cybercrime134.rssing.com
Open in
urlscan Pro
69.30.212.90
Public Scan
URL:
https://cybercrime134.rssing.com/chan-6455418/all_p4.html
Submission: On November 28 via manual from US — Scanned from US
Submission: On November 28 via manual from US — Scanned from US
Form analysis
5 forms found in the DOMName: hmsearch — GET
<form name="hmsearch" method="get">
<input type="text" name="q" id="cs-header-menu-search-form-input" placeholder="Type and press enter..." value="" onkeydown="return dogsearch_if13(document.hmsearch.q.value, document.hmsearch.stype.value, event.keyCode);">
<input type="text" name="dummy" style="visibility:hidden">
<select name="stype" style="visibility:hidden">
<option selected="" value="rssing.com">RSSing.com</option>
</select>
</form>
Name: searchbox_1 — GET
<form name="searchbox_1" method="get">
<div class="input-group wrapped-text-input">
<input type="text" name="q" placeholder="search RSSing.com...." value="" onkeydown="return dogsearch_if13(document.searchbox_1.q.value, document.searchbox_1.stype.value,event.keyCode);">
<div class="input-group-prepend">
<a class="cs-btn cs-btn-medium " href="javascript:;" onclick="dogsearch(document.searchbox_1.q.value, document.searchbox_1.stype.value);">Search</a>
</div>
</div>
<input type="text" name="dummy" style="display:none">
<select name="stype" style="display:none">
<option selected="" value="rssing.com">RSSing.com</option>
</select>
</form>
Name: searchbox_2 — GET
<form name="searchbox_2" method="get">
<div class="input-group wrapped-text-input">
<input type="text" name="q" placeholder="search RSSing.com...." value="" onkeydown="return dogsearch_if13(document.searchbox_2.q.value, document.searchbox_2.stype.value,event.keyCode);">
<div class="input-group-prepend">
<a class="cs-btn cs-btn-medium " href="javascript:;" onclick="dogsearch(document.searchbox_2.q.value, document.searchbox_2.stype.value);">Search</a>
</div>
</div>
<input type="text" name="dummy" style="display:none">
<select name="stype" style="display:none">
<option selected="" value="rssing.com">RSSing.com</option>
</select>
</form>
Name: searchbox_3 — GET
<form name="searchbox_3" method="get">
<div class="input-group wrapped-text-input">
<input type="text" name="q" placeholder="search RSSing.com...." value="" onkeydown="return dogsearch_if13(document.searchbox_3.q.value, document.searchbox_3.stype.value,event.keyCode);">
<div class="input-group-prepend">
<a class="cs-btn cs-btn-medium " href="javascript:;" onclick="dogsearch(document.searchbox_3.q.value, document.searchbox_3.stype.value);">Search</a>
</div>
</div>
<input type="text" name="dummy" style="display:none">
<select name="stype" style="display:none">
<option selected="" value="rssing.com">RSSing.com</option>
</select>
</form>
Name: searchbox_4 — GET
<form name="searchbox_4" method="get">
<div class="input-group wrapped-text-input">
<input type="text" name="q" placeholder="search RSSing.com...." value="" onkeydown="return dogsearch_if13(document.searchbox_4.q.value, document.searchbox_4.stype.value,event.keyCode);">
<div class="input-group-prepend">
<a class="cs-btn cs-btn-medium " href="javascript:;" onclick="dogsearch(document.searchbox_4.q.value, document.searchbox_4.stype.value);">Search</a>
</div>
</div>
<input type="text" name="dummy" style="display:none">
<select name="stype" style="display:none">
<option selected="" value="rssing.com">RSSing.com</option>
</select>
</form>
Text Content
* Login * Account * Sign Up * Home * About Us * Catalog * Search * Register RSS * Embed RSS * FAQ * Get Embed Code * Example: Default CSS * Example: Custom CSS * Example: Custom CSS per Embedding * Super RSS * Usage * View Latest * Create * Contact Us * Technical Support * Guest Posts/Articles * Report Violations * Google Warnings * Article Removal Requests * Channel Removal Requests * General Questions * DMCA Takedown Notice * RSSing>> * Collections: * RSSing * EDA * Intel * Mesothelioma * SAP * SEO * Latest * Articles * Channels * Super Channels * Popular * Articles * Pages * Channels * Super Channels * Top Rated * Articles * Pages * Channels * Super Channels * Trending * Articles * Pages * Channels * Super Channels Switch Editions? Cancel Sharing: Title: URL: Copy Share URL English RSSing.com RSSing>> Latest Popular Top Rated Trending Channel: CyberCrime & Doing Time NSFW? Claim 2 X Mark channel Not-Safe-For-Work? cancel confirm NSFW Votes: (0 votes) X Are you the publisher? Claim or contact us about this channel. X 2.5 stars on 2 votes Showing article 61 to 80 of 265 in channel 6455418 Channel Details: * Title: CyberCrime & Doing Time * Channel Number: 6455418 * Language: English * Registered On: December 13, 2012, 3:40 pm * Number of Articles: 265 * Latest Snapshot: June 25, 2024, 1:22 pm * RSS URL: http://garwarner.blogspot.com/feeds/posts/default?alt=rss * Publisher: https://garwarner.blogspot.com/ * Description: A Blog about Cyber Crime and related Justice issues * Catalog: //cybercrime134.rssing.com/catalog.php?indx=6455418 Remove ADS Viewing all 265 articles First Page Page 2 Page 3 Page 4 Page 5 Page 6 ... Last Page Browse latest View live ↧ GAMEOVER ZEUS NOW USES ENCRYPTION TO BYPASS PERIMETER SECURITY February 2, 2014, 6:49 am ≫ Next: Highest Malware Spam Rate since April 2013 ≪ Previous: Yahoo reveals coordinated attack on Yahoo Emails - encourages Password reset $ 0 0 The criminals behind the malware delivery system for GameOver Zeus have a new trick. Encrypting their EXE file so that as it passes through your firewall, webfilters, network intrusion detection systems and any other defenses you may have in place, it is doing so as a non-executable ".ENC" file. If you are in charge of network security for your Enterprise, you may want to check your logs to see how many .ENC files have been downloaded recently. Malcovery Security's malware analyst Brendan Griffin let me know about this new behavior on January 27, 2014, and has seen it consistently since that time. On February 1st, I reviewed the reports that Malcovery's team produced and decided that this was a trend we needed to share more broadly than just to the subscribers of our "Today's Top Threat" reports. Subscribers would have been alerted to each of these campaigns, often within minutes of the beginning of the campaign. We sent copies of all the malware below to dozens of security researchers and to law enforcement. We also made sure that we had uploaded all of these files to VirusTotal which is a great way to let "the industry" know about new malware. To review the process, Cutwail is a spamming botnet that since early fall 2013 has been primarily distributing UPATRE malware via Social Engineering. The spam message is designed to convince the recipient that it would be appropriate for them to open the attached .zip file. These .zip files contain a small .exe file whose primary job is to go out to the Internet and download larger more sophisticated malware that would never pass through spam filters without causing alarm, but because of the way our perimeter security works, are often allowed to be downloaded by a logged in user from their workstation. As our industry became better at detecting these downloads, the criminals have had a slightly more difficult time infecting people. With the change last week, the new detection rate for the Zeus downloads has consistently been ZERO of FIFTY at VirusTotal. (For example, here is the "Ring Central" .enc file from Friday on VirusTotal -- al3101.enc. Note the timestamp. That was a rescan MORE THAN TWENTY-FOUR HOURS AFTER INITIAL DISTRIBUTION, and it still says 0 of 50. Why? Well, because technically, it isn't malware. It doesn't actually execute! All Windows EXE files start with the bytes "MZ". These files start with "ZZP". They aren't executable, so how could they be malware? Except they are. In the new delivery model, the .zip file attached to the email has a NEW version of UPATRE that first downloads the .enc file from the Internet and then DECRYPTS the file, placing it in a new location with a new filename, and then causing it both to execute and to be scheduled to execute in the future. I am grateful to William MacArthur of GoDaddy, Brett Stone-Gross of Dell Secure Works, and Boldizsár Bencsáth from CrySys Lab in Hungary who were three researchers who jumped in to help look at this with us. Hopefully others will share insights as well, so this will be an on-going conversation. (UPDATE: Boldizsár has published details of how the encoding works -- the file is first compressed and then XOR'ed with a 32-bit key). Upatre reverses the process to create the .exe file) UPATRE CAMPAIGNS THAT USE ENCRYPTION TO BYPASS SECURITY Here are the campaigns we saw this week, with the hashes and sizes for the .zip, the UPATRE .exe, the .enc file, and the decrypted GameOver Zeus .exe file that came from that file. For each campaign, you will see some information about the spam message, including the .zip file that was attached and its size and hash, and the .exe file that was unpacked from that .zip file. Then you will see a screenshot of the email message, followed by the URL that the Encrypted GameOver Zeus file was downloaded from, and some statistics about the file AFTER it was decrypted. ALL OF THESE SPAM CAMPAIGNS ARE RELATED TO EACH OTHER! They are all being distributed by the criminals behind the Cutwail malware delivery infrastructure. It is likely that many different criminals are paying to use this infrastructure. Campaign: 2014-01-27.ADPMessages Seen: 2606Subject: Invoice #(RND)From: ADP - Payroll Servicespayroll.invoices@adp.comInvoice.zip9767 bytesb624601794380b2bee0769e09056769cInvoice.PDF.exe18944 bytes8d3bf40cfbcf03ed13f0a900726170b3 Image may be NSFW. Clik here to view. dcmsservices.com/images/stories/slides/pdf.encOFFLINE bytes OFFLINE decrypted bytes electriciansdublinireland.com/wp-content/uploads/2014/01/pdf.enc287920 bytes 09ced08856101f86c02890f4373623a4 decrypted 338432 bytes b63415efcc70974269bd9d8da10b3ac1 -------------------------------------------------------------------------------- Campaign: 2014-01-27.BBBMessages Seen: 776Subject: FW: Complaint Case (RND)From: Better Business Bureau(Random)@newyork.bbb.orgCase 463252349343.zip9762 bytes1ed259d9e7474cfe56df485be479ea97Case 463252349343.exe18944 bytes809ae1af04ab921aa60efeb7083d21d7 Image may be NSFW. Clik here to view. sigmau.co.uk/templates/hot_spicy/images/glass/pdf.encOFFLINE bytes OFFLINE decrypted bytes skipbagsdublin.com/wp-content/uploads/2014/01/pdf.encOFFLINE bytes OFFLINE decrypted bytes -------------------------------------------------------------------------------- Campaign: 2014-01-27.HMRCMessages Seen: 302Subject: Important Information for EmployersFrom: HMRC Employer Alerts & Registrationsemployers@alerts.hmrc.gov.ukEmployer_Bulletin_Issue_46_79520EEE31.zip7218 bytes413cda07e774a5ed7f98279dd9e8a087Employer_Bulletin_Issue_46_79520EEE31.exe17920 bytes2616babcdf0c5b9086ff63fa6682fe07 Image may be NSFW. Clik here to view. all-monitor.com/images/pdf.enc282449 bytes 9d1b8f296b5bfb0f4817c2aacb8815a3 decrypted 289280 bytes fa4d35b63a8485bc7c0b167ca9358b76 -------------------------------------------------------------------------------- Campaign: 2014-01-27.HSBCMessages Seen: 404Subject: FW: Payment Advice - Advice Ref:[GB(RND)] / ACH credits / Customer Ref:[pay run 14/11/13]From: HSBC Advising Serviceadvising.service.(RND).(RND).RND)@mail.hsbcnet.hsbc.comPaymentAdvice.zip7162 bytesc17396cddadf201f83074615824240c0PaymentAdvice.exe17920 bytese0595c4f17056e5599b89f1f9cf52d83 Image may be NSFW. Clik here to view. afrolatinotala.com/images/pdf.enc282448 bytes 414755f65ebbaf52669aaab649b3f274 decrypted 289280 bytes 5a393b283f42edd17c7da2625b8e1045 -------------------------------------------------------------------------------- Campaign: 2014-01-27.SkypeMessages Seen: 275Subject: Skype Missed voice messageFrom: Administratordocs(#)@(many)Skype-message.zip10147 bytes79fb2e523fe515a6dac229b236f796ffVoice_Mail_Message.exe18944 bytes6e4857c995699c58d9e7b97bff6e3ee6 Image may be NSFW. Clik here to view. rockthecasbah.eu/templates/beez/css/wav.encOFFLINE bytes OFFLINE decrypted bytes -------------------------------------------------------------------------------- Campaign: 2014-01-27.VoiceMessageMessages Seen: 271Subject: Voice Message from UnknownFrom: Administratordocs(#)@(many)VoiceMessage.zip7273 bytesd2070f6a15312dec7882ca0d9ec7f431VoiceMessage.exe17920 bytes8a739776cf8316eba1bfae50e020c8f1 Image may be NSFW. Clik here to view. akhrisawal.com/images/marquee/wav.enc282448 bytes 73c811d0794de15906225d7d936fc6b7 decrypted 289280 bytes 2b0db77ac980be10b9ef4562269d8db4 ayeshaomar.com/images/host/wav.enc282446 bytes 1d30d5fe55585d24cd15ef97afb7322c decrypted 289280 bytes b993b4cb332b979d6f8509f5765abfd4 -------------------------------------------------------------------------------- Campaign: 2014-01-28 DeptTreasuryMessages Seen: 223Subject: Department of Treasury Notice of Outstanding Obligation - Case (RND)From: support@salesforce.comFMS-Case-(RND).zip9462 bytes067617d990a861f87304bb08b6628524FMS-.exe18944 bytes40afe219c14a0a5f3a4ddd6c8e39bc23 Image may be NSFW. Clik here to view. almotawer.biz/img/pdf.enc328025 bytes 41d57ca4b8705247186e2f30d911d811 decrypted 387584 bytes 7178a455ee9a0d6e42465ad9967a177a imagevillage.co.uk/images/pdf.enc328025 bytes 41d57ca4b8705247186e2f30d911d811 decrypted 387584 bytes 7178a455ee9a0d6e42465ad9967a177a -------------------------------------------------------------------------------- Campaign: 2014-01-28.IRSMessages Seen: 192Subject: Complaint Case (RND)From: IRS.govfraud.dep@irs.govComplaint_RND.zip7240 bytesf20768ed9f771a92950a5f5ab14bf57fComplaint_.exe17408 bytes8163d272c4975b1d7ed578b4d24b3d2a Image may be NSFW. Clik here to view. farmyarddog.co.uk/images/pdf.enc282486 bytes 97b200826b7a526d91fda4c56dc438ae decrypted 289276 bytes 542a5a6f04ddcad3effc72121c59e332 hamdanicoffee.com/up/pdf.enc282486 bytes 97b200826b7a526d91fda4c56dc438ae decrypted 289276 bytes 542a5a6f04ddcad3effc72121c59e332 -------------------------------------------------------------------------------- Campaign: 2014-01-28.NewVoiceMessageMessages Seen: 165Subject: New Voice MessageFrom: Voice Mail(RND)@(reflective)VoiceMail.zip6502 bytes2a048dfb3429155d552cb0c37b499b51VoiceMail.exe17920 bytesdc2e2f04a01009f3193b0df4ba0f6e81 Image may be NSFW. Clik here to view. hailantrdg.com/scripts/wav.enc282489 bytes 11a55dd1a756dbba6e7d404a7c22544a decrypted 289280 bytes cae9c9614affac694320215228efcf27 morethanshelters.co.uk/images/banners/wav.enc282489 bytes 11a55dd1a756dbba6e7d404a7c22544a decrypted 289280 bytes cae9c9614affac694320215228efcf27 -------------------------------------------------------------------------------- Campaign: 2014-01-28.RingCentralMessages Seen: 7720Subject: New Fax Message on 1/22/2013From: RNDRND@RNDfax.zip9929 bytesafa90762f6412173cf6e0e6d1d57531dfax.doc.exe18944 bytes81e425646f68d3adaddca0cf398f595f Image may be NSFW. Clik here to view. ren7oaks.co.uk/images/al2701.enc441073 bytes f626ad2af056644ff4717e1cd80c6da3 decrypted 484352 bytes c7c4a875b90c86136e497af8ffc9a9e0 salahicorp.com/up/al2701.enc441073 bytes f626ad2af056644ff4717e1cd80c6da3 decrypted 484352 bytes c7c4a875b90c86136e497af8ffc9a9e0 -------------------------------------------------------------------------------- Campaign: 2014-01-28.WhatsAppMessages Seen: 767Subject: Missed voice message, "(timestamp)"From: WhatsApp Messengerctaylor@magma.netMissed-message.zip6492 bytes494d6095b540dbc9f570e22b717a32dfMissed-message.exe17920 bytesa4c01917b7d48aa7c1c9a2619acb5453 Image may be NSFW. Clik here to view. inspireplus.org.uk/images/banners/wav.enc282491 bytes 33070eda34ccea632c3b4007a1e2beee decrypted 289268 bytes dc5b998fd7a6f29ebac6365654d57609 zubayen.com/up/wav.enc282491 bytes 33070eda34ccea632c3b4007a1e2beee decrypted 289268 bytes dc5b998fd7a6f29ebac6365654d57609 -------------------------------------------------------------------------------- Campaign: 2014-01-28.Skype Messages Seen: 574Subject: Skype Missed voice messageFrom: Administratordocs(#)@(many)Skype-message.zip9163 bytesdfa3db3c14ae1e369a4a9df6cb82832fSkype-message.exe18944 bytesab703881cb4b3fbd5ee13df30b7bb8d7 Image may be NSFW. Clik here to view. -------------------------------------------------------------------------------- Campaign: 2014-01-29.RingCentral1Messages Seen: 3811Subject: New Fax Message on 1/29/2013From: RNDRND@*.rufax.zip9473 bytes0842e4bcc8af1f0d54519a99834be218fax.pdf.exe18432 bytesd309df26dd91294dc4acd5fb78aa98f5 Campaign: 2014-01-29.RingCentral1Messages Seen: 2887Subject: New Fax Message on 1/22/2013From: RNDRND@RNDfax.zip9929 bytesafa90762f6412173cf6e0e6d1d57531dfax.pdf.exe19968 bytes5db38bd493ef2f9b35bb0015822b493d Campaign: 2014-01-29.RingCentral1Messages Seen: 2353Subject: New Fax Message on 1/29/2013From: RNDRND@*.rufax.zip9994 bytes2d65747503e7b251ad597a650f352f4efax.doc.exe18944 bytes81e425646f68d3adaddca0cf398f595f Image may be NSFW. Clik here to view. internetauctions.ca/img/apps/al2901.encOFFLINE bytes OFFLINE decrypted bytes -------------------------------------------------------------------------------- Campaign: 2014-01-29.eFaxMessages Seen: 1016Subject: Fax transmission: (RND-RND-RND-RND).zipFrom: eFax Corporatemessage@inbound.efax.com(RND-RND-RND-RND.zip)9628 bytes9f2613dabe2a89ac21e9b55b6df51ebc{fax num123}.exe17920 bytes89f45f68a0568996a6a109a1d04b6670 Image may be NSFW. Clik here to view. amy-escort.com/amy/pdf.enc281970 bytes 42dda6f13b2c8df96321570e1fa84fe8 decrypted 289785 bytes ee038bdd137f518614599275add5b9bb pakmailbarrie.com/images/banners/pdf.encOFFLINE bytes OFFLINE decrypted bytes -------------------------------------------------------------------------------- Campaign: 2014-01-29.LloydsTSBMessages Seen: 551Subject: January SpendingFrom: RNDRND@lloydstsb.comJanuary.zip9586 bytesea42b883dab711810243e8f138438733January.exe17920 bytesc28d9a0b3b2643a01fd3f3250a39a511 Image may be NSFW. Clik here to view. airconexpress.com.au/images/deac/pdf.enc281971 bytes 9c790bfd6def569362483192d6e1b9ba decrypted 289800 bytes 82dd0f87007fc0149183e1de8f0913f2 numantis.com/images/banners/pdf.encOFFLINE bytes OFFLINE decrypted bytes -------------------------------------------------------------------------------- Campaign: Messages Seen: 166Subject: Voice Message from UnknownFrom: Administratordocs(#)@(many)Message.zip8748 bytesff2c3e6b875803945b320e438304f506VoiceMessage.exe17920 bytes13d6046c575abe9c3072067135a57996 Image may be NSFW. Clik here to view. -------------------------------------------------------------------------------- Campaign: 2014-01-30.BanquePopulaireMessages Seen: 259Subject: Numero de cas: RNDFrom: Banquepopulaire.frresponse-automatique@banquepopulaire.frCas_RND.zip9476 bytesa21cd2697687ae6eb1b15175a8fb0ae2Cas_01302014.exe17920 bytes968779b34f063af0492c50dd4b6c8f30 Image may be NSFW. Clik here to view. doradoresources.com/images/ie6/pdf.enc282033 bytes 8cce7406f943daa81ef31411247491d3 decrypted 300544 bytes 092eb58dce516414908ecf6f3156372a sportsstoreonline.in/wp-content/uploads/2013/03/pdf.encOFFLINE bytes OFFLINE decrypted bytes -------------------------------------------------------------------------------- Campaign: 2014-01-30.RemitMessages Seen: 206Subject: FW: Last Month RemitFrom: Administratordocs(#)@reflectiveRemit.(domain).zip9465 bytes145d3da149cc8fa3bef38af648713fb6Remit.exe17920 bytes84a6030c8265b33c3c4e68d29975bd76 Image may be NSFW. Clik here to view. excelbizsolutions.com/templates/pdf.enc282036 bytes 5c7d5797e1f46c29dd9c7a9976d9d359 decrypted 299008 bytes aaf1097da1e50b7fd8d8c5e1a95acd80 poragdas.com/images/Porag/pdf.enc282036 bytes 5c7d5797e1f46c29dd9c7a9976d9d359 decrypted 299008 bytes aaf1097da1e50b7fd8d8c5e1a95acd80 -------------------------------------------------------------------------------- Campaign: 2014-01-30.SkypeMessages Seen: 42Subject: Skype Missed voice messageFrom: Administratordocs(#)@reflectiveMissed voice message.zip9336 bytes40453639a6fbd58b1d30099666ad32aMissed voice message.exe18944 bytes30e5d9d4d7da572fdef6f7253950a53c Image may be NSFW. Clik here to view. aatextiles.com/images/gallery/wav.enc328784 bytes 75a9d6fd9fe34a4ff737c987938a8f6c decrypted 386048 bytes f2bef403482c4dd70bd4e1be1fd4af8f profitera.com/img/newsletter/auto/wav.enc328784 bytes 75a9d6fd9fe34a4ff737c987938a8f6c decrypted 386048 bytes f2bef403482c4dd70bd4e1be1fd4af8f -------------------------------------------------------------------------------- Campaign: 2014-01-30.AssortedFax Messages Seen: 2410Subject: Corporate eFax message from (RND) jConnect fax from (RND) - (RND) pages, Caller_ID (RND)From: eFax Corporate jConnect Dun & Bradstreetmessage / case.alert@inbound.j2.com dnb.com inbound.efax.comFAX_001_RND.zip10293 bytes18b72825aecde011bdc92c1526491571FAX_001_20143001_814.exe18944 bytes915fdc8403b26bac79801fa1a341495d Image may be NSFW. Clik here to view. Image may be NSFW. Clik here to view. Image may be NSFW. Clik here to view. (These three all use the same binaries) -------------------------------------------------------------------------------- Campaign: Messages Seen: 1627Subject: New Fax Message on 01/29/2013From: RNDRND@*.rufax.zip10095 bytes8627ce01daaebc35610d05cdbdbde612fax.pdf.exe18432 bytes465c2656c07ab05e9349920f53dd0deb Campaign: 2014-01-30.LaPoste Messages Seen: 101Subject: Scan de (RND)From: LaPostereponse-automatique@laposte.netScan_RND_RND_RND.zip9494 bytesdaaf11e91c3cc3506042d633373aabd3Scan_301_30012014_001.exe17920 bytes968779b34f063af0492c50dd4b6c8f30 Image may be NSFW. Clik here to view. -------------------------------------------------------------------------------- Campaign: 2014-01-30.StaplesMessages Seen: 245Subject: Your order is awaiting verification!From: Staples Advantage OrdersOrder@staplesadvantage.comOrder_RND.zip9465 bytese669d0ff0238ed2f3601c01f1a532728Order.exe17920 bytes84a6030c8265b33c3c4e68d29975bd76 Image may be NSFW. Clik here to view. -------------------------------------------------------------------------------- Campaign: 2014-01-31.RingCentral1Messages Seen: 3488Subject: New Fax Message on 01/29/2014From: RNDRND@*.rufax.zip9815 bytesd373a3e96519612896facb6f18e89785fax.pdf.exe19968 bytes9a836550c9e74a46076a7292fb0d4ab1 Image may be NSFW. Clik here to view. aim2go.com/WEB-INF/al3101.enc329132 bytes ded1b7f7ea934faf84a8dcc5011316cd decrypted 390144 bytes f07d3afab1eb150e8a315596b5fb23f9 bandwagondesign.com/scripts/al3101.enc329132 bytes ded1b7f7ea934faf84a8dcc5011316cd decrypted 390144 bytes f07d3afab1eb150e8a315596b5fb23f9 -------------------------------------------------------------------------------- ↧ Search RSSing.com -------------------------------------------------------------------------------- HIGHEST MALWARE SPAM RATE SINCE APRIL 2013 February 8, 2014, 8:48 am ≫ Next: Interac Phishers try their hand at IRS ≪ Previous: GameOver Zeus now uses Encryption to bypass Perimeter Security $ 0 0 Since 2006, my lab at UAB, part of The Center for Information Assurance and Joint Forensics Research has been gathering spam and finding creative ways to analyze it to find new threats. Last December we licensed that technology to form Malcovery Security who have picked up the reins on the work of finding and reporting on new malicious threats in spam. Between the groups, we've evaluated nearly a billion spam messages, so when one of my analysts says they are seeing something "new" I pretty much listen to them. This week they said "spam-delivered Malware is going through