 2014 - "Email purporting to be from note taking application Evernote claims that an image has been sent and invites users to click a link to view the image... Evernote did not send the email and has no connection to it. The message is a criminal ruse designed to trick people into downloading and installing malware...
> http://www.hoax-slayer.com/images/evernote-image-malware-1.jpg
According to this email, which purports to be from popular note taking application Evernote, an image addressed to the recipient has been sent. The message includes a clickable "Go to Evernote" button. The name of the supposed image is also clickable. However, Evernote did not send the email. Nor did it send an image as claimed. Clicking the links in the message will not open an image stored in Evernote as suggested in the message. Both links lead to a compromised website that harbours -malware-..."

:mad: :mad:
 
Last edited:
GameOver Zeus modified, Email malware spikes ...

FYI...

GameOver Zeus now using Encryption to bypass detection
- http://threatpost.com/gameover-zeus-now-using-encryption-to-bypass-detection/104019
Feb 3, 2014 - "Cybercriminals have begun to tweak the way the GameOver Zeus Trojan is being delivered to users’ machines, making it easier for the banking malware to evade detection and steal victims’ credentials. To get the job done the malware has been working in tandem with the malware Upatre. For about a week now criminals have been changing the .exe files Upatre downloads to non-executable .enc files. According to a computer forensics expert, this is how the malware, which spreads via spam e-mails and malicious attachments, can avoid being spotted by firewalls, Web filters and other security defenses. Gary Warner, a director of research in computer forensics at the University of Alabama at Birmingham posted* about the trick and included a handful of spam email examples on his Cybercrime & Doing Time blog yesterday... Warner noticed the trend when a colleague, Brendan Griffin, a malware analyst at the firm Malcovery sent along a series of -spam- messages, some purporting to come from the Better Business Bureau, Skype and the IRS, among other agencies, spreading the malware..."
* http://garwarner.blogspot.com/2014/02/gameover-zeus-now-uses-encryption-to.html

- https://www.virustotal.com/en/file/...fb3273f9f9eb8aff1365955ba4d8d72fee8/analysis/
File name: vti-rescan
Detection ratio: 0/50
Analysis date: 2014-02-05

- https://slashdot.org/topic/datacenter/stop-botnets-by-knowing-a-zombie-from-a-user/
Feb 4, 2014 - "... The newest version of the GameOver Zeus variant slipped through -50- anti-virus filters at online anti-virus service VirusTotal by encrypting its malicious payload and changing the name to make it look inert, according to security researcher Gary Warner at Malcovery, who blogged about it Feb. 2. “Why? Well, because technically, it isn’t malware. It doesn’t actually execute!” Warner wrote*. “All Windows EXE files start with the bytes “MZ”. These files start with “ZZP”. They aren’t executable, so how could they be malware? Except they are.” Rather than launching its own malicious payload, the attachment downloads an encrypted file ending in .enc, then decrypts it, renames it and stores the new payload somewhere else on the infected machine – as an executable scheduled to launch sometime later. It was easier when botnets used IRC to control malware-infected zombies, but the state of the art is now to use TCP and HTTP, which helps botnets hide their tracks among gigabytes of legitimate HTTP traffic..."

- http://www.fortiguard.com/legacy/analysis/zeusanalysis.html
___

Email malware at 5-year high - Jan 2014
- http://blogs.appriver.com/Blog/bid/101194/January-in-Review
Feb 3, 2014 - "... a few metrics that we saw in January:
> http://blogs.appriver.com/Portals/53864/images/virus_traffic-resized-600.jpg
Though traffic was close to normal, the four day -spike- from the 7th-10th was enough to push this month’s total virus message count to the highest monthly total since Q3 of 2008. (269,108,311 virus-laden messages were quarantined in January 2014.) The traffic on Jan.7th-10th was roughly -40- times the daily average, which is typically about 2+million emails containing a virus attachment..."

:fear::fear: :mad:
 
Last edited:
Fake Barclays. Lloyds SPAM ...

FYI...

Fake Barclays transaction SPAM
- http://blog.dynamoo.com/2014/02/barclays-transaction-notification-spam.html
5 Feb 2014 - "This -fake- Barclays spam comes with a malicious payload:
Date: Wed, 5 Feb 2014 03:02:52 -0500 [03:02:52 EST]
From: Barclays Bank [support@ barclays .net]
Subject: Barclays transaction notification #002601
Transaction is completed. £9685 has been successfully transfered.
If the transaction was made by mistake please contact our customer service.
Receipt of payment is attached.
Barclays is a trading name of Barclays Bank PLC and its subsidiaries. Barclays Bank PLC is authorised by the Prudential Regulation Authority and regulated by the Financial Conduct Authority and the Prudential Regulation Authority (Financial Services Register No. 122702). Registered in England. Registered Number is 1026167 with registered office at 1 Churchill Place, London E14 5HP.