the roof!" I was traveling when I got that first report but was able to spend some time in the lab with the analysts yesterday, and they weren't kidding! The new volume levels started on Wednesday, February 5th, with a campaign imitating Bank of America. On February 6th it changed to Visa/Mastercard, and on February 7th it was imitating FedEx. When we say it was extremely high volume, we mean it! DateMessages reviewedCountEmail SubjectFeb 5 1,066,187171,186 Bank of America Alert: Online Banking Security MeasuresFeb 6 1,176,667303,646 ATTN: Important notification for a Visa / MasterCard holder!Feb 7 1,113,739267,445 Some important information is missing Those numbers indicate that for the last three days this single malware distributor was accounting for 16%, 25.8%, and 24% of all the spam we reviewed! How does that compare to normal? The previous day, February 4th, we considered the "Photos" malware campaign to be heavily spammed when it reached 5% of total spam volume for the day. Microsoft's Security Intelligence Report (volume 15) showed spam message breakdown for the first half of 2013 like this: Image may be NSFW. Clik here to view. Historically, we've only seen one day, either at UAB or at Malcovery, that had a higher percentage of malware-laden spam. April 17, 2013, the day following the Boston Marathon Bombing, broke all the records for heaviest spam campaign that was distributing malware as we wrote about in Boston Marathon Explosion Spam Leads to Malware. Cisco's 2014 Annual Security Report calls attention to that spam campaign as well, saying that it accounted for 40% of all the spam messages delivered worldwide that day. Their report included this caution of "Breaking News" emails ... > Because breaking news spam is so immediate, email users are more likely to > believe the spam messages are legitimate. Spammers prey on people’s desire for > more information in the wake of a major event. When spammers give online users > what they want, it’s much easier to trick them into a desired action, such as > clicking an infected link. It’s also much easier to prevent them from > suspecting that something is wrong with the message. Here are some more details about the spam messages that were seen in the past three days: -------------------------------------------------------------------------------- Image may be NSFW. Clik here to view. Computers opening this attachment would try to contact the URLs listed here. The "404.php" is an exploit kit that results in the ".exe" files being dropped: (http is changed to hYYp and spaces added to URLs for your protection) hYYp://37.139.47.56 /srt/404.php hYYp://37.139.47.56 /ssd/usa.exe hYYp://37.139.47.56 /ssd/usa2.exe hYYp://62.76.187.171 /srt/404.php hYYp://62.76.187.171 /ssd/usa.exe hYYp://62.76.187.171 /ssd/usa2.exe hYYp://62.76.187.221 /ssd/usa.exe hYYp://62.76.187.221 /ssd/usa2.exe hYYp://62.76.187.221 /ssd/usa2.exe hYYp://85.143.166.119 /srt/404.php hYYp://85.143.166.119 /ssd/usa.exe -------------------------------------------------------------------------------- Image may be NSFW. Clik here to view. hYYp://37.139.47.56 /srt/404.php hYYp://37.139.47.56 /ssd/usa.exe hYYp://37.139.47.56 /ssd/usa2.exe hYYp://37.139.47.56 /ssd/ust2.exe hYYp://37.139.47.56 /ssd/ust21.exe hYYp://62.76.179.171 /punta/gae.php hYYp://62.76.187.171 /srt/404.php hYYp://62.76.187.171 /ssd/usa.exe hYYp://62.76.187.171 /ssd/usa2.exe hYYp://62.76.187.171 /ssd/ust2.exe hYYp://62.76.187.171 /ssd/ust21.exe hYYp://62.76.187.221 /ssd/usa.exe hYYp://62.76.187.221 /ssd/usa2.exe hYYp://62.76.187.221 /ssd/ust2.exe hYYp://62.76.187.221 /ssd/ust21.exe hYYp://62.76.42.144 /punta/gae.php hYYp://62.76.46.249 /punta/gae.php hYYp://85.143.166.119 /srt/404.php hYYp://85.143.166.119 /ssd/usa.exe hYYp://85.143.166.119 /ssd/usa2.exe hYYp://85.143.166.119 /ssd/ust2.exe -------------------------------------------------------------------------------- Image may be NSFW. Clik here to view. hYYp://37.139.47.56 /srt/404.php hYYp://37.139.47.56 /ssd/ust12.exe hYYp://62.76.187.171 /srt/404.php hYYp://62.76.187.171 /ssd/ust12.exe hYYp://85.143.166.119 /srt/404.php hYYp://85.143.166.175 /ssd/ust12.exe -------------------------------------------------------------------------------- The IP addresses that would be most critical to block to protect your network would be these. Most of these addresses are on a Cloud hosting service in Russia, "clodo.ru", some on the ASN - St. Petersburg, Russia (clodo.ru) - AS48172 OVERSUN and others on AS56534 PIRIX-INET-AS PIRIX, ltd. 37.139.47.56 62.76.179.171 62.76.187.171 62.76.187.221 62.76.42.144 62.76.46.249 85.143.166.119 85.143.166.175 The .exe that gets dropped is ZeuS, though current detection would make that a bit hard to tell. The main file being dropped this morning has the MD5 hash = b32e5922c82208b5fdf6d60503d458f9. Here is the VirusTotal report for that URL as of this timestamp, which is showing greatly improved detection over my original run. ESET, Kaspersky, and Microsoft are all agreeing this is Zeus, while 9 other vendors list some form of "Generic" as the detection name. SPAMMING COMPUTERS ANALYSIS How often were the same computers used to send these campaigns? We first created three lists of IP addresses used to deliver the spam on each day. I called them ss5ip, ss6ip, and ss7ip for the three days. ss5ip was a list of the 47,380 IP addresses we saw deliver the Bank of America spam on February 5. ss6ip was a list of the 58,532 IP addresses we saw deliver the Visa/MasterCard spam on February 6. ss7ip was a list of the 51,883 IP addresses we saw deliver the FedEx spam on February 7. 5 Intersection 6 = 22,500 shared IPs 6 Intersection 7 = 25,405 shared IPs 5 Intersection 7 = 18,261 shared IPs 16,255 IPs were seen in all three campaign. 107,987 unique IPs were seen if we combine all three campaigns. Those 107,987 IP addresses sent Malcovery's spam accounts an average of 6.8 emails each and a median of 4 emails each. The two top spamming IP addresses were 86.64.142.28 (France, 158 messages) and 200.123.8.123 (Peru, 142 messages). I geo-coded those IP addresses that sent more than 10 emails to us, which was a total of 21,955 IP addresses from 141 countries. A very unusual number of IP addresses, more than 45%, are from Spanish-speaking countries, . At some point this botnet probably enlarged itself on Spanish-language spam- or website-based malware ES 3052 - Spain AR 2148 - Argentina US 1841 - United States CO 1387 - Colombia MX 1374 - Mexico IT 1263 - Italy DE 1025 - Germany PE 915 - Peru RO 876 - Romania BR 833 - Brazil GB 666 - Great Britain CL 634 - Chile FR 537 - France IL 489 - Israel CA 379 - Canada PL 342 - Poland TR 325 - Turkey BG 267 - Bulgaria PT 259 - Portugal GR 238 - Greece VE 238 - Venezuela AT 183 - Austria RS 180 - Republic of Serbia EC 131 - Ecuador CH 118 - Switzerland IN 116 - India CZ 104 - Czech Republic PA 104 - Panama ↧ ↧ INTERAC PHISHERS TRY THEIR HAND AT IRS February 17, 2014, 10:26 am ≫ Next: WhatsApp Spam: a malware distribution scam ≪ Previous: Highest Malware Spam Rate since April 2013 $ 0 0 Last week Malcovery Security had an interesting phish show up claiming to be related to the IRS. This one turns out to be a great example of the (activate 1940 horror movie narrator voice) The POWER OF CROSS BRAND INTELLIGENCE (/activate). Here's what the website looked like: Image may be NSFW. Clik here to view. Phish from: bursafotograf.com / profiles / interac / RP.do.htm In this phish, the "big idea" is that you can escalate your IRS Tax Refund if you specify which bank you would like the refund to be deposited into. When you click the bank's logo, you are taken to a phishing site for that brand and asked to provide your Userid and Password, which are then emailed to the phisher. Here's an example of the page you would see if you clicked on the Regions Bank logo (graphic courtesy of PhishTank submission 2254700.) Image may be NSFW. Clik here to view. Things get quite fascinating though when we hide the graphics: Image may be NSFW. Clik here to view. Why would an IRS phish have ALT TEXT including for four of the largest Canadian banks? By looking at the source code for the phishing page, we see that this is a very lightly rebranded Interac phish: First, the website Title is "INTERAC e-Transfer" ... INTERAC is a very interesting money transfer system used in Canada that allows anyone to send money to anyone else simply by using either their email address or cell phone text messaging service. A Transaction code is texted/emailed from the payer to the recipient, allowing the recipient to login to the Interac service and choose what account, and what bank, they would like to receive the funds into. The phish has some Javascript at the top that includes variables like "var provinceList = new Array ("Alberta", "British Columbia", "New Brunswick", "Newfoundland and Labrador", "Nova Scotia", "Ontario", "Prince Edward Island", "Saskatchewan");" and a pull down menu with options "Select Institution", "Select Province or Territory" and "Select Credit Union." As we continue into the table of graphics, we see that the phisher has changed his graphics and links to refer to the American banks, with code such as: href = chasecustomerprofile img src = chasecustomerprofile/css/images/chaseNew.gif .... but with "alt=CIBC" href = navy/index.htm img src = imgs/nfculogo.png .... but with "alt=President's Choice Financial" href = suntrust img src = imgs/suntrust.png .... but iwth "alt = RBC Royal Bank" etc . . . PHISHING CROSS-BRAND INTELLIGENCE It seems fairly clear that we should be able to find more phishing sites that used the original Interac code, and of course we can in the Malcovery PhishIQ system. Here is a phish that was seen on June 21, 2013 on the website freevalwritings.com / wp / interacsessions / RP.do.htm Image may be NSFW. Clik here to view. And another first seen on May 28, 2013 on the website anglaisacote.com / interac / RP.do.htm (note the common path on both of these that matches the current IRS phish = "interac/RP.do.htm" RP.do.htm is used on the REAL Interac website. Image may be NSFW. Clik here to view. PHISHING & SPAM CROSS-BRAND INTELLIGENCE An interesting thing about phishing emails that differentiates them from standard spam. While normal spam is often sent via botnets, phishing emails tend to be sent from the same IP address over a period of time. When we use Malcovery PhishIQ to examine the IRS version of the Interac phish, which attempts to steal money from Bank of America, Chase Bank, Navy Federal Credit Union, SunTrust, Regions Bank, Wells Fargo, USAA, and Citi, we see that the originally advertised URL was actually "130.13.122.25 / irsjspmessageKey-IG09210358i /". That URL forwarded visitors to the website "ernursusleme.com / Connections / irsonlinedeposit /" which then forwarded the visitors to "bursafotograf.com / profiles / interac / RP.do.htm" which is where the screenshot at the top of this article was captured. So, to find spam messages related to this phish, it seems reasonable to search the Malcovery Spam Data Mine for emails that advertised URLs on 130.13.122.25. We found two sets of spam messages that advertised URLs on that host in our spam collection. One batch from January 8, 2014 and the other batch from January 28th and January 29th, 2014. The January 28th and January 29th emails claimed to be from "From: USAA (USAA.Web.Services@customer.usaa.com)" with an email subject of "New Insurance Document Online". Two of the emails were sent from 122.3.92.116 (Philippines) and one email was sent from 70.166.118.54 (Cox). What other emails were sent from those IP addresses? Here are the emails from 122.3.92.116 Date: Subject: From NameFrom EmailDec 13, 2013Your account has been limited until we hear from youservice@ intl.paypal.comsurvey.research-3086@ satisfactionsurvey.comDec 13, 2013Your account has been limited until we hear from youservice@ intl.paypal.comsurvey.research-3086@ satisfactionsurvey.comDec 14, 2013Your account has been limited until we hear from youservice@ intl.paypal.comsurvey.research-3086@ satisfactionsurvey.comDec 16, 2013Confirmation - personal information updateUSAAUSAA.Web.Services@ customermail.usaa.comDec 18, 2013INTERAC e-Transfer Receivednotify@ payments.interac.canotify@ payments.interac.caDec 18, 2013INTERAC e-Transfer Receivednotify@ payments.interac.canotify@ payments.interac.caDec 18, 2013INTERAC e-Transfer Receivednotify@ payments.interac.canotify@ payments.interac.caDec 23, 2013INTERAC e-Transfer Receivednotify@ payments.interac.canotify@ payments.interac.caDec 30, 2013INTERAC e-Transfer Receivednotify@ payments.interac.canotify@ payments.interac.caDec 31, 2013INTERAC e-Transfer Receivednotify@ payments.interac.canotify@ payments.interac.caDec 31, 2013INTERAC e-Transfer Receivednotify@ payments.interac.canotify@ payments.interac.caDec 31, 2013INTERAC e-Transfer Receivednotify@ payments.interac.canotify@ payments.interac.caJan 5, 2014Notification of Limited Account AccessPayPalPayPal@ abuse.epayments.comJan 7, 2014Canada Tax send you an INTERAC e-Transfernotify@ payments.interac.canotify@ payments.interac.caJan 7, 2014Canada Tax send you an INTERAC e-Transfernotify@ payments.interac.canotify@ payments.interac.caJan 7, 2014Canada Tax send you an INTERAC e-Transfernotify@ payments.interac.canotify@ payments.interac.caJan 8, 2014View Your USAA Document OnlineUSAAUSAA.Web.Services@ customermail.usaa.comJan 8, 2014View Your USAA Document OnlineUSAAUSAA.Web.Services@ customermail.usaa.comJan 8, 2014View Your USAA Document OnlineUSAAUSAA.Web.Services@ customermail.usaa.comJan 8, 2014View Your USAA Document OnlineUSAAUSAA.Web.Services@ customermail.usaa.comJan 8, 2014View Your USAA Document OnlineUSAAUSAA.Web.Services@ customermail.usaa.comJan 8, 2014View Your USAA Document OnlineUSAAUSAA.Web.Services@ customermail.usaa.comJan 8, 2014View Your USAA Document OnlineUSAAUSAA.Web.Services@ customermail.usaa.comJan 17, 2014Canada Tax send you an INTERAC e-Transfernotify@ payments.interac.canotify@ payments.interac.caJan 17, 2014Canada Tax send you an INTERAC e-Transfernotify@ payments.interac.canotify@ payments.interac.caJan 17, 2014Canada Tax send you an INTERAC e-Transfernotify@ payments.interac.canotify@ payments.interac.caJan 17, 2014Canada Tax send you an INTERAC e-Transfernotify@ payments.interac.canotify@ payments.interac.caJan 17, 2014Canada Tax send you an INTERAC e-Transfernotify@ payments.interac.canotify@ payments.interac.caJan 17, 2014Canada Tax send you an INTERAC e-Transfernotify@ payments.interac.canotify@ payments.interac.caJan 17, 2014Canada Tax send you an INTERAC e-Transfernotify@ payments.interac.canotify@ payments.interac.caJan 17, 2014Canada Tax send you an INTERAC e-Transfernotify@ payments.interac.canotify@ payments.interac.caJan 17, 2014Canada Tax send you an INTERAC e-Transfernotify@ payments.interac.canotify@ payments.interac.caJan 19, 2014Your dispute has been ended 01/20/2014: Get your money backPayPalpaypal.feedback@ email.comJan 19, 2014Your dispute has been ended 01/20/2014: Get your money backPayPalpaypal.feedback@ email.comJan 20, 2014View and Sign Your USAA Insurance PolicyUSAAUSAA.Web.Services@ customermail.usaa.comJan 20, 2014View and Sign Your USAA Insurance PolicyUSAAUSAA.Web.Services@ customermail.usaa.comJan 20, 2014View and Sign Your USAA Insurance PolicyUSAAUSAA.Web.Services@ customermail.usaa.comJan 20, 2014View and Sign Your USAA Insurance PolicyUSAAUSAA.Web.Services@ customermail.usaa.comJan 20, 2014View and Sign Your USAA Insurance PolicyUSAAUSAA.Web.Services@ customermail.usaa.comJan 21, 2014View and Sign Your USAA Insurance PolicyUSAAUSAA.Web.Services@ customermail.usaa.comJan 21, 2014View and Sign Your USAA Insurance PolicyUSAAUSAA.Web.Services@ customermail.usaa.comJan 21, 2014View and Sign Your USAA Insurance PolicyUSAAUSAA.Web.Services@ customermail.usaa.comJan 21, 2014View and Sign Your USAA Insurance PolicyUSAAUSAA.Web.Services@ customermail.usaa.comJan 21, 2014Your dispute has been ended 01/20/2014: Get your money backPayPalpaypal.feedback@ email.comJan 28, 2014New Insurance Document OnlineUSAAUSAA.Web.Services@ customermail.usaa.comJan 28, 2014New Insurance Document OnlineUSAAUSAA.Web.Services@ customermail.usaa.comFeb 8, 2014Canada Revenue send you an INTERAC e-TransferTD Canada Trustnotify@ payments.interac.ca And here are the emails from 70.166.118.54 Date: Subject: From NameFrom EmailJan 29, 2014New Insurance Document OnlineUSAAUSAA.Web.Services@customermail.usaa.comFeb 3, 2014INTERAC e-Transfer Receivednotify@ payments.interac.canotify@ payments.interac.caFeb 3, 2014INTERAC e-Transfer Receivednotify@ payments.interac.canotify@ payments.interac.caFeb 3, 2014INTERAC e-Transfer Receivednotify@ payments.interac.canotify@ payments.interac.caFeb 3, 2014INTERAC e-Transfer Receivednotify@ payments.interac.canotify@ payments.interac.caFeb 3, 2014INTERAC e-Transfer Receivednotify@ payments.interac.canotify@ payments.interac.caFeb 3, 2014INTERAC e-Transfer Receivednotify@ payments.interac.canotify@ payments.interac.caFeb 4, 2014INTERAC e-Transfer Receivednotify@ payments.interac.canotify@ payments.interac.caFeb 4, 2014INTERAC e-Transfer Receivednotify@ payments.interac.canotify@ payments.interac.caFeb 8, 2014Canada Revenue send you an INTERAC e-TransferRBC Royal Banknotify@ payments.interac.caFeb 9, 2014Canada Revenue send you an INTERAC e-TransferRBC Royal Banknotify@ payments.interac.caFeb 11, 2014Wells Fargo ATM/Debit Card Expires SoonWells Fargo Onlinealerts@ notify.wellsfargo.comFeb 11, 2014Wells Fargo ATM/Debit Card Expires SoonWells Fargo Onlinealerts@ notify.wellsfargo.com THE POWER OF CROSS-BRAND INTELLIGENCE To summarize, we started with a new IRS phish, and through some comparisons in the Phishing and Spam Data Mines, ended with phish for USAA, PayPal, Wells Fargo, and Interac all being linked together. Investigators interested in learning more are encouraged to reach out! ↧ WHATSAPP SPAM: A MALWARE DISTRIBUTION SCAM February 24, 2014, 7:47 am ≫ Next: 2013 FTC Consumer Sentinel Report - Identity Theft By U.S. City ≪ Previous: Interac Phishers try their hand at IRS $ 0 0 On February 19, 2014, Facebook Announced the purchase of WhatsApp for $4 billion in cash and 183,865,778 shares of Facebook stock ($12 Billion in current value) plus an additional $3 billion in shares to the founders that will vest over four years, for a total purchase price of $19 Billion. Within 24 hours, spammers were using WhatsApp lures to attract traffic to counterfeit pharmaceutical websites! Journalists in the United States were scurrying trying to figure out what WhatsApp even is, let alone why it should be worth $19 Billion. Apparently WhatsApp has been growing in popularity in other parts of the world, as documented by a survey released in November by OnDevice Research which was headlined as Messenger Wars: How Facebook lost its lead which talked about the top Social Message Apps for mobile devices in five major markets: US, Brazil, South Africa, Indonesia, and China. While Facebook still lead in the US, and WeChat clearly dominates China, WhatsApp was the leading app in Brazil 72%, South Africa (68%), and Indonesia (43%). Image may be NSFW. Clik here to view. But those of us who keep track of spam and email-based threats have been hearing about WhatsUp for several months. As the popularity of WhatsApp grows due to the new acquisition, we believe we will see it become an even more popular spam lure. At least three distinct spamming groups have already used WhatsApp as a lure for their scams. According to Malcovery Security's Brendan Griffin, WhatsApp was being used as a malware lure since at least September 19, 2013. I asked Brendan to give me a list of days when a WhatsApp spam/malware campaign made Malcovery's "Today's Top Threats" list. This campaign has been solidly in the top ten on: SEPTEMBER 19, 23, 24, 25, 26 OCTOBER 2, 3, 4, 7, 8, 9, 10, 11, 16, 17, 18, 21, 22, 23, 24, 25 NOVEMBER 14 JANUARY 9, 13, 15, 20, 28 As Steve Ragan mentioned in his ComputerWorld article on November 8, 2013, WhatsApp was one of our Top Five Imitated Brands for the delivery of malware via spam for the quarter. (See ComputerWorld - Senior executives blamed for a majority of undisclosed security incidents.) Curiously, when I asked Brendan about the email I saw THIS WEEK imitating WhatsApp he said that was an example of spammers using the WhatsApp notoriety to drive traffic to counterfeit pharmaceutical websites! WHATSAPP SPAM USED BY ASPROX BOTNET TO DELIVER KULUOZ MALWARE We've seen tremendous variety in both the malware being delivered and in the method of delivery over the course of so many spam runs. The first day we made note of the WhatsApp malware, September 19, 2013, we observed 52 different websites being advertised in the emails. Each of these websites had a file called "info.php" that was being called with a very long unique "message" parameter, such as: /info.php?message=47lvQ31P1Nip+SkTsbYeAVNH+2aJDFeJ9djfprCHGa4= (a couple digits have been tweaked for privacy) Image may be NSFW. Clik here to view. Websites used for malware delivery,September 19, 2013 aki-kowalstwo.plkoshergiftsuk.comsamedaystationery.co.ukamicidelcuore.infolichtenauer-fv.deschweitzers.comarsenalyar.rulocweld.comsentabilisim.comart52.rumbuhgalter.rusewretro.combhaktapurtravel.com.npmdou321.ruspentec.cabluereefwatersports.commikemetcalfe.castructuredsettlementsannuities.comcateringjaipur.commirvshkatulke.ruthaiecom.netclockcards.iemrsergio.comtiarahlds.comdj220w.rumuzikosfabrikas.lttk-galaktika.rudjvakcina.commywebby.rutowi69.deeasywebmexico.comorbitmotion.comtrivenidigital.cometarlo.ruorderschering.comveerbootkobus.nleveryday24h.depaternocalabro.itvenetamalaysia.comglobalpeat.compaulhughestransport.comverfassungsschutz-bw.degourmetschlitten.compax-sancta.devitapool.ruidollighting.compennerimperium.dezdrowieonly.ovh.orgjuhatanninen.complaneta-avtomat.rukasutin.rurkbtservice.ru Visiting the link from any of of those websites resulted in code on the server resolving your IP address and creating a customer malware name based on your geographic location. For example, when we visited from Birmingham, Alabama IP addresses, we received a file called "VoiceMail_Birmingham_(205)4581400.zip" - 205 is the Area code for Birmingham, Alabama, so both the city name and the telephone number provided were intended to enhance the believability that this was a "real" VoiceMail message that we should open and listen to! At the time we received this file, VirusTotal was showing a 7 of 48 detection rate. (When the file was last checked, December 4, 2013, the detection rate had improved to 36 of 48 AV products.) This malware delivery mechanism, with the geographically labeled secondary malware, is a signature of the ASPROX => Kuluoz malware. Kuluoz, which is also known as DoFoil, is delivered as the second phase of a malware delivery scheme that begins by having computers that are part of the ASProx botnet sending spam. This is the same campaign that delivered Walmart/BestBuy/CostCo delivery messages around the Christmas holiday, and that delivered Courthouse, Eviction, and Energy bill spam. In the more recent VirusTotal report, AntiVir, DrWeb, and Microsoft label this sample as Kuluoz, while Agnitum, CAT-QuickHeal, Kaspersky, NANO-Antivirus, VBA32, and VIPRE call it DoFoil. Zortob is another popular label seen for this malware, and Symantec calls it "FakeAVLock" while Ikarus