Attached is a file Payment receipt Barclays PA77392733.zip which is turn contains a malicious executable Payment receipt Barclays PA77392733.exe with a surprisingly poor VirusTotal detection rate of just 1/51* (only Sophos detects it). Automated analysis tools are pretty inconclusive about the payload... with only the Malwr report** having any real detail."
* https://www.virustotal.com/en-gb/fi...9137099fb532083d3fab652a/analysis/1391591290/

** https://malwr.com/analysis/OGIzYjYzNTQ1ZTJjNDRjYmJlZjZlMjdkMGRlOTc5ODI/
___

Hacked Within Minutes: Sochi Visitors Face Internet Minefield
- http://www.nbcnews.com/watch/nightl...visitors-face-internet-minefield-137647171983
Feb 4, 2014 - "... they should have “no expectation of privacy,” even in their hotel rooms."
___

Fake "LloydsLink reference" SPAM - malicious attachment
- http://blog.dynamoo.com/2014/02/lloydslink-reference-spam-comes-with.html
5 Feb 2014 - "This -fake- Lloyds TSB spam comes with a malicous payload:
Date: Wed, 5 Feb 2014 20:38:29 +0100 [14:38:29 EST]
From: GRP Lloydslink Tech [GRPLloydslinkTech@ LLOYDSBANKING .COM]
Subject: LloydsLink reference: 8255820 follow up email and actions to be taken
Lloyds TSB
Help
(New users may need to verify their email address)
If you do not see or cannot click / tap the Download attachment button:
Desktop Users:
You will be prompted to open (view) the file or save (download) it to your computer. For best results, save the file first, then open it.
Mobile Users:
Install the mobile application.
Protected by the Voltage SecureMail Cloud
SecureMail has a NEW LOOK to better support mobile devices!
Disclaimer: This email and any attachments are confidential and for the sole use of the recipients. If you have received this email in error please notify the sender.
Email Security Powered by Voltage IBE™
Copyright 2002-2014 Voltage Security, Inc. All rights reserved.
Lloyds Bank plc. Registered Office: 25 Gresham Street, London EC2V 7HN. Registered in England and Wales no. 2065. Telephone 0207626 1500
Bank of Scotland plc. Registered Office: The Mound, Edinburgh EH1 1YZ. Registered in Scotland no. SC327000. Telephone: 08457 21 31 41 ...


Screenshot: https://lh3.ggpht.com/-WflKBnC4NEw/UvJmkiBZelI/AAAAAAAACi8/Sy4OOq0bzG0/s1600/lloyds-tsb.png

The attachment is SecureMessage.zip which in turn contains a malicious executable SecureMessage.scr which has an icon that looks like Internet Explorer. Despire the .scr suffix, this file is a plain old .exe file and will execute if you double-click it (-don't!-). VirusTotal detections are 11/51*, and automated analysis... show an attempted download from [donotclick]asianfarm .org/images/pdf.enc and [donotclick]ideasempurna .com .my/wp-content/uploads/2014/02/pdf.enc with the following IPs being involved:
108.90.186.161 (AT&T, US)
111.90.133.246 (Piradius Net, Malaysia)
121.117.209.51 (NTT, Japan)
124.217.241.34 (Piradius Net, Malaysia)
174.103.25.199 (Time Warner Cable, US)
The .enc file is an encoded executable, explained in detail here**. I haven't tried to decode it but obviously that too will be malicious."
Recommended blocklist:
asianfarm .org
ideasempurna .com .my
108.90.186.161
111.90.133.246
121.117.209.51
124.217.241.34
174.103.25.199
"
* https://www.virustotal.com/en-gb/fi...bee1b3ff30a99503624c0af6/analysis/1391616188/

** http://blog.crysys.hu/2014/02/gameo...-to-bypass-perimeter-security-enc-encryption/
___

Malware uses ZWS compression for evasion tactic
- http://blog.trendmicro.com/trendlab...ware-uses-zws-compression-for-evasion-tactic/
Feb 5, 2013 - "... We have seen many instances wherein malware came equipped with improved evasion techniques, such as preventing execution of analysis tools, hiding from debuggers, blending in with normal network traffic, along with various JavaScript techniques. Security researchers have now come across malware that uses a legitimate compression technique to go unnoticed by security solutions. This malware, detected as TROJ_SHELLCOD.A, is an exploit that targets an Adobe Flash Player vulnerability (CVE-2013-5331). The malware is a document file with an embedded Flash file, which has been compressed using ZWS. Released in 2011, ZWS uses the Lempel-Ziv-Markove Algorithm (LZMA) to compress data with no data loss... Typically, malware is often downloaded and executed, which means a physical copy of the malware is dropped in the infected machine. This allows security solutions to detect the malware. However, this particular malware allots memory using VirtualAlloc and executes it, acting like a backdoor. Doing so makes it harder to trace the routines of the malware as there is no physically dropped file; instead the payload is copied directly into memory. This is the reason why this malware is able to evade most security solutions, even those that support ZWS compression. We urge users to regularly install security updates as soon as they are made available. These patches can mean the difference between protection and infection. For example, the vulnerability used in this attack was patched by Adobe in December 2013..."

:fear: :mad:
 
Last edited:
Fake HMRC, TNT SPAM, Fake AV ...

FYI...

Fake HMRC "VAT Return" SPAM
- http://blog.dynamoo.com/2014/02/fake-hmrc-vat-return-spam.html
6 Feb 2014 - "This -fake- HMRC spam comes with a malicious attachment:
Date: Thu, 6 Feb 2014 20:32:34 +0100 [14:32:34 EST]
From: "noreply@ hmrc .gov .uk" [noreply@ hmrc .gov .uk]
Subject: Successful Receipt of Online Submission for Reference 3608005
Thank you for sending your VAT Return online. The submission for reference 3608005 was
successfully received on Thu, 6 Feb 2014 20:32:34 +0100 and is being processed. Make VAT
Returns is just one of the many online services we offer that can save you time and
paperwork.
For the latest information on your VAT Return please open attached report.
The original of this email was scanned for viruses by the Government Secure Intranet
virus scanning service supplied by Cable&Wireless Worldwide in partnership with
MessageLabs. (CCTM Certificate Number 2009/09/0052.) On leaving the GSi this email was
certified virus free...


... this thing comes with a malicious payload. Attached to the message is an archive Reference.zip which in turn contains a malicious executable Reference.scr (a plain old executable, not a screensaver). This has a VirusTotal detection rate of 2/50*. Automated analysis tools... show an encrypted file** being downloaded from:
[donotclick]wahidexpress .com/scripts/ie.enc[donotclick]bsitacademy.com/img/events/ie.enc
Recommended blocklist:
182.18.188.191
wahidexpress .com
bsitacademy .com

* https://www.virustotal.com/en-gb/fi...b71a58a8a94b31cec017cbc9/analysis/1391686048/

** http://blog.crysys.hu/2014/02/gameo...-to-bypass-perimeter-security-enc-encryption/

Update: A -second- version of the email is circulating with the following body text:
The submission for reference 485/GB1392709 was successfully received and was not
processed.
Check attached copy for more information.
This is an automatically generated email. Please do not reply as the email address is not
monitored for received mail.

___

Fake "TNT UK Limited " SPAM - zero detections
- http://blog.dynamoo.com/2014/02/fake-tnt-uk-limited-spam-with-zero.html
6 Feb 2014 - This -fake- TNT spam comes with a malicious attachment that is currently not detected by any AV vendors.
Date: Thu, 6 Feb 2014 11:48:18 +0100 [05:48:18 EST]
From: TNT COURIER SERVICE [tracking@ tnt .co .uk]
Subject: TNT UK Limited - Package tracking 798950432737
Your package have been picked up and is ready for dispatch.
Connote # : 798950432737
Service Type : Export Non Documents - Intl
Shipped on : 05 Feb 14 00:00
Order No : 2819122
Status : Driver's Return Description : Wrong Address
Service Options: You are required to select a service option below.
TNT COURIER SERVICE (TCS)
Customer/Delivery Services Department
Central Pk Est/Mosley Rd, Trafford Park
Manchester, M17 1TT UK.
DETAILS OF PACKAGE
Reg order no: 798950432737
The options, together with their associated conditions...


Attached is a file Label_798950432737.zip which contains a malicious executable Label02062014.scr (an executable despite the .scr extension) with a VirusTotal detection rate of 0/41*. Despite the zero detection rate, there is plenty of badness going on... including downloads of an encrypted file from the following locations:
[donotclick]newz24x .com/wp-content/uploads/2014/02/pdf.enc
[donotclick]oilwellme .com/images/banners/pdf.enc
The Malwr report** indicates lots of IPs being communicated with, some of these look like Cloudflare addresses where newz24x .com is hosted. Take care with these if you are thinking about blocking them.
Recommended blocklist:
182.18.151.160
newz24x .com
oilwellme .com
"
* https://www.virustotal.com/en-gb/fi...6e2edad30463a2658cf64135/analysis/1391684255/

** https://malwr.com/analysis/N2UyOTljMzhlMTMwNDY2ZjkzN2Y4MWUxZGU3YTljNDk/
___

Visa/MasterCard Important Notification Spam
- http://threattrack.tumblr.com/post/75813534725/visa-mastercard-important-notification-spam
Feb 6, 2014 - "Subjects Seen:
ATTN: Important notification for a Visa / MasterCard holder!
Typical e-mail details:
Dear <email name>, Your Bank debit card has been temporarily blocked
We’ve detected unusual activity on your Bank debit card . Your debit card has been temporarily blocked, please fill document in attachment and contact us


Malicious File Name and MD5:
<email name>_Account_Report_7552804B13.zip (F08171CEF69EFD04CFC0F525ABD862FD)
PDF_Account_Details_User_543857394652798346597456987235986498756234798573280945-4353452345-32453245324532-45.pdf.exe (A1E61D4628E8381F47CE2E8424410A39


Screenshot: https://31.media.tumblr.com/0eb34e8b214e15559e9de99e1968a9c8/tumblr_inline_n0l7oel4t81r6pupn.png