and Sophos calls it Weelsof. Weelsof is a Ransomware family and this label, as well as the FakeAV label, are likely due to tertiary malware. When secondary malware "drops" (a term that just means that ADDITIONAL malware is downloaded from the Internet after the initial infection) it is common for AntiVirus vendors to apply the label for the "ultimate intention" to all of the malware samples seen in that particular infection chain. An excellent student paper by Shaked Bar from August 15, 2013, describes Kuluoz's role in dropping additional malware. This diagram is from his paper, Kuluoz: Malware and botnet analysis which was submitted as Mr. Bar's Dissertation for his Masters of Science in Computer Science. Image may be NSFW. Clik here to view. At the time of Shaked Bar's paper, the prominent delivery mechanisms were spam messages imitating UPS and DHL. He also notes an earlier spam campaign from April 2013 imitating American Airlines. Bar's paper is well worth reading as he explains how C&C traffic is XOR'ed with the byte 0x2B to test the ability of the bot to send spam as well as other potential uses. Mr. Bar documents more fully the possible tertiary malware including Zeus (Zbot), ZeroAccess, and FakeAV. The malware uses the commercial geolocation service from MaxMind to identify its location, and the location may be instrumental in determining what additional malware should be installed. Malcovery Security analysts also called attention in our September 19, 2013 report that the WhatsApp spam, when visited from an Android device, detected the OS and dropped a file called "WhatsApp.apk". .apk files are Android's "application package file" which is used to distribute and install Android apps. Examination of the .APK file confirmed thta this was Fake antivirus for your Android phone, containing descriptions of each supposedly detected malware in both English and Russian, as exhibited by this snip from the .APK file: Image may be NSFW. Clik here to view. The URLs used to drop the infection shifted constantly. For example, these are the URLs from September 24th, each using "app.php" instead of "info.php": abslmm.infoeasychurchsoftware.compsmagic.co.ukanimestyles.comeffectivewithpeople.comreggiegallery.comarcesubastas.comeuropainthewilderness.comscholarsbangladesh.comazagom16.comgigp01.comtcfurniture.combluereefwatersports.comkillmanheatingandair.comtrivenidigital.combodfish.netladuenails.comwfbsusa.combptca.comlisapetrilli.comwpsverige.comchester94.comlunchesruslawncare.comwww.jigsawpuzzlesnow.comclaytonhistorysociety.orglyallfamily.comwww.mindful-way.comclearthoughtfarm.commypowerlines.comwww.minimesa.netcolumbialivingmag.comnotedls.comwww.opalubka-spb.rucrumptonplats.comonline-kent.co.ukwww.scholarsbangladesh.comcvhi.caorbitmotion.com And these were the sites for September 25th: 162.144.3.50gonzomarketing.ustejedoresdearte.comaandekleiput.beindianhotpeppers.comtheconservativeactivist.comabslmm.infointerbanc-me.comuhlit.comacademicgames.orgintercom-group.neturokshof.beacomputertech.comjsmengineering.co.nzuwes-futterkiste.deallworldhearing.comkepsballs.comvelomotoban.ruangelomasotti.itmaxmuscleraleigh.comvisibus.ruanimestyles.commiketrig.comwhatshisface.orgarcesubastas.commiwera.dewww.besttechmfg.comasca-info.commosobladvokatura.ruwww.bonnevilledrivingschool.combarkersofwindsor.co.ukneonett.netwww.citadelyachts.combelliottjr.comnight55.comwww.coaching-pattaya.combmitraining.co.idnotedls.comwww.dasluae.combrothermartin.comoysterbaytaxi.comwww.dmdservice.combuntingarchitecturalmetals.compeakkickboxing.comwww.doanevent.comcaseybarnett.compersonalcarephysio.cawww.gestiondutemps.becityofmossyrock.competerscreekauto.netwww.horseamour.comcvhi.caphoto2canvasdirect.comwww.kyhydropower.comdasluae.compts.kovrov.ruwww.mhbchurch.qwestoffice.netdebsownbusiness.comrevoltadvertising.cawww.mtnhwybaptistchurch.comdemaravillamassage.comrsme.co.ukwww.musango.cadnsprattcanada.comscholarsbangladesh.comwww.rhinocerose.frearnquick.coshahmaulik.comwww.wholepersonsoftware.comecuavantransportation.comsolardynamicsinc.comwww.zhelezno.rufinlandiasf.orgsumedacellular.comzhinengqigongworldwide.org WHATSAPP SPAM USED BY CUTWAIL BOTNET TO DELIVER UPATRE => ZEUS MALWARE More recently, the WhatsApp malware has been used by an entirely different spam sending malware team. This group, which favors the Cutwail spam botnet, uses spam messages to deliver a malware family known as UPATRE. UPATRE is a tiny malware file that is repacked constantly to ensure deliverability and that has little malicious behavior itself. The only function of UPATRE is to drop additional malware. In this case, the malware is attached as a .zip file that, when executed by the recipient in order to "play their missed message" will cause Zeus to be downloaded as the secondary malware. Here is what the Cutwail-delivered version of the WhatsApp spam looked like on January 28, 2014: Image may be NSFW. Clik here to view. This version of Upatre connects to the Internet to download an encoded version of GameOver Zeus to allow safe passage through any blocking and detecting methods. This model of downloading an undetectable version that is then decoded into a fully functional Zeus malware by the Upatre module was documented in this blog in our story GameOver Zeus now uses Encryption to bypass Perimeter Security. In the case of the January 28th WhatsApp malware, the Zeus .enc file came from either: zubayen . com / up / wav.enc or from inspireplus . org . uk / images / banners / wav.enc (spaces added for your safety) WHATSAPP SPAM DELIVERING CANADIAN HEALTH & CARE MALL LINKS? As WhatsApp reaches the pinnacle of awareness among American spam recipients, it is only natural that the Pharmaceutical spammers would get in on the game. On February 20, 2014, the spammers sent out "Missed Voice Message" spam with a huge number of random URLs belonging to compromised webservers. Each of the compromised webservers, usually the spammer has harvested Userids and passwords for their FTP credentials in previous malware runs, has a newly created .php or .pl file that contains an encoded redirector to a pharmaceutical website. Image may be NSFW. Clik here to view. On February 20th, the advertised spam all redirected to one of more than fifty compromised webservers, each of which then redirected to a Canada Health & Care Mall websites. The advertised URLs have a simple Javascript obfuscation to try to hide the true destination, such as this page: gjhqv1="\x30";qnnt2="\x68\x74\x74\x70\x3A\x2F\x2F\x74\x68\x65\x64\x69\x65\x74\x70\x68\x61\x72\x6D\x61\x63\x79\x2E\x63\x6F\x6D";setTimeout("\x77\x69\x6E\x64\x6F\x77\x2E\x74\x6F\x70\x2E\x6C\x6F\x63\x61\x74\x69\x6F\x6E\x2E\x68\x72\x65\x66\x3D\x71\x6E\x6E\x74\x32\x3B",gjhqv1); When interpreted as Javascript, the "setTimeout" portion says "make the "window.top.location.href" equal to "gjhqv1". The top portion says "set gjhqv1" equal to thedietpharmacy.com, and do it in "0" milliseconds. Reviewing 50 URLs of this type, with names such as "reactivates.php" or "bombarding.pl" or "gaelicizes.php", there were only the four redirections: canadavasomax.com lossdietpharmacy.com thedietpharmacy.com wellnessasaletraining.com each of which looked like this: Image may be NSFW. Clik here to view. ↧ 2013 FTC CONSUMER SENTINEL REPORT - IDENTITY THEFT BY U.S. CITY February 27, 2014, 9:57 pm ≫ Next: American Express's new Phishing Criminal Brings Game! ≪ Previous: WhatsApp Spam: a malware distribution scam $ 0 0 Each year the Federal Trade Commission publishes a detailed report on the Fraud and Identity Theft complaints they received during the previous year, not just at the FTC, but throughout their Consumer Sentintel Network. Some of the leading members of that network include the Better Business Bureau and the FBI's Internet Crime and Complaint Center (IC3.gov). You can review the entire 2013 Consumer Sentinel Network Data Book on your own if you want to look up more about your state. Just like last year, fraud that began by telephone/telemarketing was the top category, but 33% of all Fraud complaints started with an email! Complaints by category were: 14% - Identity Theft 10% - Debt Collection Fraud 7% - Banks and Lenders 6% - Imposter Scams 6% - Telephone and Mobile Service Scams 4% - Prizes, Sweepstakes and Lottery Scams 4% - Auto-related Fraud 3% - Shop-at-home and Catalog Sales fraud 3% - Television and Electronic Media fraud 2% - Advanced Payment for Credit Services fraud In the Fraud categories, over 1 million complaints were filed including $1.6 billion in fraud, where the median reported amount paid was $400. (Only 61% of those alleging fraud stated a loss amount.) Within the category of Identity Theft, the top categories were: 34% - government documents/benefits fraud 17% - Credit Card Fraud 14% - Phone/Utilities Fraud 8% - Bank Fraud 6% - Employment-related Fraud 4% - Loan Fraud In 2012, there were 369,145 Identity Theft Complaints registered by Consumer Sentinel. In 2013, there were 290,056 Identity Theft Complaints. That's a 21.5% reduction in Identity Theft Complaints! Does this indicate that Identity Theft improved from 2012 to 2013? Or does it indicate that Identity Theft has become so common place that people don't get irate and call the Better Business Bureau or the FTC when it occurs? WIRE TRANSFER TOPS THE FRAUD LOSSES LIST American consumers are just DESPARATE to throw their money away in Wire Transfers. Even though every wire transfer place I've visited in the last two years has big warning signs about the various forms of fraud involving sending your money away in a wire transfer, it continues to be the top way in which fraudsters separate their victims from their money. YEARComplaintsMoney Wired Out2011115,901$438,343,5772012109,138$456,541,4542013104,984$507,713,984 Western Union and MoneyGram both have warning pages to help protect consumers! Follow their advice to not lose the average $4836 that more than 100,000 complained about last year! Western Union has Eight Tips at their Knowledge Center: 1. Never send money to people you haven't met in-person 2. Never send money to pay for taxes or fees on lottery or prize winnings 3. Never use a test question as an additional security measure to protect your transaction 4. Never provide your banking information to people you don't know 5. Never send money in advance to obtain a loan or credit card 6. never send money for an emergency situation without verifying that it's a real emergency. (Gee - like a London Traveler Scam?) 7. Never send funds from a check in your account until it officially clears - which can take weeks 8. Never send a money transfer for an online purchase MoneyGram has a great page called The 11 Most Common Wire Transfer Frauds that include: 1. The Vehicle Purchase Scam 2. The Fake Loan Scam 3. The Lottery or Sweepstakes Scam 4. The Internet Romance Scam 5. The Mystery Shopper Scam 6. The Charity Scam 7. The Relative in Need Scam 8. The Internet Purchase Scam 9. The Newspaper Ads Scam 10. The Check or Money Order Scam 11. The Elder Abuse Scam They even have a nice Dodge the Scams Game to help you get it down pat! GREEN DOT MONEYPAK In the most significant change in fraud payment behavior, this year 28% of fraud losses occurred via Prepaid cards, which was almost exclusively Green Dot Money cards. Two years ago this category of fraud losses didn't even exist! From 2012 to 2013 the number of victims went up 500% and the amount of money lost went up 600%!! YEARComplaintsPrepaid Card Fraud Losses201110$9,054201216,914$6,946,619201384,671$42,858,396 Image may be NSFW. Clik here to view. (image from DotFab.com, click to visit) How much of this fraud was due to the CryptoLocker and PoliceLock Ransomware? We can't be sure, but this is a PROFOUND shift in fraud loss behavior and a great deal of it is certain to be based on those two malware campaigns. We blogged about CryptoLocker using Greendot late in the year in our story Tracking CryptoLocker with Malcovery and IID, but the FBI's Donna Gregory reported on the malware as far back as this August 2012 FBI Ransomware Story where she said "We’re getting inundated with complaints!" referring to the complaints coming in to the FBI's IC3.gov complaint form, which is one source of Consumer Sentinel Data. 2013 - TOP CITIES FOR IDENTITY THEFT Last year, 16 of the top 25 Identity Theft Metropolitan area were in Florida. This year it has fallen to 13. 13 of top 25 in Florida (16 in 2012) 4 of top 25 in California (0 in 2012) 3 of top 25 in Georgia (6 in 2012) 1 each in Alabama, Arkansas, Michigan, Tenessee, and West Virginia RankMetro/Micropolitan AreaPer 100,0001Miami-FortLauderdale-WestPalmBeach, FL340.42Columbus, GA-AL214.73Naples-Immokalee-MarcoIsland, FL2144Jonesboro, AR190.95Tallahassee, FL179.46CapeCoral-FortMyers, FL174.97Atlanta-SandySprings-Roswell, GA170.78PortSt.Lucie, FL163.99Beckley, WV160.910Tampa-St.Petersburg-Clearwater, FL155.511Orlando-Kissimmee-Sanford, FL149.612Detroit-Warren-Dearborn, MI142.913Lakeland-WinterHaven, FL140.214Stockton-Lodi, CA133.115Montgomery, AL132.216Vallejo-Fairfield, CA128.217Jacksonville, FL125.718Memphis, TN-MS-AR125.519Valdosta, GA125.420Ocala, FL12521Gainesville, FL122.622Sebastian-VeroBeach, FL122.423LosAngeles-LongBeach-Anaheim, CA119.124Deltona-DaytonaBeach-OrmondBeach, FL118.925Fresno, CA118.226Albany, GA117.627SanFrancisco-Oakland-Hayward, CA116.828NorthPort-Sarasota-Bradenton, FL116.629Bakersfield, CA116.530Macon, GA116.231Riverside-SanBernardino-Ontario, CA115.232Savannah, GA115.133PuntaGorda, FL11534Dallas-FortWorth-Arlington, TX114.835Crestview-FortWaltonBeach-Destin, FL112.436PalmBay-Melbourne-Titusville, FL111.337Flint, MI109.738Lynchburg, VA108.139Jackson, MS107.440Washington-Arlington-Alexandria, DC-VA-MD-WV106.341HomosassaSprings, FL105.542Niles-BentonHarbor, MI105.243Houston-TheWoodlands-SugarLand, TX104.744Fayetteville, NC102.945Sacramento--Roseville--Arden-Arcade, CA101.346Modesto, CA101.147Phoenix-Mesa-Scottsdale, AZ101.148LasVegas-Henderson-Paradise, NV100.849Chicago-Naperville-Elgin, IL-IN-WI100.450Killeen-Temple, TX99.451Auburn-Opelika, AL98.452NewYork-Newark-JerseyCity, NY-NJ-PA97.753SanJose-Sunnyvale-SantaClara, CA96.454Reno, NV96.155Philadelphia-Camden-Wilmington, PA-NJ-DE-MD95.556Chico, CA95.557Napa, CA94.558Pueblo, CO94.359Baltimore-Columbia-Towson, MD93.460SanDiego-Carlsbad, CA93.461Milwaukee-Waukesha-WestAllis, WI92.862Madera, CA92.863RockyMount, NC92.564Laredo, TX92.365Beaumont-PortArthur, TX9266Denver-Aurora-Lakewood, CO9267Cleveland-Elyria, OH91.768SantaCruz-Watsonville, CA89.669Brownsville-Harlingen, TX89.470Goldsboro, NC88.971Mobile, AL88.672Merced, CA88.473SantaMaria-SantaBarbara, CA88.274AnnArbor, MI88.275Tucson, AZ87.976Augusta-RichmondCounty, GA-SC87.877AtlanticCity-Hammonton, NJ87.478Redding, CA86.979Greenville-Anderson-Mauldin, SC86.680Athens-ClarkeCounty, GA86.281McAllen-Edinburg-Mission, TX85.682CorpusChristi, TX85.583BatonRouge, LA85.484SierraVista-Douglas, AZ85.385Austin-RoundRock, TX85.286Florence, SC85.187Albuquerque, NM8588Boulder, CO84.989Pensacola-FerryPass-Brent, FL84.990ColoradoSprings, CO8491California-LexingtonPark, MD83.792Dalton, GA83.793Hattiesburg, MS83.394SanAntonio-NewBraunfels, TX83.295WarnerRobins, GA8396Oxnard-ThousandOaks-Ventura, CA82.897Trenton, NJ82.798Houma-Thibodaux, LA82.699Dover, DE82.6100St.Louis, MO-IL82.1 ALABAMA IDENTITY THEFT: 2012 COMPARED TO 2013 Forgive me, dear reader, for focusing on my own state just this once . . . In 2012, Alabama's top cities for Identity Theft, and their Per Capita complaints received, were: #15 - Columbus, GA/AL (205.9 per 100,000) #16 - Montgomery, AL (203.7 per 100,000) #42 - Auburn-Opelika, AL (124.1 per 100,000) #62 - Birmingham-Hoover, AL (111 per 100,000) #91 - Enterprise-Ozark, AL (97.8 per 100,000) #97 - Huntsville, AL (95.5 per 100,000) #100 - Mobile, AL (93.5 per 100,000) #118 - Anniston-Oxford, AL (90.2 per 100,000) #125 - Tuscaloosa, AL (88.4 per 100,000) #132 - Dothan, AL (87.2 per 100,000) #145 - Gadsden, AL (84.3 per 100,000) #195 - Decatur, AL (72.8 per 100,000) #198 - Daphne-Fairhope-Foley, AL (72.4 per 100,000) #303 - Florence-Muscle Shoals, AL (56.4 per 100,000) How does that compare to 2013's numbers? The Columbus, Georgia/Alabama Metro area rose 13 places in the national rank to be the second worst city in America for Identity Theft. Montgomery, Alabama had a very slight rise in rank (from #16 to #15), although the number of complaints per capita fell, it is still one of the worst cities in America for Identity Theft. Mobile, Alabama rose in rank by 29 places, moving from #100 to #71. All other cities in Alabama FELL in their national rank for Identity Theft -- but one must ask, as above, is that because crime is declining? or is apathy increasing? Have we become so desensitized to Identity Theft that we no longer feel the need to complain? #2 +13 - Columbus, GA-AL (214.7 per 100,000) = +8.8 per 100,000 #15 +1 - Montgomery, AL (132.2) = -71.5 per 100,000 #51 -9 - Auburn-Opelika, AL (98.4) = -25.7 per 100,000 #71 +29 - Mobile, AL (88.6) = -4.9. per 100,000 #117 -55 - Birmingham-Hoover, AL (77.7) = -33.3 per 100,000 #131 +1 - Dothan, AL (74.8) = -12.4 per 100,000 #152 -55 - Huntsville, AL (68.5) = -27 per 100,000 #167 -42! - Tuscaloosa, AL (65.2) = -23.2 per 100,000 #226 -81! - Gadsden, AL (57.5) #234 -116! - Anniston-Oxford-Jacksonville, AL(56.5) #268 -70! - Daphne-Fairhope-Foley, AL (52.1) #316 -121! - Decatur, AL (44.2) #357 -54! - Florence-MuscleShoals, AL (36.7) - DO YOU KNOW HOW TO FILE AN IDENTITY THEFT, FRAUD, OR PHISHING COMPLAINT? If someone scammed you out of your money or stole your identity, that is a CRIME! What should you do? CALL THE POLICE! But there are some other guidelines as well. The Federal Trade Commission has two web pages that help you understand what to do if you have been the victim of identity theft: FTC: What to do if you have been a victim of Identity Theft FTC: How to file an Identity Theft Complaint with the FTC FTC: March 2-8 is National Consumer Protection Week - tips and videos you can share with your friends are on this site! You STILL want to call your local Police to let them know about the crimes against you. If someone stole YOUR identity or scammed you, they are likely targeting others as well! Besides your local law enforcement, it would be helpful if you could take the time to share what happened to you with the FBI Internet Crime & Complaint Center (ic3.gov). This unique center in West Virginia gathers hundreds of thousands of cybercrime complaints per year into a database that can be accessed by law enforcement across the country. Perhaps you will only be another drop in the bucket, but you MAY provide the missing link that ties many smaller losses together into a major investigation! For PHISHING EMAILS, be sure to report that phish to Malcovery's PhishIQ system! By sending us the address of that suspicious or fake bank website, our automated systems will preserve forensic evidence about the phishing website and work on linking it to other websites that may have been created by the same criminal! APPENDIX: THE REST OF THE LIST (TOP IDENTITY THEFT CITIES BY RANK) 101NewOrleans-Metairie, LA82102Charlotte-Concord-Gastonia, NC-SC81.7103Prescott, AZ81.5104SantaFe, NM81.2105Tyler, TX80.6106VirginiaBeach-Norfolk-NewportNews, VA-NC80.4107Monroe, MI80.3108LittleRock-NorthLittleRock-Conway, AR80.2109Gainesville, GA80.1110Hammond, LA80.1111Bridgeport-Stamford-Norwalk, CT80.1112LakeHavasuCity-Kingman, AZ78.9113Seattle-Tacoma-Bellevue, WA78.4114OklahomaCity, OK77.9115Columbia, SC77.8116Vineland-Bridgeton, NJ77.8117Birmingham-Hoover, AL77.7118ElPaso, TX77.4119Muskegon, MI77.2120NewHaven-Milford, CT77.2121Midland, TX76.9122Burlington, NC76.8123Spokane-SpokaneValley, WA76.7124Odessa, TX76.6125HiltonHeadIsland-Bluffton-Beaufort, SC75.9126Indianapolis-Carmel-Anderson, IN75.3127Yakima, WA75.2128Concord, NH75.1129SanLuisObispo-PasoRobles-ArroyoGrande, CA74.9130Reading, PA74.9131Dothan, AL74.8132Brunswick, GA74.8133Lumberton, NC74.5134Allentown-Bethlehem-Easton, PA-NJ74.3135Wichita, KS74.2136Charleston-NorthCharleston, SC73.7137Richmond, VA73.1138Akron, OH72.4139KansasCity, MO-KS71.9140Racine, WI71.6141Rockford, IL71.5142Scranton--Wilkes-Barre--Hazleton, PA71.5143SantaRosa, CA70.9144Topeka, KS70.6145Dayton, OH70.4146Spartanburg, SC69.9147Salinas, CA69.9148Shreveport-BossierCity, LA69.8149Show Low, AZ69.8150YubaCity, CA69.5151PanamaCity, FL68.8152Huntsville, AL68.5153FortCollins, CO68.4154Raleigh, NC68.4155Portland-Vancouver-Hillsboro, OR-WA68.1156Durham-ChapelHill, NC67.8157Charleston, WV67.4158Greeley, CO66.8159Medford, OR66.4160Yuma, AZ66.4161Gulfport-Biloxi-Pascagoula, MS66.4162Wilmington, NC66.3163Springfield, MA65.8164Columbus, OH65.7165NewBern, NC65.5166Boston-Cambridge-Newton, MA-NH65.4167Tuscaloosa, AL65.2168Flagstaff, AZ64.7169Lawton, OK64.5170Saginaw, MI64.4171Hartford-WestHartford-EastHartford, CT64.4172Minneapolis-St.Paul-Bloomington, MN-WI64.2173Wausau, WI64.1174Duluth, MN-WI64175Amarillo, TX63.9176Olympia-Tumwater, WA63.8177Youngstown-Warren-Boardman, OH-PA63.8178Asheville, NC63.8179Toledo, OH63.8180Bremerton-Silverdale, WA63.7181Kankakee, IL63.5182Chattanooga, TN-GA63.4183Madison, WI63.4184Bend-Redmond, OR63.4185Greensboro-HighPoint, NC63.1186Greenville, NC63187Rochester, NY62.7188MyrtleBeach-Conway-NorthMyrtleBeach, SC-NC62.6189Pittsfield, MA62.5190BattleCreek, MI62.4191Visalia-Porterville, CA62.4192EastStroudsburg, PA62.4193Kingsport-Bristol-Bristol, TN-VA62.3194Winston-Salem, NC62.3195Sherman-Denison, TX62196Nashville-Davidson--Murfreesboro--Franklin, TN61.9197ElCentro, CA61.9198Jacksonville, NC61.9199Alexandria, LA61.7200FortWayne, IN61.3201Kalamazoo-Portage, MI61.2202SouthBend-Mishawaka, IN-MI61.1203Tulsa, OK60.8204Sumter, SC60.5205LasCruces, NM60.2206Ashtabula, OH60.1207York-Hanover, PA60208Albany, OR60209Champaign-Urbana, IL59.9210Cincinnati, OH-KY-IN59.6211BoiseCity, ID59.5212Missoula, MT59.5213Wooster, OH59.4214Dunn, NC59.3215Salisbury, MD-DE59.1216Omaha-CouncilBluffs, NE-IA59.1217Eureka-Arcata-Fortuna, CA58.7218Elizabethtown-FortKnox, KY58.6219Anchorage, AK58.3220Elkhart-Goshen, IN58.2221Jackson, MI58222Hagerstown-Martinsburg, MD-WV58223Pittsburgh, PA58224PineBluff, AR57.9225Providence-Warwick, RI-MA57.8226Gadsden, AL57.5227Lafayette, LA57.4228IowaCity, IA57229BarnstableTown, MA57230Waco, TX57231Springfield, MO56.8232Springfield, IL56.6233Worcester, MA-CT56.6234Anniston-Oxford-Jacksonville, AL56.5235Kingston, NY56.4236CollegeStation-Bryan, TX56.4237Lubbock, TX56.4238Hanford-Corcoran, CA56.2239Cleveland, TN56.1240Monroe, LA56.1241Longview, TX56242SaltLakeCity, UT55.9243Canton-Massillon, OH55.9244Louisville/JeffersonCounty, KY-IN55.8245Lexington-Fayette, KY55.5246Lima, OH55.5247Lansing-EastLansing, MI55.4248Peoria, IL55.1249Decatur, IL55.1250Erie, PA54.9251Clarksville, TN-KY54.9252GrandRapids-Wyoming, MI54.8253Bloomington, IL54.8254Weirton-Steubenville, WV-OH54.6255Kennewick-Richland, WA54.5256Roanoke, VA54.1257Buffalo-Cheektowaga-NiagaraFalls, NY54.1258DesMoines-WestDesMoines, IA54.1259Lebanon, PA53.9260Williamsport, PA53.4261Harrisburg-Carlisle, PA53.3262Bellingham, WA53.2263FortSmith, AR-OK53.1264Norwich-NewLondon, CT52.9265Albany-Schenectady-Troy, NY52.8266Morristown, TN52.7267Winchester, VA-WV52.2268Daphne-Fairhope-Foley, AL52.1269BayCity, MI52270Longview, WA51.8271Salem, OR51.4272Lawrence, KS51.4273Meridian, MS51.2274St.Joseph, MO-KS51275Texarkana, TX-AR50.9276WichitaFalls, TX50.9277London, KY50.6278Ogden-Clearfield, UT50.1279Hickory-Lenoir-Morganton, NC50.1280Billings, MT49.7281Lincoln, NE49.6282Manchester-Nashua, NH49.4283Coeurd'Alene, ID49.1284Charlottesville, VA48.9285MountVernon-Anacortes, WA48.8286JeffersonCity, MO48.7287Jackson, TN48.5288MichiganCity-LaPorte, IN48.4289Syracuse, NY48.3290Chambersburg-Waynesboro, PA48.1291Cookeville, TNMicropolitan48.1292Lafayette-WestLafayette, IN48.1293Janesville-Beloit, WI48294Logan, UT-ID47.8295Evansville, IN-KY47.8296Bluefield, WV-VA47.5297Knoxville, TN47.3298Whitewater-Elkhorn, WI47299Rochester, MN46.9300Torrington, CT46.9301Sheboygan, WI46.8302Claremont-Lebanon, NH-VT46.7303Davenport-Moline-RockIsland, IA-IL46.6304LakeCharles, LA46.6305Lancaster, PA46.6306Pottsville, PAMicropolitan46.5307JohnsonCity, TN46.3308Danville, VA46309Carbondale-Marion, IL45.8310Tupelo, MS45.5311Springfield, OH44.8312Provo-Orem, UT44.8313Roseburg, OR44.6314Joplin, MO44.4315Fayetteville-Springdale-Rogers, AR-MO44.3316Decatur, AL44.2317Abilene, TX44.2318Huntington-Ashland, WV-KY-OH44.1319Morgantown, WV43.9320SiouxCity, IA-NE-SD43.9321Johnstown, PA43.8322CedarRapids, IA43.8323Eugene, OR43.8324GrandJunction, CO43.6325Salem, OH43.6326Mansfield, OH43.4327Blacksburg-Christiansburg-Radford, VA43.2328Jamestown-Dunkirk-Fredonia, NY43329Portland-SouthPortland, ME42.8330IdahoFalls, ID42.8331Kahului-Wailuku-Lahaina, HI42.6332Cumberland, MD-WV42.6333FondduLac, WI42.3334Wheeling, WV-OH41.9335GlensFalls, NY41.9336Wenatchee, WA41.5337Gettysburg, PA41.4338TraverseCity, MI41.2339LaCrosse-Onalaska, WI-MN41.1340SiouxFalls, SD40.7341Columbia, MO40.6342Watertown-FortDrum, NY40.4343SanAngelo, TX40.2344RapidCity, SD40.1345Owensboro, KY40.1346St.George, UT39.1347Binghamton, NY38.9348Tullahoma-Manchester, TN38.9349Bloomington, IN38.9350GreenBay, WI38.9351TerreHaute, IN38.9352UrbanHonolulu, HI38.8353Utica-Rome, NY38.7354Ithaca, NY38.4355Muncie, IN38.2356Burlington-SouthBurlington, VT37.9357Florence-MuscleShoals, AL36.7358EauClaire, WI36.6359Ottawa-Peru, IL36.2360BowlingGreen, KY35.9361Holland, MI35.9362Appleton, WI35.9363Hilo, HI35.7364Lewiston-Auburn, ME34.4365Oshkosh-Neenah, WI33.5366Staunton-Waynesboro, VA32.9367Waterloo-CedarFalls, IA32.8368Ogdensburg-Massena, NY32.2369Fargo, ND-MN32.1370St.Cloud, MN31.7371Bangor, ME31.2372Farmington, NM30.8373Altoona, PA30.7374Harrisonburg, VA29.5375StateCollege, PA29.2376Augusta-Waterville, ME28.7377Bismarck, ND27.9 ↧ ↧ AMERICAN EXPRESS'S NEW PHISHING CRIMINAL BRINGS GAME! March 20, 2014, 9:55 am ≫ Next: The Carder.su indictment: United States v. Kilobit et. al. ≪ Previous: 2013 FTC Consumer Sentinel Report - Identity Theft By U.S. City $ 0 0 Every time I start to think that I've seen everything with regards to phishing the criminals shake things up and get me excited again. Today I have to say the American Express phishers are bringing their A Game to the table again. While there are several different groups of phishers attacking most financial institutions, the criminals behind this particular attack are at least showing some creativity. Let's take a look at the spam message first. We had two primary spam subject lines for this campaign. On March 17, 2014 the Malcovery Spam Data Mine gathered: 468 copies = Subject: Important: Personal Security Key 290 copies = Irregular card activity The messages were BEAUTIFUL! Here's one: Image may be NSFW. Clik here to view. Isn't that gorgeous? Every single link in that email is actually just another copy of the phishing URL. No matter what you click on, the phishing process starts. And what a process it is! Just in the samples that we had at Malcovery Security, we saw 574 distinct URLs on 77 different web hosts! (the full list is available as amex.urls.txt. THE AMEX PHISHING PAYLOAD Why am I writing about this three days later? BECAUSE THE PHISH IS STILL LIVE! Just a few minutes ago, I revisited one URL per webhost and found that 40 of the 77 servers were still delivering payload. What was the payload? Here's a sample from one of those 40 sites: > A small box containing the words "Connecting to server..." appears, but in the > background, the machine is trying to pull content from these scripts (defanged > below): > > > > > (script) src equals http://theblazingfiddles.com/responsive/rhone.js > (script) src equals http://haus-an-der-treene.de/irrigated/bewaring.js > (script) src equals http://qualifyformedi-cal.com/mortician/amicably.js > (script) src equals http://ufofurniture.com.au/curries/searchlights.js -------------------------------------------------------------------------------- But actually between the 40 sites I was able to access this morning (March 20, 2014) there were a total of 38 redirectors! > hxxp: (slash) (slash) nebucom.com (slash) instanced (slash) inconsolable.js > hxxp: (slash) (slash) e-translation.pl (slash) ditty (slash) appetizing.js > hxxp: (slash) (slash) grupovordcab.com (slash) expiration (slash) eddies.js > hxxp: (slash) (slash) user22809.vs.easily.co.uk (slash) healed (slash) pulsation.js > hxxp: (slash) (slash) cescconstructionsupply.com (slash) diminished (slash) somalian.js > hxxp: (slash) (slash) majstri.net (slash) donning (slash) slaved.js > hxxp: (slash) (slash) ohsspiritwear.com (slash) nike (slash) robbing.js > hxxp: (slash) (slash) songingeternally.com (slash) maracaibo (slash) your.js > hxxp: (slash) (slash) 03629e3.netsolhost.com (slash) altaic (slash) scarify.js > hxxp: (slash) (slash) mobifone-sy.com (slash) inflated (slash) minstrels.js > hxxp: (slash) (slash) shashwathomes.com (slash) pleader (slash) socialized.js > hxxp: (slash) (slash) www.netpolis.gr (slash) emulate (slash) loved.js > hxxp: (slash) (slash) theblazingfiddles.com (slash) responsive (slash) rhone.js > hxxp: (slash) (slash) haus-an-der-treene.de (slash) irrigated (slash) bewaring.js > hxxp: (slash) (slash) qualifyformedi-cal.com (slash) mortician (slash) amicably.js > hxxp: (slash) (slash) ufofurniture.com.au (slash) curries (slash) searchlights.js > hxxp: (slash) (slash) amerapremier.com (slash) cesar (slash) viewers.js > hxxp: (slash) (slash) www.deacomunicazione.it (slash) doyen (slash) undermining.js > hxxp: (slash) (slash) orbitek.hosting24.com.au (slash) trespasses (slash) earthly.js > hxxp: (slash) (slash) www.mypafamilylawyer.com (slash) desultory (slash) interrelated.js > hxxp: (slash) (slash) blog.myragold.com (slash) hastening (slash) contemporaries.js > hxxp: (slash) (slash) loveworks365.com (slash) howe (slash) corsets.js > hxxp: (slash) (slash) SNC.NO-IP.ORG (slash) drywalls (slash) liquefy.js > hxxp: (slash) (slash) conseguidomaquinaria.com (slash) hollyhocks (slash) propels.js > hxxp: (slash) (slash) 034ED86.NETSOLHOST.COM (slash) lodestone (slash) shilled.js > hxxp: (slash) (slash) almesa.gr (slash) furious (slash) zygotes.js > hxxp: (slash) (slash) hosted.proaal.com (slash) enchanted (slash) handel.js > hxxp: (slash) (slash) hnuaaa.org (slash) spitfires (slash) winks.js > hxxp: (slash) (slash) www.tstn.org (slash) churchyard (slash) wealthy.js > hxxp: (slash) (slash) filtron.gr (slash) skited (slash) menages.js > hxxp: (slash) (slash) 3914f5c7a46c5f05.lolipop.jp (slash) andre (slash) fastidiously.js > hxxp: (slash) (slash) geeologee.com (slash) bawls (slash) cubbyholes.js > hxxp: (slash) (slash) ghs.boehmenkirch.de (slash) executrix (slash) straps.js > hxxp: (slash) (slash) besttrainer.co.nz (slash) phrasings (slash) vehicle.js > hxxp: (slash) (slash) ftp.fasady-zateplovani.eu (slash) conduces (slash) garrote.js > hxxp: (slash) (slash) sewhot.ca (slash) househusbands (slash) piing.js > hxxp: (slash) (slash) animalspirits-lva.de (slash) instruction (slash) propounds.js > hxxp: (slash) (slash) wildtrackpictures.com (slash) dracula (slash) archenemy.js Each of those actually does a "document location" to forward you to the actual phishing page, which was hosted on five different URLS: hxxp: (slash) (slash) e4business.net (slash) americanexpress (slash) hxxp: (slash) (slash) paitoanderson.com:8080 (slash) americanexpress (slash) hxxp: (slash) (slash) advisorbuysell.com (slash) americanexpress (slash) hxxp: (slash) (slash) advisor-connect.info (slash) americanexpress (slash) hxxp: (slash) (slash) 173.246.103.84 (slash) americanexpress (slash) THE PHISH ITSELF Here's a walk-through of the five page phish. Image may be NSFW. Clik here to view. Image may be NSFW. Clik here to view. Image may be NSFW. Clik here to view. Image may be NSFW. Clik here to view. (Each of those three pages actually had this footer on the bottom! Good to see they included a link to the Fraud page at AmEx!) Image may be NSFW. Clik here to view. When you were finished, you got a friendly thank you . . . letting you know your certificate was all set up . . . Image may be NSFW. Clik here to view. and then got forwarded to the real AmEx page: Image may be NSFW. Clik here to view. ↧ THE CARDER.SU INDICTMENT: UNITED STATES V. KILOBIT ET. AL. April 10, 2014, 11:15 pm ≫ Next: Phishers, Framesets, and Grocery Surveys ≪ Previous: American Express's new Phishing Criminal Brings Game! $ 0 0 Today the U.S. government unsealed its indictment against Fifty-Five members of the Carder.su carding forum. We wrote about Carder.su before on this blog, back in March 2009 when a rival gang was trying to call attention to Carder.su by sending out spam advertising the site. (See: Carders do battle through spam - carder.su. No wonder they were jealous! Today's indictment shows the Carder.su guys performed over $50 Million in fraudulent charges! Named in the indictment were 39 individuals, all charged with "General Allegations" called: Count One (Participate in a Racketeer Influenced Corrupt Organization [RICO]) and Count Two (Conspiracy to Engage in a Racketeer Influenced Corrupt Organization). The whole group are described in the indictment like this: "The defendants herein, and others known and unknown, are members of, employed by, and associates of a criminal organization, hereafter referred to as "the Carder.su organization," whose members engage in acts of identity theft and financial fraud, including, but not limited to, acts involving trafficking in stolen means of identification; trafficking in, production and use of couterfeit identification documents; identity theft; trafficking in, production and use of unauthorized and counterfeit access devices; and bank fraud; and whose members interfere with interstate and foreign commerce through acts of identity theft and financial fraud. Members and associates of the Carder.su organization operate principally in Las Vegas, Nevada, and elsewhere. Here's the list: NAMEAKA ListCounts ChargedRoman ZolotarevAdmin, Support1-2, 19Konstantin LopatinGraf1-2, 33, 44, 47Alexander Kostyukov *Temp, KLBS1-2, 3-17Maceo Boozer IIIXXXSimone, G4, El Padrino, Mr. Right, MRDC871-2, 3-17Tin-Yueng WongRay Wong, Ray1-2, 3-17Edward Montecalvo *N1ghtmare, Tenure441-2, 3-17, 22-55Yu Feng Wang Ibatistuta1-2Mohamed Amr Mahmoud Amr Mahmoud, CC--Trader, Kengza1-2, 20, 22-55Jermaine Smith SirCharlie57, FairBusinessman 1-2, 61-62Makyl Haggerty Wave 1-2Aladelola Teslim Ajayi Bank Manager, Document Manager, Corey 1-2, 61-62Alexandru Ion AbagnaleFrank 1-2Jordan Georgievski Devica 1-2Roman Seleznev Track2, Bulba, NCUX 1-2, 22-55Qasir Mukhtar Caliber 1-2, 56-60Roy Ayad Rabie Ayad, Patistota 1-2, 22-55Mina MorrisSource 1-2, 22-55Rachid Idaali C4rd3r 1-2, 22-55Liridon Musliu Bowl 1-2, 22-55Sergei Litvinenko Dorbik, Matad0r 2Michael Lofton Killit, Lofeazy 1-2, 3-17Shiyang GouCDER 1-2, 3-17David Ray CamezBadman, DoctorSex 1-2, 3-17Cameron Harrison Kilobit1-2, 3-17Aleksandar BesarovicQiller 1-2, 3-17Duvaughn Butler Mackmann 1-2, 21, 61-62Fredrick Thomas 1Stunna 1-2John Doe 1 Senna0711-2, 3-17John Doe 2 Morfiy 1-2, 3-17John Doe 3 Gruber 1-2, 18John Doe 4 Maxxtro 1-2John Doe 5 Elit3 1-2John Doe 6 Fozzy 1-2, 22-55John Doe 7 Vitrum, Lermentov 1-2, 22-55Andrei BolovanPanther, Euphoric, Darkmth 1-2, 22-55John Doe 8 TM 1-2, 22-55John Doe 9 Zo0mer, Deputat 1-2, 22-55John Doe 10 Centurion 1-2, 22-55John Doe 11 Consigliori 1-2, 61-62 While it is true that many carders are Russian, several folks on this list reside in the United States. This case, which DHS ICE calls "Operation: Open Market", has already seen 19 arrested in the United States, primarily in Las Vegas, where LOFTON, CAMEZ, BUTLER, LAMB, and VERGNETTI were arrested. (Some of those arrested are indicted separately and do not appear above. KOSTYUKOV was arrested in Miami from his home at 1100 Washington Avenue, Miami Beach. (He sent a letter to the judge asking for his property back, including his Hookah pipe and his Dr. Dre Beats headphones. KOSTYUKOV, 27, was arrested in Miami, Florida. Boozer, 23, was arrested in Detroit, Michigan. Montecalvo, 20, was arrested in Morgantown, WV. Jermaine Smith, 31, was arrested in Newark, NJ Makyl Haggerty, 22, lived in San Francisco, Qasir Mukhtar, 27, in New York Shiyang Gou, 27, in New York Cameron Harrison, 25, in Augusta, GA Fredrick Thomas, 31, in Orlando, FL Omar Butt, 28, in New York Bill Steffey, 33, in Sacramento, Jason Maclaskey, 32, (at large?) Derek Carder, 38, Sacramento Robert Kephart, 38, Sacramento Heather Dale, 21, Springfield, Orlando Herbert Morrell, 50, Orlando Roger Grodesky, 49, Warren, Ohio John Holsheimer, 53, San Diego David Ray Camez, a Nevada resident, for example, was convicted and was due to be sentenced today. (You may enjoy reading his Forfeiture document which includes ATM machines, PVC Card Embossers, dozens of phones and computers as well as printers, cameras, and video games. Camez was already serving a seven year sentence in the State of Arizona for fraud charges he was convicted of there. Back in 2012, ICE agents announced that they had arrested 19 in the US in an operation called "Operation: Open Market." -------------------------------------------------------------------------------- The full Fifty-one page indictment, originally introduced in court on January 10, 2012, and finally unsealed April 10, 2014, goes on to describe additional charges and activities, sometimes in great detail. The case against "Defendant 24, Cameron Harrison, AKA Kilobit" is being tried in Las Vegas, Nevada as CASE #: 2:12-cr-00004-APG-GWF-24. The event that triggered the unsealing of the indictment was that Cameron Harrison pleaded guilty, WITHOUT BENEFIT OF A PLEA AGREEMENT! His nineteen page guilty plea. In addition to Count One and Count Two above, Cameron plead guilty to: Count Sixteen: Trafficking in and Production of False Identification Documents and Aiding and Abetting, in violation of 18 U.S.C. § 1028(a)(1), (b)(1)(A)(ii), and (c)(3) and 18 U.S.C. § 2. The Sentencing Guidelines that the prosecution is asking for are HUGE because they are describing the "Total amount of actual loss involved in the offense as $50,893,166.35" which gives a +24 to the Sentencing guidelines just for the financial losses! Base Offense Level = 7 + 24 (offense involved more than $50 Million of actual loss) +6 (offense involved more than 250 victims) +2 (offense involved receiving stolen property and the defendant was a person in the business of receiving and selling stolen property) +2 (fraud committed from outside the US, involving a sophisticated means) +2 (fraud involving possession of device-making equipment and trafficking in unauthorized and counterfeit access devices) -3 (Acceptance of Responsibility) Total Offense Level = 40 Restitutions that are declared in the Plea include: American Express = $3,299,210.90 Discover Financial Services = $2,202,429.00 Master Card = $15,496,221.00 Visa Inc. = $29,895,305.45 Total = $50,895,305.45 Because this is a RICO case, EACH member of the Conspiracy can be found responsible for the full restitution. The Indictment requests that each have $20 million of their assets seized to help cover the costs. (Most have nowhere near that amount, of course...). ROLES OF THE DEFENDANTS Despite the news headlines being about Kilobit (Cameron Harrison) today, Harrison was only a "Member" of the board. Far more important members are listed below by their roles on the various Carder.su websites. Administrator = "Roman ZOLOTAREV was the head of Carder.su. As the head of the governing council, the administrator handles day to day management decisions of the organizatoin, as well as long-term strategic planning for its continued viability. Zolotarev was the leader of the enterprise, appointing moderators, and directing other members and associates of the enterprise in carrying out unlawful and other activities in futherance of the conduct of the enterprise's affiars. In addition, ZOLOTAREV: * determines which individuals can become and remain members of the Carder.su organization. * regulates the functions, responsibilities, and levels of access to information accorded to each member. * bestows the rewards accorded members for their loyalty to the Carder.su organization, and sets the punishments to be meted out to members evidencing disloyalty to the organization. * decides when, how, and under what circumstances to attack and to retaliate against members of rival criminal organizations and their associated Internet website forums. * has full access to, and privileges on, the computer servers hosting the Carder.su organization's websites. * has ultimate responsibility for the administration, maintenance, anonymity and security of ther Carder.su organization's computer servers Moderators = Konstantin LOPATIN and MAXXTRO These defendants act as leaders of the enterprise, directing other members and associates in carrying out unlawful and other activities in furtherance of the conduct of the enterprise's affairs. Moderators are members of the Carder.su organization's governing counsel. They oversee and manage one or more subject matter specific areas on the Carder.su organization's websites. Their jobs included assisting Zolotarev by: * monitoring and policing websites by editing and deleting members' posts and mediating disputes among members. * serve as Reviewers for products or services through the enterprise with which they have expertise. * Both LOPATIN and MAXXTRO possessed at least 15 counterfeit or unauthorized access devices. Reviewers Members are allowed to sell contraband, including counterfeit documents, stolen bank accounts, and credit card information. Reviewers examine and test products and services that members wish to advertise and sell on the websites. A favorable review is a prerequisite to to selling contraband. Any member can be appointed to do a review, although they are usually done by Moderators or the Administrator. Vendors Vendors advertise and sell products, services, and other contraband after receiving a favorable review. Vendors among the defendants included: Alexander KOSTYUKOV (Temp/Klbs) - a vendor of Cashout services. Cashout vendors remove funds from bank and credit card accounts and receive a fee between 45% and 62% of the funds received. Maceo BOOZER (XXXSimone / G4 / El Padrino / Mr. Right / mrdc87) is a vendor of dumps. "Dumps" are stolen credit and debit card account data. They sold for between $15 and $150 per card, depending on the quantity purchased and the geographic location. United States cards are least expensive, and European cards are most expensive. Ray WONG is a vendor of counterfeit plastic. A device-making implement used to produce counterfeit credit cards. WONG sold blank counterfeit plastic cards for $20 to $25 each, with a minimum order of 50 cards. Embossed counterfeit cards were $65 to $75 each with a minimum order of ten. Wong was also a vendor of dumps. MONTECALVO (N1ghtmare / Tenure44) is a vendor or dumps, but also offered a dump checking service. He had the ability to validate a card against a real financial institution. Yu Feng WANG (Ibatistuta) is a vendor of counterfeit cards, counterfeit holograms, and signature panels used to manufacture counterfeit credit cards. He sold blanks for $10-$15 each. Mohamed Amr Mahmoud (AMR Mahmoud / CC--Trader / Kengza) is a vendor of CVV. While dumps are magnetic card stripe reads, CVVs are all of the account holder information - such as Name, DOB, SSN, address, telephone number, mother's maiden name, and the CVV2 code from the back of the card. MAHMOUD also sold Paypal accounts, Fullz (all of the above plus expiration date and PIN), and Enroll/COBs. The latter included all of the previous data, as well as username and password for the account's online access. Depending on the online balance, he would charge $140 to $200 per account. Jermaine SMITH (Sircharlie57 / Fairbusinessman) is a vendor of plastic and counterfeit cards. Makyl HAGGERTY (Wave) is a vendor of counterfeit identification documents and counterfeit cards. He sold counterfeit drivers license for between $100 and $200 each, depending on state, including CA, TX, WI, OH, RI, NV, PA, IL, FL, LA, AZ, HA, SC, GA, NJ, as well as BC Canada. He also sold blank counterfeit plastics and embossed cards. Aladelola Teslim AJAYI is a vendor of counterfeit identification documents, stolen corporate account information, dumps, and counterfeit credit cards. ALEXANDRUION (Abagnalefrank) is a vendor of dumps. He sells 100 mixed Visa and Master Card accounts for $1,500 or 100 AmEx cards for $1,000. Jordan GEORGIEVSKI is a vendor of counterfeit credit cards and blank plastic, as well as embossed cards for $75 each. Roman SELEZNEV (Track2 / Bulba / Neux ) is a vendor of dumps. He sold very large volume product through an automated website where members could load their desired cards into a shopping cart. Accounts sold for $20 each. Qasir MUKHTAR (Caliber) is a vendor of counterfeit plastics, holograms, and signature panels. Roy AYAD (Rabie Ayad / Patistota) is a vendor of CVVs, selling through an automated website. Mina MORRIS (Source) is a vendor of dumps. Morris had an automated website to sell dumps. Rachid IDAALI (C4rd3r) is a vendor of Fullz. Liridon MUSLIU (Bowl) is a vendor of CVVs. Sergei Litvinenko (Dorbik / Matad0r ) is a vendor of Bullet Proof Hosting services and infrastructure for criminal websites. These are ISPs that allow criminals to run illegal websites used for phishing, carding forums, or dump sites. GRUBER is a vendor of counterfeit identification documents including drivers licenses ranging from $150 to $200 each. ELIT3 is a vendor of Fullz. He also sells Enroll/COBs. FOZZY is a vendor of dumps ranging from $12 to $100 each, depending on quantity and location. VITRUM (Lermentov) is a vendor of dumps. Andrei BOLOVAN (Panther / Euphoric / Darkmth) is a vendor of dumps. TM is a vendor of dumps and CVVs, which he sells to members through an automated website. Zo0mer (Deputat) is a vendor of stolen PayPal accounts, Proxies, Fullz, Credit Card Checking and Information Lookups. CENTURION is a vendor of dumps. CONSIGLIORI is a vendor of dumps and blank plastic. Members Members must successfully complete a number of security features intended to keep out law enforcement and rival criminal organizations. Teams use a number of Carder.su websites as "virtual clubhouses" to gather with other members in order to share information, solicit and recruit other members and to achieve the common objectives of the enterprise. Members charged in this conspiracy include: Michael LOFTON (Killit / Lofeazy Shiyang GOU (Cder) David Ray CAMEZ (Bad Man / DoctorSex ) Cameron HARRISON (Kilobit) Alexsandar BESAROVIC (Qiller) Duvaughn BUTLER (Mackmann) Fredrick THOMAS (1STunna ) SENNa071 MORFIY -------------------------------------------------------------------------------- THE CHARGES Count One and Two given above deal with Racketeering: COUNT ONE: Acts 1 through 15 - Unlawful Trafficking In and Production of False Identification Documents Acts 16, 17, 19 - Attempt to Unlawfully Produce False Identification Documents Acts 18, 20, 21 - Conspiracy to Unlawfully Produce False Identification Documents Act 22 - Conspiracy to Unlawfully Transfer False Identification Documents Act 23 - Possession of Document-Making Implements Act 24 - Conspiracy to Unlawfully Transfer, Possess, and Use a Means of Identification RACKETEERING ACTS 25 through 36 Acts of Wirefraud by MAXXTRO, MAHMOUD, HARRISON, ELIT3, LOFTON, THOMAS, MAHMOUD, ION, AYAD RACKETEERING ACTS INVOLVING COUNTERFEIT AND UNAUTHORIZED ACCESS DEVICES Act 37 - Using and Trafficking in Unauthorized Access Devices Acts 38 through 97 - Possession of 15 or more Unauthorized Access Devices Acts 98 through 103 - Trafficking In and Possessing Access Device-Making Equipment Acts 104 through 109 - Conspiracy to Trafficking In and Possess Access Device-Making Equipment COUNT TWO Dealing with General Allegations from November 22, 2005 through June 2011. Counts Three Through Seventeen - Trafficking in and Production of False Identification Documents Count Eighteen - Attempting to Unlawfully Produce False Identification Documents, Aiding and Abetting Count Nineteen - Conspiracy to Unlawfully Transfer False Identification Documents Count Twenty - Unlawful Transfer, Possession and Use of a Means of Identification, Aiding and Abetting Count Twenty-One - Trafficking in and Use of Counterfeit and Unauthorized Access Devices, Aiding and Abetting Counts Twenty-Two through Fifty-Five - Possession of Fifteen or More Counterfeit and Unauthorized Access Devices, Aiding and Abetting Counts Fifty-Six through Sixty - Trafficking In and Possessing Access Device-Making Equipment; Aiding and Abetting Counts Sixty-One and Sixty-Two - Conspiracy to Traffick In and Possess Access Device-Making Equipment -------------------------------------------------------------------------------- ↧ PHISHERS, FRAMESETS, AND GROCERY SURVEYS April 11, 2014, 11:35 am ≫ Next: Zeus Criminals charged in Omaha, Nebraska ≪ Previous: The Carder.su indictment: United States v. Kilobit et. al. $ 0 0 Like most criminals, or let's face it, most programmers, Phishers are lazy. They like to be able to create one website and have it live for an extended period of time. Unfortunately for them, victim companies either smash new phishing sites as fast as they can, or they hire companies to do it for them. At Malcovery Security we concentrate on INTELLIGENCE rather than takedown, so our focus is in understanding what the sites can teach us about the criminal behind the attack, and how the many attacks against your brand are related to each other and to attacks against other brands. A friend of ours shared a link to a website today that was imitating Centra, a convenience and grocery chain throughout Ireland. Image may be NSFW. Clik here to view. The accompanying spam message promises that they will pay us 150 Euros just for taking their survey! For the convenience of the consumer, rather than having to wait for a check (cheque) in the mail, you can just enter all of your Credit Card information, and your Date of Birth and some other personal details, and they'll deposit the money right into your credit account! As we looked at the log files, we found an interesting fact. NONE of the more than 900 visitors to the website had visited the site DIRECTLY. They were all being referred from other URLs. This is our indicator that the spam messages did NOT contain a link to the domain shown above. Instead, they were pointing at websites with Chinese domain names! ... [10/Apr/2014:01:06:08 GET /Centra/centra/ http://asp.sti.com.cn/Bonibon/HausSurvey.html [10/Apr/2014:01:07:46 GET /Centra/centra/ http://asp.sti.com.cn/Bonibon/HausSurvey.html [10/Apr/2014:01:07:52 GET /Centra/centra/ http://asp.sti.com.cn/Bonibon/HausSurvey.html [10/Apr/2014:01:08:28 GET /Centra/centra/ http://asp.sti.com.cn/Bonibon/HausSurvey.html [10/Apr/2014:01:08:51 GET /Centra/centra/ http://asp.sti.com.cn/Bonibon/HausSurvey.html [10/Apr/2014:01:09:14 GET /Centra/centra/ http://asp.sti.com.cn/Bonibon/HausSurvey.html [10/Apr/2014:01:09:24 GET /Centra/centra/ http://asp.sti.com.cn/Bonibon/HausSurvey.html [10/Apr/2014:01:09:28 GET /Centra/centra/ http://asp.sti.com.cn/Bonibon/HausSurvey.html [10/Apr/2014:01:09:42 GET /Centra/centra/ http://asp.sti.com.cn/Bonibon/HausSurvey.html [10/Apr/2014:01:09:45 GET /Centra/centra/ http://asp.sti.com.cn/Bonibon/HausSurvey.html [10/Apr/2014:01:09:55 GET /Centra/centra/ http://asp.sti.com.cn/Bonibon/HausSurvey.html [10/Apr/2014:01:10:27 GET /Centra/centra/ http://asp.sti.com.cn/Bonibon/HausSurvey.html [10/Apr/2014:01:10:31 GET /Centra/centra/ http://asp.sti.com.cn/Bonibon/HausSurvey.html ... [11/Apr/2014:00:46:22 GET /Centra/centra/ http://www.jctz.cn/Bonibon/HausSurvey.html [11/Apr/2014:00:58:02 GET /Centra/centra/ http://www.jctz.cn/Bonibon/HausSurvey.html [11/Apr/2014:01:06:46 GET /Centra/centra/ http://www.jctz.cn/Bonibon/HausSurvey.html [11/Apr/2014:01:16:22 GET /Centra/centra/ http://www.jctz.cn/Bonibon/HausSurvey.html [11/Apr/2014:01:18:38 GET /Centra/centra/ http://www.jctz.cn/Bonibon/HausSurvey.html [11/Apr/2014:01:18:48 GET /Centra/centra/ http://www.jctz.cn/Bonibon/HausSurvey.html [11/Apr/2014:01:23:23 GET /Centra/centra/ http://www.jctz.cn/Bonibon/HausSurvey.html [11/Apr/2014:01:25:27 GET /Centra/centra/ http://www.jctz.cn/Bonibon/HausSurvey.html [11/Apr/2014:01:25:49 GET /Centra/centra/ http://www.jctz.cn/Bonibon/HausSurvey.html ... When we look at the websites on "asp.sti.com.cn" and "www.jctz.cn" we see that both of them actually consist ONLY of a "FrameSet" that sends us to the location of the CENTRA phish: Image may be NSFW. Clik here to view. The logs ALSO reveal that another brand is being hosted on the same server! ... [10/Apr/2014:05:19:16 GET /texc/ http://mnks.1039.cn/Bonibon/HausSurvey.html [10/Apr/2014:05:20:03 GET /texc/ http://mnks.1039.cn/Bonibon/HausSurvey.html [10/Apr/2014:05:20:09 GET /texc/ http://mnks.1039.cn/Bonibon/HausSurvey.html [10/Apr/2014:05:28:47 GET /texc/ http://mnks.1039.cn/Bonibon/HausSurvey.html [10/Apr/2014:05:30:31 GET /texc/ http://mnks.1039.cn/Bonibon/HausSurvey.html [10/Apr/2014:05:37:56 GET /texc/ http://mnks.1039.cn/Bonibon/HausSurvey.html [10/Apr/2014:05:48:45 GET /texc/ http://mnks.1039.cn/Bonibon/HausSurvey.html [10/Apr/2014:05:50:27 GET /texc/ http://mnks.1039.cn/Bonibon/HausSurvey.html [10/Apr/2014:05:53:44 GET /texc/ http://mnks.1039.cn/Bonibon/HausSurvey.html [10/Apr/2014:05:57:39 GET /texc/ http://mnks.1039.cn/Bonibon/HausSurvey.html Image may be NSFW. Clik here to view. Since most of the time when I'm in the UK I am running dawn to dusk in meetings, Tesco is the only store I've actually ever shopped in, since there is one on every street corner in London. The phishers have correctly updated their currency to use Pounds instead of Euros: "TESCO Supermarkets will add £150 credit to your account just for taking part in our quick survey." but other than that, this is the same phish! And, as with the other, the actual advertised URL from the spam campaign is hosted in China, and simply updates the content with a Frame SRC = . Image may be NSFW. Clik here to view. Remnants in the logs make it seem likely that this phisher has also targeted Woolworths (many 404 messages in the very early part of the phish for paths with /wps/woolworths/ in the path. Very likely that this is a throw-back to the Woolworths phish from 2012. (Woolworths is a food chain in Australia - they got so many of these scams that they did television news announcements warning about it - see for example: Scam Alert (a Current Affair November 2012). Those spam messages looked like this: > Subject: Customer Satisfaction Survey! Win 150$ > > Congratulations! > > You have been selected by Woolworths Online Department to take part in our > quick and easy reward survey. In return we will credit $150 to your account - > Just for your time! > > Helping us better understand how our members feel, benefits everyone. > > With the information collected we can decide to direct a number of changes to > improve and expand our services. The information you provide us is all > non-sensitive and anonymous. No part of it is handed down to any third party > groups. It will be stored in our secure database for maximum of 3 days while > we process the results of this nationwide survey. > > To access the form, please click on the link below : ↧ Search RSSing.com -------------------------------------------------------------------------------- ZEUS CRIMINALS CHARGED IN OMAHA, NEBRASKA April 12, 2014, 10:10 am ≫ Next: Multi-Brand French Phisher uses EDF Group for ID Theft ≪ Previous: Phishers, Framesets, and Grocery Surveys $ 0 0 Legal documents analayzed below are available at the bottom of this DOJ article: Nine Charged in Conspiracy to Steal Millions of Dollars using Zeus Malware We've talked about Zeus in this blog for many years, including some good arrests, such as Major Zeus Bust in the UK: Nineteen Zbot Thieves Arrested. But we now have names for the ring leaders of the biggest Zeus case of all time, Operation Trident BreACH. We knew the aliases of the Ring Leaders publicly thanks to Microsoft's work back in 2012 (see Microsoft DCU, FS-ISAC and NACHA vs. Zeus) but who were these mystery men: tank and petr0vich? Now we know ... more anyway ... Two Ukrainian members of the Jabber Zeus gang stood in federal court in Omaha, Nebraska last week to plead "Not Guilty" after being extradicted from the UK. Yuriy Konovalenko and Yevhen Kulibaba are among the nine people listed in the indictments that have been sealed since August of 2012. The list of defendents is: * Yvacheslav Igorevich Penchukov, AKA tank, AKA father * Ivan Viktorvich Klepikov, AKA petr0vich, AKA nowhere * Alexey Dmitrievich Bron, AKA thehead * Alexey Tikonov, AKA kusanagi * Yevhen Kulibaba, AKA jonni * Yuriy Konovalenko, AKA jtk0 * John Doe #1, AKA lucky12345 * John Doe #2, AKA aqua * John Doe #3, AKA mricq DOJ is still seeking four of the named criminals, and still has not publicly acknowledged the names of the three John Does. If you have information on these, please reach out to the FBI! Tank == Vyacheslav Igorevich Penchukov, 32, of Ukraine, who allegedly coordinated the exchange of stolen banking credentials and money mules and received alerts once a bank account had been compromised. Petr0vich == Ivan Viktorvich Klepikov, 30, of Ukraine, the alleged systems administrator who handled the technical aspects of the criminal scheme and also received alerts once a bank account had been compromised. TheHead == Alexey Dmitrievich Bron, 26, of Ukraine, the alleged financial manager of the criminal operations who managed the transfer of money through an online money system known as Webmoney. Kusunagi== Alexey Tikonov, of Russia, an alleged coder or developer who assisted the criminal enterprise by developing new codes to compromise banking systems. Although jonni is only now coming to trial in the United States, the Metropolitan Police of London arrested Kulibaba and his wife Karina Kostromina back in October of 2011, as we learned from KrebsOnSecurity in his article ZeuS Trojan Gang Faces Justice. Yuriy Konovalenko, AKA Pavel Klikov, was also in custody in the UK and was "due to be sentenced" according to Krebs' article. Many of the crimes covered in this indictment are well known to us already, largely due to the work of journalist Brian Krebs. While Krebs was still at the Washington Post writing his Security Fix column, he made Zeus a household name. Selected Victims: * Bank of America * Bullitt County Kentucky - Security Fix, Brian Krebs, July 2009. -- Bullitt County had $415,000 stolen from their accounts after being infected by Zeus. * Doll Distributing of Des Moines, Iowa * First Federal Savings Bank of Elizabeth Town, Kentucky * Franciscan Sisters of Chicago, (Homewood, Illinois) * Husker AG, LLC of Plainview, Nebraska * Key Bank of Sylvania, Ohio * ODAT LLC, d/b/a Air Treatment Company * Parago, Inc of Lewisville, TX * Salisbury Bank & Trust of Salisbury, MA * Town of Egremont, Mass * Union Bank and Trust of Lincoln, Nebraska * Union Bankshares of Ruther Glen, VA * United Dairy, Inc of Martins Ferry, OH The version of Zeus at the heart of this investigation communicated stolen credentials to a server located on the IP address 66.199.248.195 at Ezzi.net in Brooklyn, NY. An FBI Agent interviewed Mohammed Salim in September 2009, who confirmed that the server in question, called the Incomeet server, was custom built for a Russian company "IP-Server Ltd" in Moscow, whose POC was "Alexey S." Extensive chat logs were recovered from the server with four separate search warrants - September 28, 2009, December 9, 2009, March 17, 2010, and May 21, 2010. Those web servers showed the criminals discussing their conspiracy, including many instances of the criminals trading login credentials for bank accounts. Those chats also showed that the criminals closely follow Brian Krebs! Tank and Aqua are shown discussing his Bullitt County article linked above and saying "They laid out the entire scheme! I'm really pissed! They exposed the entire deal!" Doll Distributing had $59,222 stolen from them in two occasions. One of those wire transfers went to "Pandora Service, LLC" and to "Kodash Consulting." FBI Agents interviewed Heidi Nelson and Renee Michelli, the proprietors of those organizations who had believed they were acting as "Financial agents" for a Russian software company. In other words, they were money mules. All of the victims named above were discussed in the chat logs by the criminals charged in this case. I especially enjoyed learning how TANK was identified by name. In the chat, on July 22, 2009, he announced that his daughter, Miloslava, had been born and gave her birth weight. A records search of Ukrainian birth records only showed one girl named Miloslava with that birth weight born on that day. Her father was Vyacheslav Igorevich Penchokov. This was enough to seize the computers from Tank's home, which confirmed it was the same person! Petr0vich was discovered because of mentions of the email address "theklutch@gmail.com" in the chat logs. Gmail was subpoenaed to get records for this email account, which showed "92.242.127.198" had been used to log in to that email address at least 790 times. The secondary email for that account, "petr0vich@ua.fm", was given when the account was created November 24, 2004. Several other addresses were used to login to both the petr0vich jabber account on the Incomeet server and the Gmail address, including 209.160.22.135. Similar techniques were then used to find the computers located at those IP addresses. Ivan Viktorovich Klepikov was found to be living in Donetsk, Ukraine. TheHead stated his real name in the chat, and gave his gmail account as "alexey.bron@gmail.com". He was telling the truth. Kusunagi gave a phone number in the chat, and found that phone number on a public webpage where Alexey Tikonov's real name and contact information were given. He lived in Tomsk, Russia. He also used his Kusanagi identity to post videos where WHOIS information related to those videos location confirmed his location. Jonni and Jtk0 were identified by Detective Sergeant Simon Williams of the Metropolitan Police of London. We'll talk more about this case in another post soon . . . ↧ ↧ MULTI-BRAND FRENCH PHISHER USES EDF GROUP FOR ID THEFT April 28, 2014, 7:54 am ≫ Next: Blackshades RAT leads to 97 Arrests in 16 countries ≪ Previous: Zeus Criminals charged in Omaha, Nebraska $ 0 0 At the end of January last year, French power company EDF advised the public that they were seeing a significant rise in the number of phishing complaints they were receiving from their customers. An example story in English from The Connexion: EDF customers hit in 'phishing' scam, says that an EDF spokesperson said beginning in August of 2012 they were seeing 20,000 customers per month complaining about the phish and that in January 2013 it had risen to as many as 40,000 customers per month. As many as 200 to 300 new phishing sites per month were being created at that time. This week Malcovery is noticing that the EDF phish are back, with a twist! The current EDF phish are asking for documents with an enormous value for identity theft and are targeting many different French banks with the information. Here's what a currently live phishing site looks like: Image may be NSFW. Clik here to view. Zooming in on the data being requested, we see typical information. Image may be NSFW. Clik here to view. Email, Password, Title, Name, Address, City, Postal Code, and Date of Birth. While EDF has world-wide operations, a large number of their tens of millions of utility customers are in France. Image may be NSFW. Clik here to view. The email they receive is likely to be the same one seen in France last year that advises: > Votre paîement a été refusée par votre établissement bancaire. […] Pour éviter > la pénalités de retard, nous vous donnant la possibilité de payer en ligne en > utilisant votre carte bancaire. > > (or in English: "Your payment was declined by your bank ... To avoid late > fees, we give you the option to pay online using your credit card. After providing the basic information, they are prompted to choose which bank issued the credit card they will be using to pay their bill: Image may be NSFW. Clik here to view. Choices are: Axa Banque Banque populaire BNP Bred Caisse d’epargne Credit agricole Credit mutual Credit du nord CIC HSBC Societe generale La banque postale LCL Autres and then enter their Credit Card information: Image may be NSFW. Clik here to view. The most interesting part of the phish, however, is what comes next! The Phishers then tell them that in order to prove they are really in charge of this account, they must upload at least two forms of proof of identity! Image may be NSFW. Clik here to view. * Identity Card * Credit Card * A copy of a Bank statement * An invoice proving the address Whichever documents I attempted to upload, it kept insisting that I needed to upload additional documents. Although this case is most accurately described as an EDF phish, there are actually thirteen targeted banks, and an unlimited number of forms of identity theft that could occur if some victim were to provide all of the requested information. Just another example of how the phishers use FEAR (an unpaid Utility bill that could result in Termination of Service) to steal our credit card information! ↧ BLACKSHADES RAT LEADS TO 97 ARRESTS IN 16 COUNTRIES May 22, 2014, 4:34 am ≫ Next: A Social Facebook Phish - is your friend acting strange? ≪ Previous: Multi-Brand French Phisher uses EDF Group for ID Theft $ 0 0 On May 19, 2014, the FBI announced a worldwide coordinated action against criminals who created, sold, and used a Remote Administration Trojan (RAT) known as BlackShades. In the FBI's BlackShades Press Release they shared that 40 participating FBI Field Offices had conducted 100 interviews, executed more than 100 e-mail and physical search warrants and seized more than 1,900 domains used by BlackShades to control victims' computers. Image may be NSFW. Clik here to view. (image from FBI.gov) The case actually was a spin-off from another major international operation called "Operation Card Shop" that we wrote about in April 2012 (see SOCA & FBI seize 36 Criminal Credit Card Stores. As Law Enforcement reviewed the seized websites from that case, they began to realize the extent of the role of the BlackShades RAT in the theft of credit card information, but realized also that it was much larger than they had at first believed. One of those arrested during Operation Card Shop was Michael Hogue, one of the co-authors of Blackshades, who agreed to cooperate in unveiling the rest of the BlackShades operation. BLACKSHADES AND MISS TEEN USA For many Americans, the first time they heard of Blackshades was in the case of Miss Teen USA 2013, Cassidy Wolf. In that case, Blackshades customer Jared James Abrahams, a 20-year-old college student, used Blackshades to begin capturing video from Cassidy's webcam. The victim, unaware that their webcam is even recording, goes about their business, including dressing and undressing. Like most teens, having a laptop on in the bedroom is not unusual, and after capturing some nude images, Abrahams attempted to extort additional videos in exchange for not releasing the first images to Cassidy's friends on Facebook. But Blackshades is able to do so much more than capturing an occasional nude image! While most commonly used for good old fashioned credential and credit card theft, Blackshades has also been used to infiltrate Syrian rebel computers, as first reported by the EFF and with many more details shared by MalwareBytes. BLACKSHADES COCREATORS HOGUE AND YÜCEL Michael Hogue, who used the hacker name xVisceral, was originally arrested in Tucson, Arizona as part of a group of arrests announced by Preet Bharara, the US Attorney in the Southern District of New York, on June 26, 2012 as part of the follow-up to Card Shop. In addition to xVisceral/Hogue that sweep grabbed up 404myth (Christian Cangeopol of Lawrencevill, Georgia), Cubby (Mark Caparelli of San Diego, California), Kabraxis314 (Sean Harper of Albuquerque, New Mexico), kool+kake (Alex Hatala of Jacksonville, Florida), OxideDox (Joshua Hicks of Bronx, New York), JoshTheGod (Mir Islam of Manhattan, new York), IwearaMAGNUM (Peter Ketchum of Pittsfield, Massachusetts), theboner1 (Steven Hansen, who was already in jail in Wisconsin) as well as 13 others in the UK (6), Bosnia (2), Bulgaria (1), Norway (1), and Germany. (See: Manhattan U.S. Attorney and FBI Assistant Director in Charge Announce 24 Arrests in Eight Countries as Part of International Cyber Crime Takedown). For a fascinating "how I became a hacker" biography interview, please see The Rise and Fall of xVisceral which details how as a 17 year old Halo player, xVisceral first was introduced to hacking as a way to cheat other Halo players, and a detailed history of how this led to ever-more-advanced hacking tools and ultimately the creation of Blackshades. (the original source is currently unavailable, this is an archived copy of an article from: The Charges against Hogue (filed January 9, 2013) say that "Michael Hogue a/k/a xVisceral, the defendant, and others known and unknown, willfully and knowingly combined, conspired, confederated, and agreed together and with each other to engage in computer hacking in violation of Title 18, USC, Section 1030(a)(5)(A)." It was part of the conspiracy that Hogue and others "did cause the transmission of a program, information, code and command, and as a result of such conduct, wouuld and did intentionally cause damage without authorization, to a protected computer, which would and did cause damage affecting 10 and more protected computers during a one-year period, in violation of Title 18, USC Sections 1030(a)(5)(A), 1030(c)(4)(B)(i), and (c)(4)(A)(i)(VI), to wit, HOGUES used malware to infect computers and sold that malware to others, enabling them to infect and remotely control victims' computers." Like most RATs, once a victim has been tricked