Tagged: Visa, MasterCard, Tepfer
___

Swedish newssite compromised - Fake AV
- http://bartblaze.blogspot.com/2014/02/swedish-newssite-compromised.html
Feb 6, 2014 - "... a Swedish and well-visited newssite, AftonBladet (http ://www .aftonbladet .se), was -compromised- and serving visitors a fake antivirus or rogueware. There are two possibilities as to the cause:
- A (rotating) ad where malicious Javascript was injected
- AftonBladet itself had malicious Javascript injected
Whoever the cause, the injected script may have been as simple as:
document.write('< script src=http ://http ://www .aftonbladet .se/article/mal.php'); When trying to reproduce, it appeared it already was cleaned up, fast actions there...
File: svc-ddrs.exe
Image icon: https://lh3.ggpht.com/-edoZpNtfHHg/UvOQUTMDFkI/AAAAAAAAA3U/yuEdOGlC6Ok/s1600/1.png
Size: 1084416 bytes
Type: PE32 executable for MS Windows (GUI) Intel 80386 32-bit
MD5: be886eb66cc39b0bbf3b237b476633a5
SHA1: 36c3671f37f414ad6e0954e094a1a7bd0dcc34fc
ssdeep: 24576:M2xJbbGmTvmN9BfQ0lc4Bt4Xsk2QkibF5BOWe8JH0:M6bb3MQ0lc434n2Qhh5kWe8JU
Date: 0x52F1C3E1 [Wed Feb 5 04:53:53 2014 UTC]
EP: 0x5a8090 UPX1 1/3 [SUSPICIOUS]
CRC: Claimed: 0x0, Actual: 0x10eeb0 [SUSPICIOUS]
Packers: UPX 2.90 [LZMA] -> Markus Oberhumer, Laszlo Molnar & John Reiser
VirusTotal: https://www.virustotal.com/en-gb/fi...aa199f04f258263ca7e98cb28afc00d2dd0/analysis/
Anubis: http://anubis.iseclab.org/?action=result&task_id=12dc4daced1762174cdfa58df0872aae2&format=html
When executing the sample: Windows Efficiency Master:
> https://lh3.ggpht.com/-Gvb7kJhW-4Y/UvORtOSDp-I/AAAAAAAAA3k/9wPHFmiTPFw/s1600/fakeav2.PNG
Fake scanning results:
> https://lh3.ggpht.com/-N53YX8RSsCg/UvORsyLe8oI/AAAAAAAAA3g/EP6pDyeb9F8/s1600/FakeAV.PNG
Besides dropping the usual EXE file in the %appdata% folder, it also drops a data.sec file with predefined scanning results (all fake obviously). Here's a pastebin with the contents of data.sec: http://pastebin.com/DCtDWEbi
It also performs the usual actions:
- Usual blocking of EXE and other files
- Usual blocking of browser like Internet Explorer
- Callback to 93.115.86.197 C&C
- Stops several antivirus services and prevents them from running
- Reboots initially to stop certain logging and monitoring tools
- Uses mshta.exe (which executes HTML application files) for the usual payment screen
- Packed with UPX, so fairly easy to unpack
- Connects to http ://checkip .dyndns .org/ to determine -your- IP
This rogueware or fake AV belongs to the Tritax family, which has been going around for quite some time and has lots and lots of different names, but the design, concept and initial social engineering attack are all the same... an excellent post on this family, which you can read here:
> http://blog.0x3a.com/post/75474731248/analysis-of-the-tritax-fakeav-family-their-active
Prevention: In this case, no exploit -nor Java/Adobe, nor browser- was used. Only Javascript was injected. Install an antivirus and antimalware product and keep it up-to-date & running. Use NoScript in Firefox or NotScripts in Chrome. -Block- the above IP...
Disinfection: Perform a full scan with your installed antivirus and a scan with another antivirus or antimalware product. You can check on VirusTotal which antivirus applications already detect this malware. If you are having issues doing this, reboot your machine in Safe Mode and remove the malware..."
___

Payroll Report Spam
- http://threattrack.tumblr.com/post/75690172079/payroll-report-spam
Feb 5, 2014 - "Subjects Seen:
Jan Report
Typical e-mail details:
Hello ,
Please find attached reports for this year for checking.
Please could you sign the BACs form and return it as your approval that I am to go ahead with the transmission.
Kind regards
Wilton
Payroll Manager


Malicious File Name and MD5:
January.zip (F261B2109FD733559191CCCB7DEC79F8)
January.scr (811AD8F76AD489BAF15DB72306BD9F34)


Screenshot: https://31.media.tumblr.com/97e3ccd0fe0239fd42eb28d8c7e5c4c7/tumblr_inline_n0j10oxUm21r6pupn.png

Tagged: Payroll, Upatre
___

Fake "Payment Fund" SPAM - Wire.Transfer.rar attachment
- http://blog.dynamoo.com/2014/02/payment-fund-spam-with-wiretransferrar.html
5 Feb 2014 - "It's rare to see malware with a .RAR attachment, but this is one of those unusual beasts..
From: Alison George allison.george@ transferduc .nl
Date: 5 February 2014 22:41
Subject: Payment Fund
ALERT! A bank Wire transaction, Has just been rejected from checking 656778*** account.
to your bank confirmed by the FedWire.
Transaction ID: 99076900
Date: 2/3/2014
Transfer Origination: Fedline
Please review the attached copy of transaction report,
Federal Reserve Financial Services
Creating Nationwide Solutions for Your Payment Needs
20th Street and Constitution Avenue N.W.
Washington, D.C. 20551


Attached is a file Wire.Transfer.rar which you will need to unpack with a suitable application. In turn this creates a file Wire-Report which is actually an executable, but missing the .exe extension.. so you have to add that to get infected. Hmmm.. the phrase "some assembly required" springs to mind. The VirusTotal detection rate is 7/50* but most automated analysis tools seem to be having problems with the executable, so perhaps it is hardened against analysis or is simply corrupt. The ThreatExpert report (for some reason -not- showing in their database right now) has the following details:
Submission Summary:
Submission details:
Submission received: 5 February 2014, 04:39:38 PM
Processing time: 6 min 0 sec
Submitted sample:
File MD5: 0x12F1265162AAD712C271DAC6A9B5E564
Filesize: 248,320 bytes
Summary of the findings:
What's been found Severity Level
Creates a startup registry entry.
Technical Details:
Memory Modifications
There was a new process created in the system:
Process Name Process Filename Main Module Size
server.exe %Temp%\server.exe 57,344 bytes
Registry Modifications
The newly created Registry Values are:
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
babe8364d0b44de2ea6e4bcccd70281e = ""%Temp%\server.exe" .."
so that %Temp%\server.exe runs every time Windows starts
[HKEY_CURRENT_USER\Environment]
SEE_MASK_NOZONECHECKS = "1"
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run]
5PmM1jWi05 = "%AppData%\y183imD2\java.exe.lnk"
babe8364d0b44de2ea6e4bcccd70281e = ""%Temp%\server.exe" .."
so that %Temp%\server.exe runs every time Windows starts
Other details
To mark the presence in the system, the following Mutex object was created:
babe8364d0b44de2ea6e4bcccd70281e "
* https://www.virustotal.com/en-gb/fi...57c6be03a4ee40fd0ab92d48/analysis/1391640427/

:fear: :mad:
 
Last edited:
Something evil on 69.64.39.166

FYI...

Something evil on 69.64.39.166
- http://blog.dynamoo.com/2014/02/something-evil-on-696439166.html
7 Feb 2014 - "69.64.39.166 (Hosting Solutions International, US) appears to be hosting an exploit kit (possibly Fiesta*) according to URLquery reports such as this one**. The code is being -injected- into target websites, possibly through a malvertising campaign. I would recommend blocking the IP address as the simplest option, although I can identify the following domains on that same IP, all of which are likely to be malicious..."
(Long list of URLs at the dynamoo URL above.)
* http://blog.0x3a.com/post/62375513265/fiesta-exploit-kit-analysis-serving-msie-exploit

** http://urlquery.net/report.php?id=9258190

- https://www.virustotal.com/en/ip-address/69.64.39.166/information/
___

Fake rbs .co .uk "Important Docs" SPAM
- http://blog.dynamoo.com/2014/02/rbscouk-important-docs-spam.html
7 Feb 2014 - "This -fake- spam claiming to be from the Royal Bank of Scotland has a malicious attachment:
Date: Fri, 7 Feb 2014 15:44:19 +0530 [05:14:19 EST]
From: Doris Clay [Doris@ rbs .co .uk]
Subject: Important Docs
Account report.
Tel: 01322 589422
Fax: 01322 296116
email: Doris@rbs .co .uk
This information is classified as Confidential unless otherwise stated.
CONFIDENTIAL NOTICE: The contents of this message, including any attachments, are
confidential and are intended solely for the use of the person or entity to whom the
message was addressed. If you are not the intended recipient of this message, please be
advised that any dissemination, distribution, or use of the contents of this message is
strictly prohibited. If you received this message in error, please notify the sender.
Please also permanently delete all copies of the original message and any attached
documentation. Thank you.


Attached is a file AccountReport.zip which in turn contains a malicious executable AccountReport.scr which has a VirusTotal detection rate of 4/50*. Automated analysis tools... show a downlad of en encrypted file from the following locations:
[donotclick]professionalonlineediting .com/theme/cc/images/07UKex.enc
[donotclick]mararu .ro/Media/07UKex.enc
Both those sites are hosted by Mochanin Corp in the US, indicating perhaps a wider problem with that host.
Recommended blocklist:
204.93.165.33
50.31.147.54
professionalonlineediting .com
mararu .ro
"
* https://www.virustotal.com/en-gb/fi...858510b8b74880b7d214fd08/analysis/1391768230/

- http://threattrack.tumblr.com/post/75930437470/rbs-bank-spam
Feb 7, 2014 - "Subjects Seen:
Important Docs
Typical e-mail details:
Account report.
Tel: 01322 052736
Fax: 01322 513203
email: Trenton@ rbs .co .uk
This information is classified as Confidential unless otherwise stated.