into clicking on the installer, the RAT is controlled by connecting to a server used for that purpose. The FBI was able to learn considerably more about the person being described as the "co-creator" of BlackShades, Alex YÜCEL, (also spelled Alex Yucel, Alex Yucle, Alex Yuecel), AKA marjinz, AKA Victor Soltan, by tracking one of his servers. As they investigated the various domains used to host the servers for the malware. In one case, Alex contacted a company to lease certain computers for this purpose (November 8, 2012) paying for them on January 30, 2013. On March 18, 2013, he sent email requesting tech support due to a problem with his servers. Alex was the administrator of "www.blackshades.ru" and "www.bshades.eu". Alex is a 24 year old citizen of Sweden, arrested in Moldova and awaiting extradition to the United States. Symantec actually has an interesting screenshot from 2011 where Hogue claims to be resigning from Blackshades and turning full control over to "marjinz" in a post shared in their article from June 2012 when Hogue was first arrested. The fact that so many "script kiddie" hackers use Hack Forum may be part of why Blackshades was so popular: Image may be NSFW. Clik here to view. (Source: www.symantec.com/connect/blogs/w32shadesrat-blackshades-author-arrested ) A SAMPLE CUSTOMER: KBELLO A look at the Criminal Complaint against one of his customers may be revealing. Kyle Fedorek (aka kbello) was charged May 15, 2014 in the Southern District of New York. On Septmeber 12, 2012, kbello purchased a copy of Blackshades over the Internet. An undercover FBI agent in New York had also purchased the software on June 30, 2010 from the same source. The FBI used this criminal complaint to document the scope and abilities of Blackshades. Between September 12, 2012 and March 2014, kbello acquired "thousands" of credit card numbers and financial account numbers through hacking using the RAT. According the the Criminal Complaint the FBI agent described Blackshades as giving the hacker "Free rein to, among other things, access and view documents, photographs and other files on the victim's computer, record all of the keystrokes entered on the victim's keyboard, steal the passwords to the victim's online accounts, and even activate the victim's web camera to spy on the victim -- all of which could be done without the victim's knowledge." The FBI's investigation has shown that the RAT was purchased by at least several thousand users in more than 100 countries and used to infect more than half a million computers worldwide. After kbello purchased his copy of the RAT, it was used against at least 400 victims, and was also part of a suite of additional malware that he installed on the victims' computers. After a victim was infected, the hacker could activate the "Spreader" module on that victim's computer, which would use that victim's chat programs (AOL/AIM, ICQ, MSN) and any USB devices attached to the computer to attempt to infect others. Other modules of the program allowed the hacker to encrypt any files on the system and share a Ransomware message, demanding that payment be sent to decrypt the module. The message could be customized per victim, or the same message could be sent to many victims. Many other modules were available, including password stealers, webcam capture tools, DDOS attack tools, and others. Records from the primary Blackshades server indicate that the program, which often sold for as little as $40 per copy, had generated $350,000 in direct sales between September 2010 and April 2014. When a purchase was made, the purchasing hacker would establish a domain name that he or she would use as their main "controlling" domain. A custom version of the software was then generated which would only take infected users to that domain. The logs on the server indicate there were at least 6,000 Blackshades customer accounts for users in 100 countries, and that at least 1900 domain names had been registered by customers to control infected computers. All 1900 of these domains have been seized by the FBI, disabling the RAT from controlling the infected computers any more. In February 2013, the FBI obtained a warrant to search the email account "blackshadessupport@hotmail.com" - which Yucel used to communicate with his employees who were offering technical support and administering his various infrastructure. The search revealed many email communications requesting customer support and also contained copies of receipts sent to customers for various products and services offered by the Blackshades organization. This search warrant revealed a home address in Stony Point, New York for Kyle Fedorek when he purchased "Blackshades Remote Controller (R.A.T.) for 40.00 USD". The seized Blackshades Server also provided the information that KBello had registered the hostnames "kbella.zapto.org" and "kbello.zapto.org" as his controllers. The IP address to which these names resolved in April and May of 2013 were subscribed to at the Fedorek Residence. In a subsequent search warrant, executed March 6, 2014, agents seized a laptop from the bedroom of Kyle Fedorek, where the username of the laptop was Kyle, and recovered a copy of the Blackshades RAT. The RAT was configured to run the "Form Grabber" (stealing any information victims typed into a webform, such as a userid and password prompt box on a banking website). At least 400 victims had provided information unwittingly to Fedorek through this form grabber. The laptop also was being used to run other malware schemes, including CARBERP, Andromeda, and Citadel, and had evidence of having been used to create Phishing sites as well. DDOS tools, SQL Injection tools were also present. More than 9,000 sets of userids and passwords and 50,000 sets of credit card information were found on the laptop. THE UK'S NATIONAL CRIME AGENCY The UK's National Crime Agency (NCA, formerly SOCA), issued their own press release. (See Unprecedented UK Operation aids global strike against Blackshades malware) indicating that 17 Blackshades customers were apprehended in the UK and that their records suggested that at least 200,000 worldwide victims had their information harvested by Blackshades customers in the UK. EUROJUST The European Union's Judicial Cooperation Unit in The Hague also issued a press release. (See International operation hits Blackshades users.) They indicated that at least 359 "house searches" were carried out worldwide and that 97 people had been arrested. 1100 data storage devices had been seized in those searches, including computers, mobile phones, external hard drives, and USB memory sticks, in addition to "substantial quantities" of cash, illegal firearms, and drugs. DUTCH HIGH TECH CRIME TEAM The Dutch High Tech Crime Team was able to secure a server in Delft operated by an 18 year old Black Shades customer. One of their most high-profile Blackshades customers was a 19 year old man who was controlling more than 2,000 webcams being used to capture photos and videos of female victims. The Dutch police seized 96 computers and laptops, 18 mobile phones, and 87 USB sticks and hard drives during searches on 34 residences. (See: 34 Dutch homes raided in worldwide crackdown on hacking software. Dutch High Tech Crimes statement - www.om.nl/actueel/nieuwsberichten/@162701/wereldwijde-actie/ ↧ A SOCIAL FACEBOOK PHISH - IS YOUR FRIEND ACTING STRANGE? May 29, 2014, 6:53 pm ≫ Next: Is the Game Over for GameOver Zeus? ≪ Previous: Blackshades RAT leads to 97 Arrests in 16 countries $ 0 0 I'm always proud when my students do a great write up on a new attack, and doubly so when that analysis comes from my nephew, Chris Warner! Chris was logged in to Facebook today when one of his friends started chatting with him. It was pretty obvious to Chris that his friend had been the victim of an Account Takeover (ATO) and thta he was really chatting with a criminal who was inviting him to visit a Facebook phishing site. Chris gathered up an evidence package and submitted it to IC3.gov with his analysis prior to contacting me. With his permission, I'm sharing what he saw (editing his friend's identity out for her privacy.) Image may be NSFW. Clik here to view. Original URL user sees is of the format: http://(USER FIRST NAME)-photos.uglyfacebookpeople,commm URL is intentionally messed up, presumably to avoid detection by Facebook systems. URL redirects to http://accounts.login.userid.266765.facebooclk.com/lp/fbn/?next=http%3A%2F%2F%2videos%2F%3AJ%4ID%1A Image may be NSFW. Clik here to view. Action file is security.php Following the action file results in visiting accounts.login.userid.497031.facebooclk.com/blam/ Which directs you to a "Flash Player Update" site that I assume is a virus. http://198.52.200.49/install_flashplayer13x32_mssd_aaa_aih.ex There are other files that were on the site, but it is down now. WHOIS INFO(SAME FOR FACEBOOCLK.COM AND UGLYFACEBOOKPEOPLE.COM): Registrar Abuse Contact Phone: +1-2013775952 Domain Status: clientTransferProhibited Registry Registrant ID: DI_36635864 Registrant Name: Dave Brider Registrant Organization: none Registrant Street: 505 45th st Registrant City: new york Registrant State/Province: New York Registrant Postal Code: 10003 Registrant Country: US Registrant Phone: +1.6463392283 Registrant Email: yogurtman7@mail.com Registry Admin ID: DI_36635864 Admin Name: Dave Brider Admin Organization: none Admin Street: 505 45th st Admin City: new york Admin State/Province: New York Admin Postal Code: 10003 Admin Country: US Admin Phone: +1.6463392283 Admin Email: yogurtman7@mail.com Happy hunting! --Chris Warner -------------------------------------------------------------------------------- Thanks, Chris! You did a great job on that write-up! Hope it helps save someone from being a victim!! ↧ IS THE GAME OVER FOR GAMEOVER ZEUS? June 2, 2014, 9:44 pm ≫ Next: Malcovery Examines GameOver Zeus ≪ Previous: A Social Facebook Phish - is your friend acting strange? $ 0 0 Several weeks ago law enforcement friends in Pittsburgh started asking people not to publish anything too public about GameOver Zeus. When we asked why, we got a teasing "You'll see!" Now our ISP friends that were participating in the effort are grinning ear to ear as we may actually have a chance to disrupt Zeus in a meaningful way. Being a legal geek, I was excited to have the documents published on the main Justice website today at www.justice.gov/opa/gameover-zeus.html. The Complaint against Evgeniy Mikhailovich Bogachev aka Slavik, aka Pollingsoon was unsealed in court where the Pittsburgh FBI led the investigation into CryptoLocker and GameOver Zeus. In addition to Bogachev, charges are filed against several aliases of as-yet-unidentified hackers, "Temp Special", "Ded", Chingiz (aka Chingiz 911), and Mr.KyKyPyKy. The Complaint charges that "Together, GOZ and Cryptolocker have infected hundreds of thousands of computers around the world and have generated losses that exceed $100 million." Some of the specific cases mentioned in the complaint include: * A composite materials company in the Western District of Pennsylvania which lost more than $198,000 from its bank account using credentials stolen by the Defendants through the use of GOZ; (The Pittsburgh Indictment shares more details, telling us this was Haysite Reinforced Plastics, whose PNC Bank account was fraudulently accessed and used to send their money to a Mule account in the name of Lynch Enterprises, LLC, at SunTrust Bank in Atlanta, Georgia, after they clicked on a NACHA email informing them their ACH payment had failed, in October 2011. They also transfered $175,756.91 to an account belonging to R&R Jewelers, and ATTEMPTED six additional transfers, all on October 20, 2011. The money in the SunTrust account was quickly moved on ($99,822 of it, anyway) to an HSBC account in London.) * An Indian tribe in Washington - $277,000 * A corporation managing assisted living facilities in Pennsylvania - $190,800 * A regional bank in Northern Florida - $7 Million CryptoLocker is described separately as having "first emerged in mid-to-late 2013" and infected "more than 230,000 computers, including more than $120,000 in the United States. Just between October 15, 2013 and December 18, 2013, we know that $27 million in ransom payments were made, just by tracking the ransom payments made using Bitcoin! The charges in the criminal complaint are: Count I: Wire fraud: 18 USC Section 1343 "Having devised a scheme or artifice to defraud and for obtaining money by means of false or fraudulent pretenses and transmitting and causing to be transmitted by means of wire communications in interstate and foreign commerce, writings, signs, and signals for the purpose of executing such scheme or artifice. Count II: Bank Fraud: 18 USC Section 1344 "knowingly executing a scheme or artifice to defraud financial institutions insured by the FDIC and to obtain moneys under the custody and control of these institutions by means of false and fraudulent pretenses and representations. Count III: Unauthorized interception of electronic communications: 18 USC Section 2511 "intentionally intercepting electronic communications, and intentionally using and endeavoring to use the contents of the electronic communications knowing that the information is obtained through the unauthorized interception of electronic communications." all of which, according to 18 USC Section 1345(a) and (b) allows Injunctive Relief to prevent a continuing and substantial injury to the owners and legitimate users of the infected computers. An FBI Pittsburgh cyber agent was the affiant in the 28 page Application for Temporary Restraining Order recounts that while the largest known single wire transfer was a $6.9 million wire, fraudulent wires in the amount of $1 million dollars were "very common." A single bank experienced 11 fraudulent wires, with six being for more than $950,000 and the largest being 2 million dollars! The GOZ affidavit mentions a few email addresses, Bogachev uses as one email address, bollinger.evgeniy@yandex.ru, while Chingiz 911 uses charajiang16@gmail.com. Seeing the nickname "Ded" as one of the members of the gang, I can't help but recall "Ded Pixto" the nickname for Stanislav Avdeiko the Koobface malware author. So how will this "takedown" actually work? First, some hard work by a couple genius malware reverse engineers at Dell Secure Works and CrowdStrike helped the Pittsburgh FBI agent to understand the current Command & Control infrastructure so it could be rendered harmless. The problem though, is that both GOZ and Cryptolocker have a built-in backup plan in the form of a Domain Generation Algorithm. The job of a DGA is to allow the botmaster to IN THE FUTURE reconnect to his bots using infrastructure that neither the bots nor the botmaster have even created yet. A formula is used to calculate a domain name based on a timestamp. So, if NONE of the hard-coded IP addresses are able to be reached, the bot will look up the current date and begin "guessing" domains that the criminal may have registered for use to update the bot with new hard-coded addresses. As a few examples, on July 1, 2014, CryptoLocker will try to connect to 1,000 domains, including: wncbbejfurrw.net kbdnkmpgxlxh.biz aevmpupnouqy.ru nrwyydvorowj.org bvgurlkgcwya.co.uk ojhhbtqhfqfk.info eqcoayuicfrp.com fsdnbhyofoiv.net fimwcppbphaq.biz gknvdxthsqqw.ru iygiqgvjjkys.org jbhhroapmtpy.co.uk jqqqswqcwmht.info ksrptfuiavxa.com klrmfgyihrch.net xysyolodvgen.biz mgcjywthscyu.ru atdvicjchqbb.org otvgvnajowjk.co.uk The Temporary Restraining Order (TRO) seeks an Order that: 1) directs four U.S. based internet domain Registries to block access to around 900 PAGES of domain names seemingly the "future" list of DGA-generated domain names for CryptoLocker and GOZ. The GameOver Zeus domains are listed in Appendix A while the CryptoLocker domains are listed in Appendix B. Because ICANN only has jurisdiction over the Generic TLDs, this approach doesn't work for the ".ru" domains. CryptoLocker also uses ".co.uk" domains, so one would hope that the British government has asked for a similar favor from their counterpart registries. The four Registries in the US were, VeriSign, Inc., representing .com and .net, Neustar, Inc., representing .biz, Affilias USA, Inc., representing .info, and Public Interest Registry, representing .org. Appendix A actually contains 25,937 domains for Game Over Zeus, arranged in ten columns, with three columns of domains listed on pages 1-69, 70-138, 139-207, and then a single column on pages 208 to 276. Its actually seven columns of 2594 domains and three columns of 2593 domains or 25,937 domains for Game Over Zeus. Appendix B has six columns on pp. 1-176, pp.177-352, and then six columns of various length from 353 to the end of the 704 page document, for a total of 130,421 domains for CryptoLocker. Affilias, Neustar, Verisign, and Public Interest Registry are ordered to redirect all of those 156,000 or so domains to use the nameservers ns1.kratosdns.net and ns2.kratosdns.net, preventing the criminals from using those domains to re-establish control of their botnet. 2) directs the twenty largest ISPs in America to not allow access from their networks to the .RU domains that the DGA can make, as the .RU domains are not under ICANN control. The ISPs named here are: Cablevision, AT&T, Cox, Comcast, Mediacom, AOL, Frontier, Sprint, Time Warner Cable, Verizon, Charter, CenturyLink, Suddenlink, Wide Open West, Windstream, Level 3, Armstrong Group of Companies, Bright House, Earthlink, and NTT America. Those ISPs are forbidden to allow traffic to the .ru domains listed in Appendix C. 3) To redirect all traffic intended for one of those domains to .gov controlled servers and 4) to seek a Pen Register/Trap and Trace Order that would gather information about the nodes directed to those replacement boxes, and to share that information back to the ISPs and victims to help protect themselves. This "Dialing, Routing, Addressing, and Signaling" data (called DRAS in telephone-legalese) is to be turned over to the government so that attempts can be made to clean up these victims computers. In cooperation with these efforts, McAfee is providing their "Stinger" program to be used by any victims to clean and remove GameOver Zeus or CryptoLocker infections. All of that is now in play ... it is too early to tell if the game is really over, but best of luck and congratulations to the fine agents and CCIPS lawyers who made this possible! ↧ ↧ MALCOVERY EXAMINES GAMEOVER ZEUS June 5, 2014, 11:32 am ≫ Next: Microsoft, njRat, and No-IP ≪ Previous: Is the Game Over for GameOver Zeus? $ 0 0 WHAT IS THIS GRAPHIC ABOUT? READ ON, GENTLE READER! Image may be NSFW. Clik here to view. MALCOVERY: EMAIL BASED THREAT INTELLIGENCE AND GAMEOVER ZEUS At Malcovery Security we have become EXTREMELY familiar with GameOver Zeus. Our malware analysts create multiple reports each day documenting the top Email-based threats, and as the FBI's news releases (covered earlier this week in this blog, see Is it GameOver for GameOver Zeus? document, the criminals behind GameOver Zeus have been devastatingly thorough in compromising computers. Unlike some sandboxes, when Malcovery reports on a piece of malware, we actually report on "the activity that would result on a computer compromised by this malware" in a holistic view that we call Contextual Analysis. The goal of Malware Contextual Analysis is to help answer questions like: * How would one of my users likely be infected by this malware? * What email subjects or messages may have sent this malware? * Did that spam campaign deliver other malicious attachment or malicious URLs? * If one of my users were compromised by this malware, what network activity may result? * What additional malicious files might be downloaded by a computer compromised with this malware? * . . . and other questions, depending on the nature of the malware Malcovery's main Malware Threat Intelligence analyst, Brendan Griffin, has shared a special report called The Many Faces of GameOver Zeus that examines many of the ways the malware has been delivered via spam campaigns. In this blog post, I'll be focusing on the Prominent IP addresses associated with the "Encrypted Drop" version of GameOver Zeus distribution. GAMEOVER ZEUS'S ENCRYPTED DROP SITES Back in February, Malcovery reported that GameOver Zeus was being prominently loaded by means of UPATRE malware downloading an Encrypted file from the Internet, and then executing that file. (See our post: GameOver Zeus Now Uses Encryption to Bypass Perimeter Security) With GameOver Zeus possibly taking a significant hit due to the coordinated law enforcement and researcher efforts, I wanted to look at the network infrastructure that we have been warning about in our T3 reports, and just illustrate how the T3 reports can be used to alert you to activity not just from the current day's malware, but for malware that touches any part of the extensive shared infrastructure of GameOver Zeus. Since that initial post, we've seen GameOver Zeus-related encrypted files drop from more than 200 different internet locations, get decrypted by the Dropper malware, and execute themselves to begin communicating with the Peer to Peer GameOver Zeus infrastructure. The full list of many of those URLs, with the date on which we saw the spam campaign, the brand, item or company being imitated in that spam campaign, and the URLs where the GOZ binary were accessed, is available at the end of this article. Here is a sampling of some of the most recent ones for now to help understand the process... 2014-05-13 Xerox url::moraza.com.my/images/1305UKdp.zip 2014-05-13 NatWest url::luxesydiseno.com/images/powerslide/Concha/1305UKdw.zip 2014-05-14 Microsoft url::elpenterprisesinc.com/wp-content/uploads/2014/05/1405UKdw.enc 2014-05-14 Sage url::ballroom-intergalactica.com/wp-content/themes/twentythirteen/css/1405UKdp.enc 2014-05-14 Intuit url::mindinstitute.ro/Web3/Upload/Targ-rhc1405.dat 2014-05-14 NatWest url::jessicahann.co.uk/wp-content/uploads/2013/13/1405UKmp.enc 2014-05-14 ADP url::mindinstitute.ro/Web3/Upload/Targ-rhc1405.dat 2014-05-15 eFax url::factoryrush.com/test/1505UKmp.zip 2014-05-15 UK Ministry of Justice url::sugarlandrx.com/media/css/1505UKdp.zip 2014-05-15 eFax url::dubaimovers.info/scripts/Targ-1505USdp.tar 2014-05-15 Fidelity url::www.entrepreneurindia.com/css/Targ-1505USdp.tar 2014-05-15 Dun & Bradstreet url::dubaimovers.info/scripts/Targ-1505USdp.tar 2014-05-16 Bank of America url::kuukaarr01.com/wp-content/uploads/2014/05/Targ-1605USdp.tar 2014-05-19 Santander url::paperonotel.com/Scripts/heap170id2.exe 2014-05-19 Wells Fargo url::mersinprefabrik.com/Css/1905USmw.dct 2014-05-20 HSBC url::task-team.com/css/2005UKmw.zip 2014-05-20 NYC Govt url::lospomos.org/images/button/2005USmw.zip 2014-05-20 UPS url::alamx.com/images/RCH2005.zip 2014-05-20 UPS url::evedbonline.com/images/RCH2005.zip 2014-05-20 Royal Bank of Scotland url::lospomos.org/images/button/2005UKmw.zip 2014-05-20 LexisNexis url::evedbonline.com/images/RCH2005.zip 2014-05-21 Credit Agricole url::eleanormcm.com/css/2105UKdp.rar 2014-05-21 HSBC url::cedargrill.sg/css/2105UKdw.rar 2014-05-21 HSBC url::chezalexye.com/css/2105UKdw.rar 2014-05-21 JP Morgan url::footballmerch.com/media/css/Targ-2105USmw.tar 2014-05-27 Hewlett-Packard url::lotwatch.net/images/2705UKdp.rar 2014-05-27 Xerox url::auracinematics.com/acc/b02.exe 2014-05-29 Visa url::qadindunyasi.az/images/Targ-2905USmp.tar 2014-05-30 Sky url::3dparsian.com/images/banners/3005UKdp.rar 2014-05-30 HSBC url::bag-t.com/css/3005UKmw.rar 2014-05-30 HSBC url::seminarserver.com/html/3005UKmw.rar For each of the campaigns above, Brendan, Wayne, and J, our malware analysis team, pushed out both an XML and STIX version of the machine readable T3 reports so that our customers could update themselves with information about the spam campaign, the IP addresses that sent that spam to us, the hashes of the spam attachment, the hostile URLs, and the IP addresses associated not only with the GameOver Zeus traffic, but whatever other malware was dropped in the same campaign. As the FBI indicated, it was extremely common for GameOver Zeus infected computers to ALSO become infected with CryptoLocker. T3: PROTECTION FOR TODAY AND TOMORROW But how often did we see "re-use" of network infrastructure? We like to say that Malcovery's T3 report, which stands for Today's Top Threat, is really "T3: Protection for Today and Tomorrow". To illustrate this, I did some data mining in Malcovery's Threat Intelligence database. First - I isolated network activity for the 92 distinct spam campaigns illustrated above. (There were many more GameOver Zeus campaigns than that, but I was sticking to those samples that used the "encrypted file decrypted by the dropper" version that I had written about in February, so this is a sampling ...) For each IP address that showed up in network traffic within those 92 campaigns, ranging from February 6, 2014 to May 30, 2014, I counted how many distinct campaigns that indicator had been seen in. Fifty-six IP addresses showed up in ten or more of those campaigns. I took those IP addresses, and asked the Malcovery Threat Intelligence Database "which spam campaigns delivered malware that caused traffic to those IP addresses?" and was surprised to see not just the original 92 campaign I started with, but 360 distinct spam campaigns!! I culled that down by eliminating the campaigns that only touched ONE of those 56 IP addresses of high interest. The remaining 284 campaigns could be placed into 103 groups based on what they were imitating. Most of the top brands should be familiar to you from Malcovery's Top 10 Phished Brands That Your Anti-Virus is Missing report. Brand Imitated in Spam# of Campaigns SeenRing Central 30 campaignsHMRC 15 campaignsHSBC 13 campaignsRoyal Bank of Scotland 14 campaignsNatWest 11 campaignseFax 11 campaignsSage 10 campaignsLloyds Bank 8 campaignsUK Government Gateway 8 campaignsXerox 8 campaignsADP 6 campaignsCompanies House 6 campaignsIRS 6 campaignsNew Fax 5 campaignsPaypal 5 campaignsSky 5 campaignsUPS 5 campaignsAmazon 4 campaignsBank of America 4 campaignsBT.com 4 campaignsMicrosoft 4 campaignsQuickBooks 4 campaignsWells Fargo 4 campaignsWhatsApp 4 campaigns I threw the data into IBM's i2 Analyst Notebook, my favorite tool for getting a quick visualization of data, and did some arrangement to try to show the regionality of the data. I know the graph is too dense to see what is in the interior, but let me explain it here: On the left are IP addresses that are owned by Microsoft. They are arranged by Netblock, with the size of the Computer icon representing how many malware campaigns that IP was linked to. Top to bottom numerically by Netblock, these are from the 23.96 / 23.98 / 137.116, 137.135, 138.91, 168.61, 168.63, 191.232 blocks. The Microsoft traffic only started appearing in late April, so it is possible this is traffic related to "sinkholing" or attempting to enumerate the botnet as part of the investigation. I have no insider knowledge of any such activity, just stating what we observed. We *DID* go back and look at the packet captures for these runs (we keep all of our PCAPs) and the traffic was exactly like the other Peer to Peer chatter for GameOver Zeus. On the top are IP addresses in APNIC countries. Flag test: Japan, Hong Kong, China On the right are IP addresses in ARIN countries. (Canada, USA) In the bottom right corner is one LACNIC IP. (Venezuela) And on the bottom are RIPE countries. (Netherlands, Moldova, Switzerland, Great Britain, Ukraine, Sweden, Belgium, France, and Austria) Image may be NSFW. Clik here to view. The IP addresses on the chart above are also included here in tabular form: PROMINENT IP ADDRESSES ASSOCIATED WITH GAMEOVER ZEUS AND ASSOCIATED MALWARE CountryASN#ASN OrganizationIP CN 4837 CHINA169-BACKBONE CNCGROUP China169 Backbone,CN 221.193.254.122 HK 4515 ERX-STAR PCCW IMSBiz,HK 113.28.179.100 HK 9269 HKBN-AS-AP Hong Kong Broadband Network Ltd.,HK 61.244.150.9 HK 4760 HKTIMS-AP PCCW Limited,HK 218.103.240.27 JP 9365 ITSCOM its communications Inc.,JP 101.111.248.177 JP 45687 MCT-INTERNET Minamikyusyu CableTV Net Inc.,JP 27.54.110.77 JP 38628 WINK-NET HIMEJI CABLE TELEVISION CORPORATION,JP 115.126.143.176 JP 9617 ZAQ KANSAI MULTIMEDIA SERVICE COMPANY,JP 125.4.34.229 CA 577 BACOM - Bell Canada,CA 174.89.110.91 US 36352 AS-COLOCROSSING - ColoCrossing,US 172.245.217.122 US 22773 ASN-CXA-ALL-CCI-22773-RDC - Cox Communications Inc.,US 98.162.170.4 US 7018 ATT-INTERNET4 - AT&T Services, Inc.,US 75.1.220.146 US 7018 ATT-INTERNET4 - AT&T Services, Inc.,US 99.73.173.219 US 33588 BRESNAN-AS - Charter Communications,US 184.166.114.48 US 6128 CABLE-NET-1 - Cablevision Systems Corp.,US 68.197.193.98 US 6128 CABLE-NET-1 - Cablevision Systems Corp.,US 75.99.113.250 US 33490 COMCAST-33490 - Comcast Cable Communications, Inc.,US 67.168.254.65 US 7015 COMCAST-7015 - Comcast Cable Communications Holdings, Inc,US 73.182.194.83 US 6939 HURRICANE - Hurricane Electric, Inc.,US 50.116.4.71 US 8075 MICROSOFT-CORP-MSN-AS-BLOCK - Microsoft Corporation,US 137.116.225.57 US 8075 MICROSOFT-CORP-MSN-AS-BLOCK - Microsoft Corporation,US 137.116.229.40 US 8075 MICROSOFT-CORP-MSN-AS-BLOCK - Microsoft Corporation,US 137.117.197.214 US 8075 MICROSOFT-CORP-MSN-AS-BLOCK - Microsoft Corporation,US 137.117.72.241 US 8075 MICROSOFT-CORP-MSN-AS-BLOCK - Microsoft Corporation,US 137.135.218.230 US 8075 MICROSOFT-CORP-MSN-AS-BLOCK - Microsoft Corporation,US 138.91.18.14 US 8075 MICROSOFT-CORP-MSN-AS-BLOCK - Microsoft Corporation,US 138.91.187.61 US 8075 MICROSOFT-CORP-MSN-AS-BLOCK - Microsoft Corporation,US 138.91.49.30 US 8075 MICROSOFT-CORP-MSN-AS-BLOCK - Microsoft Corporation,US 168.61.80.142 US 8075 MICROSOFT-CORP-MSN-AS-BLOCK - Microsoft Corporation,US 168.61.87.1 US 8075 MICROSOFT-CORP-MSN-AS-BLOCK - Microsoft Corporation,US 168.63.154.114 US 8075 MICROSOFT-CORP-MSN-AS-BLOCK - Microsoft Corporation,US 168.63.211.182 US 8075 MICROSOFT-CORP-MSN-AS-BLOCK - Microsoft Corporation,US 168.63.62.72 US 8075 MICROSOFT-CORP-MSN-AS-BLOCK - Microsoft Corporation,US 23.96.34.43 US 8075 MICROSOFT-CORP-MSN-AS-BLOCK - Microsoft Corporation,US 23.97.133.13 US 8075 MICROSOFT-CORP-MSN-AS-BLOCK - Microsoft Corporation,US 23.98.41.229 US 8075 MICROSOFT-CORP-MSN-AS-BLOCK - Microsoft Corporation,US 23.98.42.224 US 8075 MICROSOFT-CORP-MSN-AS-BLOCK - Microsoft Corporation,US 23.98.64.182 BR 8075 MICROSOFT-CORP-MSN-AS-BLOCK - Microsoft Corporation,US 191.234.43.118 BR 8075 MICROSOFT-CORP-MSN-AS-BLOCK - Microsoft Corporation,US 191.234.52.206 BR 8075 MICROSOFT-CORP-MSN-AS-BLOCK - Microsoft Corporation,US 191.236.85.223 VE 8048 CANTV Servicios, Venezuela,VE 190.37.198.162 AT 8437 UTA-AS Tele2 Telecommunication GmbH,AT 81.189.6.76 BE 5432 BELGACOM-SKYNET-AS BELGACOM S.A.,BE 194.78.138.100 CH 15600 FINECOM Finecom Telecommunications AG,CH 77.239.59.243 FR 16276 OVH OVH SAS,FR 94.23.32.170 GB 2856 BT-UK-AS BTnet UK Regional network,GB 109.153.212.95 GB 2856 BT-UK-AS BTnet UK Regional network,GB 213.120.146.245 GB 2856 BT-UK-AS BTnet UK Regional network,GB 86.159.38.32 MD 31252 STARNET-AS StarNet Moldova,MD 89.28.59.166 NL 1103 SURFNET-NL SURFnet, The Netherlands,NL 130.37.198.100 NL 1103 SURFNET-NL SURFnet, The Netherlands,NL 130.37.198.90 SE 39287 FLATTR-AS Flattr AB,SE 95.215.16.10 UA 13188 BANKINFORM-AS TOV _Bank-Inform_,UA 37.57.41.161 UA 21219 DATAGROUP PRIVATE JOINT STOCK COMPANY _DATAGROUP_,UA 195.114.152.188 UA 42471 FALSTAP-AS OOO TRK Falstap,UA 85.198.156.189 UA 29688 VOSTOKLTD VOSTOK Ltd.,UA 31.42.75.203 ENCRYPTED GAMEOVER ZEUS URLS SEEN BY MALCOVERY 2014-02-06 UK Govt Gateway url::newz24x.com/wp-content/uploads/2014/02/pdf.enc 2014-02-06 UK Govt Gateway url::oilwellme.com/images/banners/pdf.enc 2014-02-06 TNT UK url::newz24x.com/wp-content/uploads/2014/02/pdf.enc 2014-02-06 TNT UK url::oilwellme.com/images/banners/pdf.enc 2014-02-10 UK2fax url::agrimarsystem.pe/images/10UKrh.enc 2014-02-10 UK2fax url::pro-viewer.com/images/10UKrh.enc 2014-02-12 Royal Bank of Scotland url::buzzers.in/media/catalog/category/12UKp.mp3 2014-02-12 Royal Bank of Scotland url::erp.zebronics.com/images/12UKp.mp3 2014-02-18 RingCentral url::iatablet.com/oc-content/uploads/HTML/al1402.pic 2014-02-18 RingCentral url::vietdongatravel.com/image/data/logo/al1402.pic 2014-03-05 Standard Chartered Bank url::broadproductz.zapto.org/ndu/guru/config.bin 2014-03-05 Standard Chartered Bank url::broadproductz.zapto.org/ndu/guru/gate.php 2014-03-06 RingCentral url::thebaymanbook.com/wp-content/uploads/2014/03/al2602.big 2014-03-06 RingCentral url::dominionfoodie.com/images/al2602.big 2014-03-06 Adobe url::cdn.cmatecdnfast.us/os/js/OfferScreen_240_EN.zip 2014-03-06 Adobe url::cdn.cmatecdnfast.us/os/js/OfferScreen_260_EN.zip 2014-03-06 Adobe url::cdn.cmatecdnfast.us/os/OfferScreen_243_FP_spws243.zip 2014-03-06 Adobe url::cdn.eastwhitecoal.us/Advertisers/FlashPlayer_Installer.exe 2014-03-06 Adobe url::downloadupdates.in/MB1/downloadupdate.in/style.css 2014-03-06 Adobe url::downloadupdates.in/MB1/flash_thankyou.php 2014-03-06 French Government url::adultagencyads.com/images/2010/0603UKp.big 2014-03-06 French Government url::trudeausociety.com/images/flash/0603UKp.big 2014-03-18 Citi url::jswcompounding-usa.com/images/TARGT.tp 2014-03-18 Citi url::thesymptomatologynetwork.com/images/TARGT.tp 2014-03-20 BankofAmerica url::lovestogarden.com/images/general/TARGT.tpl 2014-03-20 BankofAmerica url::villaveronica.it/gallery/TARGT.tpl 2014-03-21 Companies House url::fidaintel.com/images/2103UKp.qta 2014-03-21 Companies House url::premiercrufinewine.co.uk/wp-content/uploads/2014/03/2103UKp.qta 2014-03-21 New Fax url::gulf-industrial.com/images/2103USa.qta 2014-03-21 QuickBooks url::bodyfriend.co.uk/images/2103USp.qta 2014-03-21 QuickBooks url::overtonsheepfair.co.uk/wp-content/uploads/2012/06/2103USp.qta 2014-03-27 Banque Populaire url::myeapp.com/wp-content/uploads/2014/03/TARG1.git 2014-03-27 Banque Populaire url::ramirezcr.com/images/TARG1.git 2014-03-27 HSBC url::knockoutsecrets.com/wp-content/uploads/2014/03/2703UKc.git 2014-03-27 HSBC url::vequi.com/images/2703UKc.git 2014-03-28 Sky url::hardmoneylenderslosangeles.com/abc/2803UKd.wer 2014-03-28 Sky url::igsoa.net/Book/2803UKd.wer 2014-03-28 Sage url::hardmoneylenderslosangeles.com/abc/2803UKd.wer 2014-03-28 Sage url::igsoa.net/Book/2803UKd.wer 2014-03-31 Voicemail Message url::albergolarese.com/css/3103UKm.rih 2014-03-31 Voicemail Message url::direttauto.com/scripts/3103UKm.rih 2014-03-31 Lloyds Bank url::bormanns-wetter.de/scripts/3103UKd.rih 2014-03-31 Lloyds Bank url::brucewhite.org/images/3103UKd.rih 2014-04-01 RingCentral url::atlantafloorinstallation.com/wp-content/plugins/akismet/index.zpi 2014-04-01 RingCentral url::ayat.onlinewebshop.net/img/index.zpi 2014-04-01 Royal Bank of Scotland url::miss-loly.com/Scripts/0104UKd.bis 2014-04-01 Royal Bank of Scotland url::photovolt.ro/script/0104UKd.bis 2014-04-01 eFax url::apacsolutions.com/test/Targ-0104USr.bis 2014-04-01 eFax url::cfklc.com/downloads/Targ-0104USr.bis 2014-04-01 Wells Fargo url::all-products.biz/css/Targ-0104USd.bis 2014-04-01 Wells Fargo url::smokeylegend.com/css/Targ-0104USd.bis 2014-04-01 Xerox url::atifmalikmd.org/css/Targ-0104USm.bis 2014-04-01 Xerox url::contactdbinc.com/css/Targ-0104USm.bis 2014-04-07 New Fax url::abwidiyantoro.com/images/0804UKm.jpi 2014-04-07 New Fax url::kworldgroup.com/css/0804UKc.jpi 2014-04-07 New Fax url::rainda.com/css/0804UKc.jpi 2014-04-07 New Fax url::robertcairns.co.uk/wp-content/uploads/2014/04/0804UKm.jpi 2014-04-07 NY Dept of Taxation and Finance url::gisticinc.com/wp-content/uploads/2014/04/0804UKr.jpi 2014-04-07 NY Dept of Taxation and Finance url::vtiger.gisticinc.com/test/logo/0804UKr.jpi 2014-04-08 Swiftpage, Inc url::isapport.com/Images/n0804UKm.dim 2014-04-08 Swiftpage, Inc url::metek-mkt.com/images/scripts/n0804UKm.dim 2014-04-09 HSBC url::musicbanda.com/css/0904UKd.rar 2014-04-09 HSBC url::sunsing.com.sg/images/0904UKd.rar 2014-04-09 New Fax url::renaissancepmc.com/scripts/0904US.rar 2014-04-09 New Fax url::thegrandbasant.com/img/icons/0904US.rar 2014-04-10 Xerox url::ebazari.com/uploads/brands/Targ-1004USr.enc 2014-04-10 Xerox url::rollonskips.com/images/banners/Targ-1004USr.enc 2014-04-14 Santander url::vv-international.eu/food/1404UKd.rar 2014-04-17 PayPal url::artncraftemporio.com/media/css/1704UKd.rar 2014-04-17 PayPal url::hrprovider.com/img/img/1704UKd.rar 2014-04-17 PayPal url::artncraftemporio.com/media/css/1704UKd.rar 2014-04-17 PayPal url::hrprovider.com/img/img/1704UKd.rar 2014-04-17 IRS url::fergieandco.org/wp-content/uploads/2014/03/Targ-1704USd.rar 2014-04-17 IRS url::newsilike.in/wp-content/lbp-css/black/Targ-1704USd.rar 2014-04-23 Royal Bank of Scotland url::aoneteleshop.com/images/payments/s2304UKd.rar 2014-04-23 Royal Bank of Scotland url::czargroup.net/wp-content/uploads/2014/04/s2304UKd.rar 2014-04-23 Companies House url::aoneteleshop.com/images/payments/s2304UKd.rar 2014-04-23 Companies House url::www.czargroup.net/wp-content/uploads/2014/04/s2304UKd.rar 2014-04-24 Generic Voicemail url::dotspiders.sg/test/clocks/2404UKs.tar 2014-04-24 Generic Voicemail url::mc-saferentals.com/images/2404UKs.tar 2014-04-25 Unity Messaging System url::altpowerpro.com/images/stories/highslide/Targ-2404USm.tar 2014-04-25 Unity Messaging System url::tmupi.com/media/images/icons/team/Targ-2404USm.tar 2014-04-29 Citi url::capsnregalia.com/download/2904UKpm.zip 2014-04-29 Citi url::perfumeriaamalia.com/images/stories/2904UKpm.zip 2014-04-30 UK Gov't Gateway url::factoryrush.com/boxbeat/uploads/3004UKdp.tar 2014-04-30 UK Gov't Gateway url::vestury.com/js/fckeditor/editor/js/3004UKdp.tar 2014-04-30 Sky url::factoryrush.com/boxbeat/uploads/3004UKdp.tar 2014-04-30 Sky url::vestury.com/js/fckeditor/editor/js/3004UKdp.tar 2014-04-30 IRS url::capsnregalia.com/download/scripts/Targ-3004USmp.tar 2014-04-30 IRS url::worldbuy.biz/scripts/Targ-3004USmw.tar 2014-05-05 Microsoft url::iknowstudio.com/scripts/0505USdw.dat 2014-05-05 Microsoft url::luxesydiseno.com/images/stories/brands/0505USdw.dat 2014-05-06 BT.com url::BIZ-VENTURES.NET/scripts/0605UKdp.rar 2014-05-06 BT.com url::realtech-international.com/css/0605UKdp.rar 2014-05-06 HMRC url::BIZ-VENTURES.NET/scripts/0605UKdp.rar 2014-05-06 HMRC url::realtech-international.com/css/0605UKdp.rar 2014-05-06 Generic Voicemail url::oligroupbd.com/images/Targ-0605USmw.enc 2014-05-06 Generic Voicemail url::touchegolf.com/css/Targ-0605USmw.enc 2014-05-06 US Postal Service url::eirtel.ci/images/0605USdw.enc 2014-05-06 US Postal Service url::smartsolutions.ly/css/0605USdw.enc 2014-05-07 Bank of America url::addcomputers.com/downloads/Targ-0705USmw.enc 2014-05-07 Bank of America url::mindinstitute.ro/images/Targ-0705USmw.enc 2014-05-07 NYC Govt url::addcomputers.com/downloads/Targ-0705USmw.enc 2014-05-07 NYC Govt url::mindinstitute.ro/images/Targ-0705USmw.enc 2014-05-07 BT.com url::k-m-a.org.uk/images/jquerytree/0705USmp.enc 2014-05-07 BT.com url::tuckerspride.com/wp-content/uploads/2014/05/0705USmp.enc 2014-05-07 NatWest url::bumisaing.com/wpimages/wpThumbnails/0705UKmp.zip 2014-05-07 NatWest url::generation.com.pk/flash/0705UKmp.zip 2014-05-07 Swiftpage url::bumisaing.com/wpimages/wpThumbnails/0705UKmp.zip 2014-05-07 Swiftpage url::generation.com.pk/flash/0705UKmp.zip 2014-05-07 Swiftpage url::bumisaing.com/wpimages/wpThumbnails/0705UKmp.zip 2014-05-07 Swiftpage url::generation.com.pk/flash/0705UKmp.zip 2014-05-07 QuickBooks url::k-m-a.org.uk/images/jquerytree/0705USmp.enc 2014-05-07 QuickBooks url::tuckerspride.com/wp-content/uploads/2014/05/0705USmp.enc 2014-05-08 Companies House url::accessdi.com/wp-content/uploads/2014/05/0805UKdp.dat 2014-05-08 Companies House url::mpharmhb.com/images/banners/0805UKdp.dat 2014-05-08 Paychex url::localalarmbids.com/wp-content/uploads/2012/12/0805USmp.rar 2014-05-08 Paychex url::pharmaholic.com/images/banners/0805USmp.rar 2014-05-12 NatWest url::plvan.com/css/1205UKdm.tar 2014-05-12 NatWest url::srhhealthfoods.com/test/1205UKdm.tar 2014-05-12 ADP url::datanethosting.com/css/Targ-1205USmp.enc 2014-05-12 ADP url::distrioficinas.com/fonts/Targ-1205USmp.enc 2014-05-12 Royal Bank of Scotland url::plvan.com/css/1205UKdm.tar 2014-05-12 Royal Bank of Scotland url::srhhealthfoods.com/test/1205UKdm.tar 2014-05-13 IRS url::consumerfed.net/css/1305UKmw.zip 2014-05-13 IRS url::irishtroutflies.ie/images/1305UKmw.zip 2014-05-13 NYC Govt url::loquay.com/css/1305UKdp.zip 2014-05-13 NYC Govt url::moraza.com.my/images/1305UKdp.zip 2014-05-13 Xerox url::loquay.com/css/1305UKdp.zip 2014-05-13 Xerox url::moraza.com.my/images/1305UKdp.zip 2014-05-13 NatWest url::luxesydiseno.com/images/powerslide/Concha/1305UKdw.zip 2014-05-13 NatWest url::paulaggg.com/css/1305UKdw.zip 2014-05-14 Microsoft url::djdawson.com/css/1405UKdw.enc 2014-05-14 Microsoft url::elpenterprisesinc.com/wp-content/uploads/2014/05/1405UKdw.enc 2014-05-14 Sage url::ballroom-intergalactica.com/wp-content/themes/twentythirteen/css/1405UKdp.enc 2014-05-14 Sage url::indoorea.com/webfiles/css/1405UKdp.enc 2014-05-14 Intuit url::martabrixton.com/css/Targ-rhc1405.dat 2014-05-14 Intuit url::mindinstitute.ro/Web3/Upload/Targ-rhc1405.dat 2014-05-14 NatWest url::jessicahann.co.uk/wp-content/uploads/2013/13/1405UKmp.enc 2014-05-14 NatWest url::mortgagebidders.ca/fonts/1405UKmp.enc 2014-05-14 ADP url::martabrixton.com/css/Targ-rhc1405.dat 2014-05-14 ADP url::mindinstitute.ro/Web3/Upload/Targ-rhc1405.dat 2014-05-15 eFax url::factoryrush.com/test/1505UKmp.zip 2014-05-15 eFax url::techwin.com.pk/css/1505UKmp.zip 2014-05-15 UK Ministry of Justice url::floworldonline.com/wp-content/uploads/2014/04/1505UKdp.zip 2014-05-15 UK Ministry of Justice url::sugarlandrx.com/media/css/1505UKdp.zip 2014-05-15 eFax url::dubaimovers.info/scripts/Targ-1505USdp.tar 2014-05-15 eFax url::entrepreneurindia.com/css/Targ-1505USdp.tar 2014-05-15 eFax url::www.entrepreneurindia.com/css/Targ-1505USdp.tar 2014-05-15 Fidelity url::dubaimovers.info/scripts/Targ-1505USdp.tar 2014-05-15 Fidelity url::entrepreneurindia.com/css/Targ-1505USdp.tar 2014-05-15 Fidelity url::www.entrepreneurindia.com/css/Targ-1505USdp.tar 2014-05-15 Dun & Bradstreet url::dubaimovers.info/scripts/Targ-1505USdp.tar 2014-05-15 Dun & Bradstreet url::entrepreneurindia.com/css/Targ-1505USdp.tar 2014-05-15 Dun & Bradstreet url::www.entrepreneurindia.com/css/Targ-1505USdp.tar 2014-05-16 Bank of America url::gmdf.net/js/Targ-1605USdw.tar 2014-05-16 Bank of America url::gmdf.net/js/Targ-1605USdw.tar 2014-05-16 Bank of America url::kuukaarr01.com/wp-content/uploads/2014/05/Targ-1605USdp.tar 2014-05-16 Bank of America url::kuukaarr02.com/wp-content/uploads/2014/05/Targ-1605USdw.tar 2014-05-16 Bank of America url::kuukaarr02.com/wp-content/uploads/2014/05/Targ-1605USdw.tar 2014-05-16 Bank of America url::malkanat.com/images/Targ-1605USdp.tar 2014-05-16 Bank of America https://dl.dropboxusercontent.com/s/vfoim5op006sjdv/SecureMessage.zip 2014-05-16 Bank of America https://dl.dropboxusercontent.com/s/xn26h1fppik5np6/BankofAmerica.scr 2014-05-19 Santander url::aanchalgroup.com/wp-content/uploads/2013/09/1905UKdp.zip 2014-05-19 Santander url::albus-capital.com/css/1905UKdp.zip 2014-05-19 Santander url::paperonotel.com/Scripts/heap170id2.exe 2014-05-19 Wells Fargo url::mersinprefabrik.com/Css/1905USmw.dct 2014-05-19 Wells Fargo url::paperonotel.com/Scripts/heap170id2.exe 2014-05-19 Wells Fargo url::seminarserver.com/css/1905USmw.dct 2014-05-20 HSBC url::lospomos.org/images/button/2005UKmw.zip 2014-05-20 HSBC url::task-team.com/css/2005UKmw.zip 2014-05-20 NYC Govt url::lospomos.org/images/button/2005USmw.zip 2014-05-20 NYC Govt url::task-team.com/css/2005USmw.zip 2014-05-20 UPS url::auracinematics.com/christine/Christine/2005USdp.zip 2014-05-20 UPS url::protecca.com/fonts/2005USdp.zip 2014-05-20 UPS url::alamx.com/images/RCH2005.zip 2014-05-20 UPS url::evedbonline.com/images/RCH2005.zip 2014-05-20 Royal Bank of Scotland url::lospomos.org/images/button/2005UKmw.zip 2014-05-20 Royal Bank of Scotland url::task-team.com/css/2005UKmw.zip 2014-05-20 LexisNexis url::alamx.com/images/RCH2005.zip 2014-05-20 LexisNexis url::evedbonline.com/images/RCH2005.zip 2014-05-21 Credit Agricole url::eleanormcm.com/css/2105UKdp.rar 2014-05-21 Credit Agricole url::frizou.org/06-images/2105UKdp.rar 2014-05-21 Credit Agricole url::paperonotel.com/Scripts/heap170id2.exe 2014-05-21 HSBC url::cedargrill.sg/css/2105UKdw.rar 2014-05-21 HSBC url::chezalexye.com/css/2105UKdw.rar 2014-05-21 JP Morgan url::footballmerch.com/media/css/Targ-2105USmw.tar 2014-05-21 JP Morgan url::myacoub.com/wp-content/uploads/2014/05/Targ-2105USmw.tar 2014-05-27 Hewlett-Packard url::flutterhost.com/demo/2705UKdp.rar 2014-05-27 Hewlett-Packard url::lotwatch.net/images/2705UKdp.rar 2014-05-27 Xerox url::auracinematics.com/acc/b02.exe 2014-05-27 Xerox url::feelhomely.com/beta/eshopbox/2705USmp.opt 2014-05-27 Xerox url::the-dunn.com/css/2705USmp.opt 2014-05-27 Xerox url::auracinematics.com/acc/b02.exe 2014-05-27 Xerox url::feelhomely.com/beta/eshopbox/2705USmp.opt 2014-05-27 Xerox url::the-dunn.com/css/2705USmp.opt 2014-05-29 Visa url::homerenov.org/wp-content/uploads/2014/05/Targ-2905USmp.tar 2014-05-29 Visa url::qadindunyasi.az/images/Targ-2905USmp.tar 2014-05-30 Sky url::3dparsian.com/images/banners/3005UKdp.rar 2014-05-30 Sky url::kuukaarr01.com/wp-content/themes/twentytwelve/css/3005UKdp.rar 2014-05-30 Sky url::utraconindia.com/images/social/heapid2.exe 2014-05-30 HSBC url::bag-t.com/css/3005UKmw.rar 2014-05-30 HSBC url::seminarserver.com/html/3005UKmw.rar ↧ MICROSOFT, NJRAT, AND NO-IP June 30, 2014, 11:22 pm ≫ Next: Disk57.com, Cutwail, and Tearing Down Offending Infrastructure ≪ Previous: Malcovery Examines GameOver Zeus $ 0 0 Microsoft's Digital Crimes Unit is claiming their 10th major botnet action, this time targeting the malware known as Bladabindi, or more popularly njRAT, and Jenxcus, better known as H-worm. To do so, Microsoft filed a lawsuit in Nevada against three parties: Naser Al Mutairi, a Kuwait City resident known to be the author of njRAT through his varias aliases, njq8, xnjq8x, njq8x, and njrat Mohamed Benabdellah, an Algerian living in or near Mila, Algeria, who uses the aliases Houdini, houdinisc, and houdini-fx and Vitalwerks Internet Solutions, LLC, d/b/a No-IP.com, with offices at 5905 South Virginia Street, Suite 200, Reno, Nevada 89502. The lawsuit is also filed against "John Does 1-500" who are supposedly the 500 priniciple operators of njRAT and H-Worm malware. (H-Worm is a closely related RAT software, likely based off the same source code). Because they do not yet know the identities of these RAT operators, the are assigned "John Doe" aliases, in hopes that the power of discovery granted by the lawsuit can help to reveal their true identities. On the