Malicious File Name and MD5:
AccountReport.zip (0D143292B014E22DEE91930C488CBCE0)
AccountReport.scr (61DF278485C8012E5B2D86F825E12D0D)


Screenshot: https://gs1.wac.edgecastcdn.net/801...eba2be8d4/tumblr_inline_n0nbbdYk421r6pupn.png

Tagged: RBS, Upatre
___

Fake Authorization SPAM
- http://blog.dynamoo.com/2014/02/authorization-to-use-privately-owned.html
7 Feb 2014 - "We've seen this particular type of malware-laden spam before..
Date: Fri, 7 Feb 2014 17:08:16 +0700 [05:08:16 EST]
From: Callie Figueroa [Callie@ victimdomain]
Subject: Annual Form - Authorization to Use Privately Owned Vehicle on State Business
All employees need to have on file this form STD 261 (attached). The original is
retained by supervisor and copy goes to Accounting. Accounting need this form to approve mileage reimbursement.
The form can be used for multiple years, however it needs to re-signed annually by
employee and supervisor.
Please confirm all employees that may travel using their private car on state business
(including training) has a current STD 261 on file. Not having a current copy of this
form on file in Accounting may delay a travel reimbursement claim.


The email appears to originate from within the victim's own domain but doesn't. Attached is an archive file Form_STD261.zip which in turn contains a malicious executable Form_STD261.scr which has a VirusTotal detection rate of just 3/51*. Anubis reports** an attempted connection to faneema .com on 198.38.82.223 (Mochahost, US). I recommend blocking both the domain and IP address in this case.
* https://www.virustotal.com/en-gb/fi...a30a33055f7a848bf3ac5b8f/analysis/1391770188/

** http://anubis.iseclab.org/?action=result&task_id=18be1565e6a6c96a4e155daf0c9fe792b&format=html

:mad: :fear:
 
Last edited:
Evil .pw domains on 31.41.221.131 to 31.41.221.135

FYI...

Evil .pw domains on 31.41.221.131 to 31.41.221.135
- http://blog.dynamoo.com/2014/02/something-evil-on-3141221131-to.html
10 Feb 2014 - "Thanks to Malekal for the heads up*, the current batch of evil .pw domains that have been distributing malware appear to have shifted to the following IP addresses:
31.41.221.131
31.41.221.132
31.41.221.133
31.41.221.134
31.41.221.135

These IP addresses belong to Besthosting in Ukraine. A typical payload of one of these malicious sites looks like this URLquery report**.
The evil .pw domains in use all use a subdomain of one of the following:
(Long list at the dynamoo URL above)
I would recommend blocking those domains and the above-listed IPs (or alternatively 31.41.221.128/29 or 31.41.221.128/25). A full list of all the subdomains I can find is here [pastebin]***"
* https://twitter.com/malekal_morte/status/432804655374938112

** http://urlquery.net/report.php?id=9308286

*** http://pastebin.com/xSHmpKQR
___

81.4.106.132 / oochooch .com / 10qnbkh .xip .io
- http://blog.dynamoo.com/2014/02/814106132-oochoochcom-10qnbkhxipio.html
10 Feb 2014 - "... don't like the look of this [urlquery*], seems to be the payload site for some sort of injection attack. Might be worth blocklisting 81.4.106.132 **...
> https://lh3.ggpht.com/-_KGxwVddVxI/UvjaWxkUaUI/AAAAAAAACkM/PdORyIs_M00/s1600/oochooch.png "

* http://urlquery.net/search.php?q=81.4.106.132&type=string&start=2014-01-26&end=2014-02-10&max=50

** https://www.virustotal.com/en/ip-address/81.4.106.132/information/
___

Malicious Android apps hit 10 million ...
- http://www.theinquirer.net/inquirer/news/2327881/malicious-android-apps-hit-the-10-million-mark
Feb 10, 2014 - "THE ANDROID OPERATING SYSTEM (OS) has over 10 million malicious apps, security firm Kaspersky has warned in its latest report. In the Kaspersky Security Bulletin 2013, researchers said that by late January 2014 they had found 200,000 unique samples of mobile malware at the Google Play store and other sources, which get re-used and re-packaged to look like different apps... (cybercriminals used 10,604,273 unique hosts)... Kaspersky said in its report*... in most cases, malware targets the user's financial information**..."
* https://www.securelist.com/en/analy..._Bulletin_2013_Overall_statistics_for_2013#09

** https://www.securelist.com/en/analy..._Bulletin_2013_Overall_statistics_for_2013#02

Corporate Threats: Target organizations
- https://www.securelist.com/en/analy...y_Security_Bulletin_2013_Corporate_threats#01

:fear: :mad:
 
Last edited:
TrendMicro 2013 report ...

FYI...

TrendMicro 2013 report
- http://blog.trendmicro.com/trendlabs-security-intelligence/2013-security-roundup/
Feb 11, 2014 - "... We saw almost a -million- new banking malware variants, which was double what we saw in 2012. Much of this growth occurred in the latter half of the year:
Volume of new banking malware
> http://blog.trendmicro.com/trendlabs-security-intelligence/files/2014/02/2013roundup1.jpg
Two countries – the United States and Brazil – accounted for half of all banking malware victims:
Countries most affected by banking malware
> http://blog.trendmicro.com/trendlabs-security-intelligence/files/2014/02/2013roundup2.jpg
... CryptoLocker became as serious a problem for end users as fake antivirus malware had in previous years. The fall of the Blackhole Exploit Kit in 2013 due to the arrest of its creator... was a significant event that appreciably changed the threat landscape. It significantly cut the use of malicious links in spam messages by attackers... other exploit kits have emerged into the threat landscape since then...
Types of mobile malware threats
> http://blog.trendmicro.com/trendlabs-security-intelligence/files/2014/02/2013roundup4.jpg
... Attacks delivered via social media (combined with social engineering) have now become the norm, with newer social networks like Instagram, Pinterest, and Tumblr suffering from their own scams as well. Indeed, attacks on -all- social media platforms have become so common, it may almost be considered “business as usual”..."
___

NatWest Bank Credit Card Spam
- http://threattrack.tumblr.com/post/76324769715/natwest-bank-credit-card-spam
Feb 11, 2014 - "Subjects Seen:
Cards OnLine E-Statement E-Mail Notification
Typical e-mail details:
Dear Customer
Your February 11, 2014 E-Statement for account number xxxxxxxxxxxx9496 from Cards OnLine is now available.
For more information please check attached copy
Thank you
Cards OnLine


Malicious File Name and MD5:
E-Statement.zip (3B17E8E5BADF9ADB41974C2DDED1464E)
E-Statement.exe (20E7520948EE772E192127374569B219)


Screenshot: https://gs1.wac.edgecastcdn.net/801...5720bd387/tumblr_inline_n0u51lCyrt1r6pupn.png

Tagged: NatWest, Upatre
___

'Incoming Fax Report' - Malware Email
- http://www.hoax-slayer.com/incoming-fax-report-malware-email.shtml
Feb 11, 2014 - "Email purporting to be a notification about an incoming payroll related fax claims that users can click a link to read the file online... The link in the email opens a compromised website that harbours malware. If downloaded and installed, this malware may steal information from the infected computer, make connections with remote servers operated by criminals and download further malware components. If you receive one of these fake fax emails do not click any links or open any attachments that it contains.
Example:
*********************************************************
INCOMING FAX REPORT
*********************************************************
Date/Time: 10/02/2014 05:13:13 EST
Speed: 25903 bps
Connection time: 04:08
Pages: 7
Resolution: Normal
Remote ID: 8102702342
Line number: 4
DTMF/DID:
Description: Payroll
Click here to view the file online
*********************************************************


... Those who go ahead and click the link in the hope of viewing the supposed fax file will be taken to a website that displays a 'please wait' message. The compromised site may attempt to load malicious scripts, which then redirect to a malware page. The exact configuration and payload of the malware sites may vary. Typically, however, malware downloaded from such sites may perform one or more nefarious tasks. It may harvest information from the infected computer and send it to cybercriminals. It may allow criminals to control the computer remotely and join it to a botnet. It may download and install even more malware that can perform various other functions... The criminals bank on the fact that at least a few customers of such services may click on the link without due caution. And, even people that have never used such a service may be panicked into clicking the link in the mistaken belief that their bank account has been compromised or payments have been made in their names..."

:fear: :mad:
 
Last edited:
Fake FedEx SPAM, Phony SSL certificates ...

FYI...

Fake FedEx SPAM
- http://blog.dynamoo.com/2014/02/track-shipmentsfedex-spam.html
12 Feb 2014 - "This -fake- FedEx spam leads to malware:
Date: Wed, 12 Feb 2014 07:53:36 -0700 [09:53:36 EST]
From: FedEx [yama@ rickyz .jp]
Subject: Track shipments/FedEx 7487214609167750150131 results: Delivered
Track shipments/FedEx Office orders summary results:
Tracking number Status Date/Time
7487214609167750150131 Delivered Feb 11, 2014 11:20 AM
Track shipments/FedEx Office orders detailed results:
Tracking number 7487214609167750150131
Reference 304562545939440100902500000000
Ship date Feb 03, 2014
Ship From NEW YORK, NY
Delivery date Feb 11, 2014 11:20 AM
Service type FedEx SmartPost
Tracking results as of Feb 11, 2014 3:37 PM CST
Click Here and get Travel History ...


Screenshot: https://lh3.ggpht.com/-HHSPTBU0P1s/UvuVWCBMZuI/AAAAAAAACkc/-NKj72yFA8I/s1600/fedex2.png

In this case, the link in the email goes to [donotclick]pceninternet .net/tracking.php?id_7487214609167750150131 which downloads an archive file track_shipments_FedEx.zip. In turn, this ZIP file contains the malicious executable with the lovely name of Track_shipments_FedEx_Office_orders_summary_results_Delivered_tracking_number_9384758293431234834312_idju2f83f9hjv78fh7899382r7f9sdh8wf.doc.exe which has an icon that makes it look like a Word document. This has a VirusTotal detection rate of 15/49*, but automated analysis tools are inconclusive as to its payload..."
* https://www.virustotal.com/en-gb/fi...213faaaa7405a579dcbcb785/analysis/1392219267/
___

Malware (Neutrino EK?) sites to block
- http://blog.dynamoo.com/2014/02/malware-neutrino-ek-sites-to-block-12214.html
12 Feb 2014 - "The following IPs and domains appear to be in use for spreading exploit kits via injection attacks - 108.178.7.118 (Singlehop, US) [1] [2] and 212.83.164.87 (Online SAS, France) [3] [4]. The payload isn't clear, but some of the URLquery reports indicate Neutrino*. In the case I saw, the victim was directed to the EK from a compromised site at greetingstext .com. I cannot reproduce the problem with URLquery or any other tool, but log files do not lie. I would recommend that you block these following IPs and domains as a precaution:
108.178.7.118
212.83.164.87
jakiewebs .com
sheethoo .com
chaefooh .com
goldnclouds .com
nofledno .com
zeuriele .com
wqywdo .xip .io
glindeb.com
"
1) https://www.virustotal.com/en-gb/ip-address/108.178.7.118/information/

2) http://urlquery.net/search.php?q=108.178.7.118&type=string&start=2014-01-28&end=2014-02-12&max=50

3) https://www.virustotal.com/en-gb/ip-address/212.83.164.87/information/

4) http://urlquery.net/search.php?q=212.83.164.87&type=string&start=2014-01-28&end=2014-02-12&max=50

* http://urlquery.net/report.php?id=9410080
___

In the wild: Phony SSL certificates impersonating Google, Facebook, and iTunes
- http://arstechnica.com/security/201...tes-impersonating-google-facebook-and-itunes/
Feb 12, 2014 - "Researchers have found dozens of fake certificates impersonating the secure sections of online banks, e-commerce sites, and social networks. Google, Facebook, iTunes, and even a POP e-mail server belonging to GoDaddy are a small sample of the services affected by the fraudulent credentials, which in some cases can allow attackers to read and modify encrypted traffic passing between end users and protected servers.
> http://cdn.arstechnica.net/wp-content/uploads/2014/02/facebook1.png
The secure sockets layer (SSL) certificates don't pose much of a threat to people using a popular Web browser to visit spoofed websites, because the credentials aren't digitally signed by a trusted certificate authority, researchers from Netcraft wrote in a blog post published Wednesday*. They went on to say that people accessing sensitive websites with smartphone apps or other non-browser software may -not- be so lucky... Many of the fake SSL certificates discovered by Netcraft were created with malicious intentions. A wildcard certificate for *.google.com suggests an attempt to spoof a variety of Google services. The fake certificate was served by a machine in Romania hosting other sites with .ro and .com domains. The phony credential claims to have been issued by America Online Root Certification Authority 42. The name closely mimics a legitimate trusted root certificate that is installed in all browsers, although it's not enough to trick them. Other fraudulent credentials masqueraded as certificates for Facebook, iTunes, and a payment service and bank located in Russia. Yet another bogus certificate covered pop.where.secureserver.net, a server address belonging to GoDaddy's POP e-mail service... given the large number of e-mail clients, smartphone apps, and other non-browser programs available, it's not a stretch to think the certificates discovered by Netcraft are fooling some people right now. You should carefully consider the source of any app that connects to an SSL-protected server before installing it, and you should -never- click through pop-up windows that warn of self-signed certificates."
* http://news.netcraft.com/archives/2014/02/12/fake-ssl-certificates-deployed-across-the-internet.html

- http://www.theregister.co.uk/2014/02/14/fake_ssl_cert_peril/
14 Feb 2014

:mad: :fear:
 
Last edited:
Fake MS Email acct Phish ...

FYI...

Fake MS 'Reactivate Your Email Account' Phish
- http://www.hoax-slayer.com/microsoft-reactivate-email-account-phishing-scam.shtml
Feb 13, 2014 - "Email purporting to be from Microsoft claims that recipients must click a link to complete a 'one time automatic verification' in order to avoid having their email account suspended. The email is not from Microsoft. It is a crude phishing scam designed to trick recipients into giving their email address and password to online criminals. The criminals will use the stolen data to hijack the compromised email accounts and use them to send further spam and scam messages in the names of their victims. Example:
Subject: REACTIVATE YOUR EMAIL ACCOUNT!!!
Attention;
In compliance with the email upgrade instructions from
Microsoft Corporation and WWW email domain host, all unverified email accounts would be suspended for verification.
To avoid suspension of your email account and also to retain all email Contents, please perform one time automatic verification by completing the online verification form.
Please CLICK HERE
for the online verification form.
As a confirmation of complete and successful verification, you shall be automatically be redirected to your email web page.
Please move this message to your inbox, if found in bulk folder. Please do this for all your email accounts.
Thank you.
WWW. mail Support Team.
© 2014 Microsoft Corporation.


Screenshot: http://www.hoax-slayer.com/images/microsoft-reactivate-email-scam-2014-1.jpg

According to this email, which purports to be from Microsoft, the recipient must complete a verification of his or her email account by clicking a link in the message. The message warns that all unverified email accounts will face suspension and the loss of all 'email contents' in the accounts... the email is -not- from Microsoft. It is a phishing scam designed to trick recipients into giving their email address and password to Internet criminals. Clicking the link in the fake email takes users to an equally fake site that asks for their email address, email password and date of birth. After supplying this information, users are automatically redirected away from the scam website. Meanwhile, the scammers can use the data that they have stolen to access the compromised email accounts and use them to launch further spam and scam campaigns. Since the scam emails are sent via the hijacked accounts of victims, the emails cannot be traced back to the criminals responsible... No legitimate email provider is likely to send an unsolicited email asking customers to provide their email password by clicking a link, opening an attachment or replying. Be very wary of any email that makes such a request."

:fear::fear: :mad:
 
Back
Top