other side of this Internet battle is Vitalwerks and their literally millions of service users. Vitalwerks provides the capability to host an Internet service despite the fact that your computer may be using DHCP-assigned IP address. Normally a webserver has to have a permanently assigned IP address which is listed by a DNS service so that computers on the Internet can find the service you are offering. With Dynamic DNS services, your computer can link to the service and constantly update its IP address so that even if your IP changes many times per day, your service users can find you. In Microsoft's lawsuit, they agree that "Dynamic DNS is a vital part of the Internet because it allows anyone to have a domain name even though they have a changing IP address." Their accusation is found in the next sentence, "However, if not properly managed, a Dynamic DNS service can be susceptible to abuse." The lawsuit points out that in April 2013, OpenDNS published an article online detailing its investigation into Dynamic DNS abuse. In that study,On the Trail of Malicious Dynamic DNS Domains by my friend Dhia Mahjoub, OpenDNS collected resolutions of various Dynamic DNS domains, and concluded that during their study some domains, such as "hopto.org" were used for malicious purposes as often as 56% of the time! Other highly malicious URLs included: hopto.org - 56.71% us.to - 49.45% myftp.org - 37.50% myvnc.com - 33.33% myftp.biz - 20.20% dlinkddns.com - 12.22% no-ip.info - 10.70% no-ip.org - 4.57% The lawsuit also discusses Symantec reporting about the malware being used on no-ip. One such Symantec report is: Simple njRAT fueld nascent middle east Cybercrime Scene. (Microsoft doesn't really mention that basically NOBODY calls the malware Bladabindi except Microsoft. Just call it njRAT like everyone else, please!) In that report, from March 2014, Symantec mentions one particular group that infects as many as 4500 computers per day using their C&C Servers at njratmoony.no-ip.biz and nrj.no-ip.biz. This blogger confirmed the complaint firsthand that is made by No-IP themselves. Although Microsoft was supposedly going to ensure that "legitimate" no-ip customers were not impacted, for a significant part of the day on June 30, 2014, large portions of the Internet (including three linux servers that this blogger uses on three separate networks) had no idea how to find the no-ip domains. The nameservers were not propagated in such a way that the changes were seamless. No-IP's Formal Statement on Microsoft Takedown can be found on their website. In that statement, No-IP claims that "billions of queries" from "millions of innocent users" were dropped "because of Microsoft's attempt to remediate hostnames associated with a few bad actors" and implies that Microsoft did not dedicate enough resources to handle the traffic. The primary purpose of the court orders was in fact to allow Microsoft to take matters into their own hands and filter the traffic for 130 pages worth (more than 18,000 3LDs) that were hosted by NO-IP and were associated with criminal activity and malware, primarily related to the two RATs, njRAT and H-Worm. Of course on the other side of that is the fact that Microsoft documents that in the past twelve months MORE THAN SEVEN MILLION WINDOWS USERS were impacted by malware hosted on NO-IP domains! If someone's infrastructure is routinely abused to harm seven million of your customers, don't you have a right to do something about it? While NO-IP can claim that they have an active abuse desk that deals with these complaints, dozens of criminal tutorials would not recommend that you host your malware by setting up a NO-IP address, many of which have lived on consistent names for MANY MONTHS (as in the names mentioned in the above Symantec link) unless there was a clear pattern of NOT terminating offending 3LD (third level domains). Cisco's fabulous cybercrime fighter, Levi Gundert, who I first worked with while he was working on the LA Electronic Crimes Task Force, as one of the most effective U.S. Secret Service cybercrime agents, and who later worked for Team Cymru, recently wrote a piece for Cisco's blog on Dynamic Detection of Malicious DDNS. Levi says that Free DDNS services "check all of the necessary attack boxes" that make the service desirable for criminals. As he explains: > Free DDNS services, by comparison, check all of the necessary attack boxes. > Sub-domains can be quickly and easily generated and DNS records are trivially > changed. For the remote access Trojan (RAT) crowd that are typically > attempting to spy on female victims and running servers from home, DDNS is a > natural fit. In fact, searching the web for tutorials on using freely > available RATs like Black Shades, Dark Comet, or Poison Ivy returns results > that all instruct RAT attackers to first create DDNS sub-domains in order to > properly configure the RAT, specifically enabling a “back connect” to the > attacker. Naturally, one segment of RAT users tend to be less technical, > relying on tutorials and point and click interfaces to actually launch the > RAT, which likely contributes significantly to the overall metrics of > malicious DDNS use. Levi provides this graph showing how often Cisco's Cloud Web Security blocks Dynamic DNS third level domains based on the reputation of that service in the following graph: Image may be NSFW. Clik here to view. (source: blogs.cisco.com/security/dynamic-detection-of-malicious-ddns/ click image to enlarge ) zapto.org, one of the NO-IP domains, is blocked 100% of the time by users of Cisco's Cloud Web Service. no-ip.info, no-ip.org, and no-ip.biz are also all blocked between 50% and 100% of the time based on reputation. Levi next goes on to show of all the DDNS base domains, "what do the corresponding malware numbers look like for the DDNS domains most abused by threat actors?" Image may be NSFW. Clik here to view. (source: blogs.cisco.com/security/dynamic-detection-of-malicious-ddns/ click image to enlarge ) Even after such widespread and published reports of NO-IP being used for malware abuse, Microsoft observed no significant change in their abuse practices, based on the malware analysis they performed. Following the February 2014 Cisco report, Microsoft "continues to see 2,000-3,000 new unique malware samples per month that are supported by No-IP." But that doesn't mean No-IP is not responsive. Brian Krebs reported on this conflict in his article today Microsoft Darkens 4mm Sites in Malware Fight where he quotes No-IP's Natalie Gogun as saying that of the 18,000 sites mentioned in the Temporary Restraining Order, only about 2,000 of them were actually still live. Krebs quotes Crowdstrike's Dmitri Alperovitch mentioning that No-IP has always been very responsive, and I've seen the same. In fact, immediately following the Cisco blog above, a member of the No-IP security team was observed by this blogged on a security researcher mailing list asking if anyone could help him get the full list so he could make sure they killed all of the domain names mentioned. (Hi, Kurt!) The problem here may be the nature of the malware used on these sites. While the security community regular sees and reports on financial crimes malware, such as Zeus, or malware that has significant and widespread distribution, in most cases njRat no-ip domains are being used by small-time botmasters to allow themselves to spy on a few dozen webcams. In fact, a review of more than 1800 recent URLs associated with delivering financial crimes malware observed by Malcovery Security's T3 product, NONE of the No-IP domains were seen to be used. Financial crime malware does not seem to be heavily associated with No-IP. While njRat certainly has the capability to be used for more significant crimes (including installing any additional malware desired by the criminals, and famously being used by the Syrian government to spy on the rebels) its primary reputation is as a tool for online perverts. Their typical victims tend to lack the Internet-savvy that allows corporate, industry, and government malware victims to report malware victimization to No-IP to receive a response. Sophisticated financial crimes malware criminals are very unlikely to link their malware back to dynamic DNS hosts that they personally control and are much more likely to use "more permanent" hosting in the form of hacked or leased servers. Image may be NSFW. Clik here to view. The Microsoft complaint mentions YouTube, and we were able to quickly find many similar njRAT tutorials. There were also njRAT groups hosted on Facebook where botmasters were openly trading photographs of victims and offering to "trade slaves" (as they refer to the pretty girls whose webcams they control.) We reported three such groups to Facebook Security who took quick action to kill the groups which had a combined membership of more than 16,000 users! Some examples of these creeps work might help illustrate the type of crimes committed by the typical njRat botmaster: Farid shows a screenshot boasting of 200 simultaneously online njRAT victims. Image may be NSFW. Clik here to view. Farid frequently posts photos of his conquests: Image may be NSFW. Clik here to view. Others do the same: Image may be NSFW. Clik here to view. Here's the Before and After of Farid's njrat group . . . Image may be NSFW. Clik here to view. and after we reported the group to Facebook Security . . . Image may be NSFW. Clik here to view. Conclusions? I can't really take sides on this one. Do we need to do something more to help the victims of this kind of malware? Absolutely. Was it necessary to seize 22 domains at No-IP? I can't argue with Microsoft wanting to prevent infections to more than 7 million Windows victims, but I certainly can understand the great frustration experienced by the No-IP folks. ↧ Search RSSing.com -------------------------------------------------------------------------------- DISK57.COM, CUTWAIL, AND TEARING DOWN OFFENDING INFRASTRUCTURE July 8, 2014, 9:37 pm ≫ Next: E-ZPass Spam leads to Location Aware Malware ≪ Previous: Microsoft, njRat, and No-IP $ 0 0 Sometimes I am so impressed by the things my employees at Malcovery discover as they work through the various email-based threats we process and report about for our customers. Brendan, Wayne, and J evaluate and document hundreds of malware threats each week from our Spam Data Mine and because of their daily interactions with so much malware notice patterns that others miss. I've been asking them to be especially mindful of what the Cutwail spammers are moving to next as the GameOver Zeus era moves to a close, and Brendan did a great job of covering that over on the Malcovery Blog in the article How Spammers Are Filling the Gameover Zeus Void. JUNE 16 - DISK57.COM FIRST SIGHTED On June 16, 2014, Brendan and the team noticed three malware campaigns distribution spam campaigns that were all pushing the same malware. The email subjects were: Subject: USPS - Missed package delivery Subject: You have received a new fax Subject: Scanned Image from a Xerox WorkCentre The files attached to those messages included: USPS1758369.zip - (22,331 bytes) - MD5: 73c4758a84c4a0e24e4f34db69584d26 (VirusTotal results at report time: 3/54) Scan.zip - (22,329 bytes) - MD5: cbfb3f1e40b30d01f4dda656d7f576e7 (VirusTotal results at report time: 3/54) IncomingFax.zip - 22,329 bytes - MD5: 048dcc8c9639d2e8ccea362fdb5f7d3e (VirusTotal results at report time: 3/54) All three of those .zip files contained the same binary, with the varying names, USPS06162014.scr, Scan.scr, and IncomingFax.scr. (40,960 bytes) - MD5: 36e264de2cb3321756a511f6c90510f5 (VirusTotal results at report time: 0/54) By a week later, the detection rate was up to 38 of 46 AV products detecting this as malware, but at the time of the spam campaign, only Sophos and K7 had signature-based detection for the malware, though some vendors may have offered other types of protection. Whichever of the three versions you downloaded, the SCR file was actually a PE-executable which would contact the site "disk57.com" in order to "check in" by hitting the file "gate.php" on that server. The Ukrainian server in question, 188.190.117.93, (AS197145, Kharkiv Infium LLC) had been seen previously communicating with malware on March 26 and March 27 using the domain name "malidini.com". The registry was modified so that a copy of the .scr file (now named as an .exe) would be executed on the next start up due to a Policy statement located in "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\Run\818107311" This resulted in the downloaded of a 7200 byte ".mod" file MORE DISK57.COM SIGHTINGS Disk57.com was also used as part of the malware infrastructure for malware samples distributed by the following spam campaigns: June 16 - Wells Fargo June 17 - USPS June 18 - HSBC June 18 - Xerox June 18 - New Fax June 30 - HSBC - Subject: Avis de Paiement June 30 - New Fax - Subject: You have received a new fax message June 30 - Scanned Document - Subject: Scan de July 1 - BanquePopulaire July 1 - French government July 3 - Xerox July 3 - UPS July 3 - Wells Fargo On June 30th, we saw the same technique used as in the June 16th campaigns. Three different .zip files, each containing a .scr file that was named differently, but where all samples had the same MD5 hash (MD5: 66dcf2e32aa902e2ffd4c06f5cb23b43 - VirusTotal detection 11/54 at report time.) As on June 16th, executing the .scr file resulted in an exchange with the "gate.php" file on disk57.com on 188.190.117.93, resulting in a 7200 byte ".mod" file being downloaded. On June 30th, however, this exchange resulted in a copy of the Cutwail binary, b02.exe, being downloaded from jasongraber.com on the path /css/b02.exe. (IP 192.64.181.14). b02.exe had a file size of 41,472 bytes - MD5: 84822121b11cce3c8a75f27c1493c6bb with a VirusTotal report of 2/54 at report time. UPATRE UPDATED On July 3rd, spam campaigns imitating Xerox, UPS, and Wells Fargo used this same technique again with email subjects: Subject: Scan from a Xerox WorkCentre - seen 1209 times by Malcovery Subject: New Fax: # pages - seen 288 times by Malcovery Subject: IMPORTANT - Confidential documents - seen 88 times by Malcovery Subject: UPS - Credit Card Billing Adjustment. Ref#(random) - seen 178 times by Malcovery 1,941 messages were sent to our Spam Data Mine from 1,037 different sending IP addresses. The .zip files still contained .scr files that were all the same file size (23,040 bytes) MD5: 870c63c4420b6f187066a94ef6c56dc6 - VirusTotal report: 1/53 at report time. However this time there were three very different URLs downloaded as a result of the initial click. The downloaded malware behaved almost exactly like the UPATRE samples that were used to distribute the encrypted version of GameOver Zeus that we wrote about back in February. (See: GameOver Zeus Now Uses Encryption to Bypass Perimeter Security.) UPATRE UPDATE The UPATRE malware that was signature detected only by Sophos (as the useful name Mal/Generic-S) on July 3rd now has 43 detections at VirusTotal, although most are crap as usual, with regards to the usefulness of the names chosen by the vendors. Zbot.LDQ, Trojan/Win32.Zbot (but it clearly isn't Zeus, it's just a tiny downloader, which is what several vendors call it (Trojan.Win32.Tiny.bNKP). Several other vendors call it Ransomware or Crypto something or another (Trojan-Ransom.Win32.Cryptodef.oq, Win32/Ransom.ABOQAMB, TROJ_CRYPWALL.JER, Trojan.Win32.A.Cryptodef.23040). Only Microsoft called it Upatre (TrojanDownloader:Win32/Upatre.AA) although that is clearly the consensus of the AV analysts we have discussed the sample with. In this case the job of UPATRE is to download files that CLAIM to be PDF files, "convert/unpack/decrypt" them into .exe files, and then launch those .EXE files. Three touches to the OVH (AS16276) IP address 94.23.247.202 resulted in three files so-called PDF files being downloaded from repele.net on IP address 82.220.34.132, each with the name "css/agreement.pdf". UPATRE did its magic, converting each of these files into another binary executable: agreement.pdf = 131,173 bytes - MD5: 354283b80cc9e63d872475175d20f14d (became CryptoWall Encryption ransomware, (in our case, named 09acd07.exe and located in a directory 09acd07 - 183,296 bytes - MD5: 6238af3e78f3316ea5f0192cb8cf3167 - VirusTotal reports detection of 14/53 at report time which made connection to three C&C servers: - vivatsaultppc.com - 194.58.101.96 in Russia (AS39134) - bolizarsospos.com - 194.58.101.3 in Russia (AS39134) - covermontislol.com - 31.31.204.59 in Russia (AS12695) After encrypting files, the victim is shown the following text, with a timer counting down from 168 hours: > Your files are encrypted. To get the key to decrypt the files you have to pay > 750 USD/EUR. If payment is not made before 10/07/14 - 15:37 the cost of > decrypting files will increase 2 times and will be 1500 USD/EUR (Other files found in that subdirectory included, DECRYPT_INSTRUCTION.HTML, DECRYPT_INSTRUCTION.TXT, and DECRYPT_INSTRUCTION.URL.) agreement-2.pdf = 51,266 bytes - MD5: 06a16a7701c748467a0b8bc79feb7f35 (became Cutwail spamming botnet malware, mshvsk.exe (random file name) - 39,936 bytes - MD5: c1cc8b5eaf7f25449cfda0c6cd98b553 - VirusTotal reports detection of 1/54 at report time. which then began communications to seven separate C&C servers: - 91.217.90.125 in Russia (AS48031) - 93.171.172.129 in Russia (AS29182) - 93.170.104.81 in Netherlands (AS50245) - 148.251.94.182 in Germany (AS24940) - 91.237.198.93 in Russia (AS198681) - 91.234.33.125 in Ukraine (AS56485) - 91.221.36.184 in Russia (AS51724 - FLYNET) agreement-3.pdf = 27,811 bytes - MD5: 19a1986f6fd0f243b02bba6cb77e9522 (became Andromeda botnet malware: gqxse.exe (random file name) - 23,150 bytes - MD5: 8e6c9e794739e67969c6f81a5786d9e7 VirusTotal reports detection of 0/54. which then called out to disk57.com / gate.php) WHAT TO DO? First and foremost, we need to get rid of Cutwail. This will be difficult as Russia continues to harbor their cyber criminals, allow them to bribe themselves out of prison and into government offices and contracts, and seems to treat their rampant theft of American and European wealth as a form of Economic Development. In the meantime, we need to begin smashing their infrastructure at every chance we can get. Seize the hardware if we can, disable the routing of the traffic if we can't, and DEFINITELY block that infrastructure within our homes and companies! Do yourself and your company a favor by sharing a link to this blog and recommending that your IT Security staff block the addresses shared above. If you live in a country where you can help, please do so! ↧ E-ZPASS SPAM LEADS TO LOCATION AWARE MALWARE July 8, 2014, 11:33 pm ≫ Next: Roman Seleznev (AKA Bulba, AKA Track2, AKA NCUX) appears in US Court in Guam ≪ Previous: Disk57.com, Cutwail, and Tearing Down Offending Infrastructure $ 0 0 If you drive in a city with toll roads, you are familiar with the E-Z Pass System. If you are, you may have been tempted to click on an email that looked like this: Image may be NSFW. Clik here to view. A quick search in the Malcovery Security Spam Data Mine revealed these related emails: date | subject | sender_name ------------+---------------------------------------+--------------------------------- 2014-07-08 | In arrears for driving on toll road | E-ZPass Collection Agency 2014-07-08 | In arrears for driving on toll road | E-ZPass Info 2014-07-08 | In arrears for driving on toll road | E-ZPass Customer Service Center 2014-07-08 | In arrears for driving on toll road | E-ZPass Info 2014-07-08 | Indebted for driving on toll road | E-ZPass Service Center 2014-07-08 | Indebted for driving on toll road | E-ZPass Service Center 2014-07-08 | Indebted for driving on toll road | E-ZPass Collection Agency 2014-07-08 | Indebted for driving on toll road | E-ZPass Customer Service Center 2014-07-08 | Indebted for driving on toll road | E-ZPass Info 2014-07-08 | Indebtedness for driving on toll road | E-ZPass Collection Agency 2014-07-08 | Indebtedness for driving on toll road | E-ZPass Customer Service Center 2014-07-08 | Indebtedness for driving on toll road | E-ZPass Customer Service Center 2014-07-08 | Pay for driving on toll road | E-ZPass Info 2014-07-08 | Payment for driving on toll road | E-ZPass Info 2014-07-08 | Payment for driving on toll road | E-ZPass Info 2014-07-08 | Payment for driving on toll road | E-ZPass Info But the destination websites are certainly not on E-Z Pass's domains! machine | path ---------------------------+------------------------------------------------------------------- www.federalparts.com.ar | /tmp/api/3eLv aFKXBvmuxydKFVfEZIMWSl7f4VJfOpfcdAHPeo=/toll www.fiestasnightclub.com | /tmp/api/kJ1a5XRhE7MM9YhRVR1186why1TgPCPH7aieECyjb I=/toll www.flavazstylingteam.com | /tmp/api/vBrLdEDWRK4sXs6KaHEbWzHnbEYIFSo42BZvGd4crCY=/toll www.fleavalley.com | /tmp/api/ycI2IRHcInDd1/cetyLMZMjwyxKxTAEHFkjk1dRUfYs=/toll www.frazeryorke.com | /wp-content/api/LtvaZdAvP3GFuaqyulY/C3haFCeID3krbtMHt52cdnM=/toll www.fsp-ugthuelva.org | /tmp/api/fMVyiIXcbY9gamr17zPrnhTgz2Zvs825GTmvvRjlTIA=/toll www.fyaudit.eu | /components/api/yiBOsvUdvftbCd4Fa1zmVtIkbs4x3ThiUnFoIgwyI9Q=/toll www.giedrowicz.pl | /tmp/api/R4a4iKmACUtWoRHq1DsCiQ1aH 3J7QgBMfp1zq8gqj8=/toll www.gostudy.ca | /components/api/Q/sV7HtfnZGOW4lzlLSfFuKM/lLu8LQmOlT TVXKb2o=/toll www.graphiktec.com | /tmp/api/nZbX6I6vYQrsTlY4OAw44Qq96Lnw/JOoLDdBmdLh21M=/toll www.h2oasisinc.com | /components/api/BivlBt/AhVodCMM9zRuvcQpIyG2X6Knd8sERnP1 QDA=/toll www.habicher.eu | /tmp/api/yra96tiDlyYbYxsbJpr/hDVSPmwh6GKYLF6PaD3nUAI=/toll www.grupoancon.com | /components/api/6jI99hwDmjAvkEvuX8JvVSkS3InPtLii ZN3dbIVkOM=/toll www.happymaree.com.au | /tmp/api/d4ik5Y2GvCVSSJQhXI9wYYpBvxjLS78peeRYMKV0V7c=/toll www.headspokerfest.com | /tmp/api/RTuPCuYLjaj1KnTeJrMlCoH9HL4IixR eBvajB6TCeE=/toll www.headspokerfest.com | /tmp/api/43J6l5G/CkNp6kmGl0b jUY/oOL4411pPds8nylDE5g=/toll When we visit one of the URLs, we are prompted to download a .zip file, containing a .exe file. Both are conveniently named for the City and ZIP Code from which we are connected. For example: Image may be NSFW. Clik here to view. When we run this malware, it attempts to make contact with the following C&C locations: 76.74.184.127:443 113.53.247.147:443 50.57.139.41:8080 188.165.192.116:8080 82.150.199.140:8080 203.157.142.2:8080 212.45.17.15:8080 92.240.232.232:443 188.165.192.116:8080 At Malcovery Security, we've been tracking the ASProx botnet for some time. Most of these IP addresses were already known to belong to the ASProx botnet for some time. This is the same botnet that sent the Holiday Delivery Failure spam imitating Walmart, CostCo, and BestBuy over the holidays and that send the Court Related Malware through the early months of 2014. Whatever it wants to do next, it must do very quietly. Perhaps I'm in the wrong ZIP code for the next steps? ↧ ↧ ROMAN SELEZNEV (AKA BULBA, AKA TRACK2, AKA NCUX) APPEARS IN US COURT IN GUAM July 9, 2014, 9:43 pm ≫ Next: New GameOver Zeus Variant uses FastFlux C&C ≪ Previous: E-ZPass Spam leads to Location Aware Malware $ 0 0 The media is buzzing about the arrest of hacker and stolen credit card vendor Roman Seleznev who has appeared in court in the US territory of Guam after being arrested in the Maldives. The story is growing into an international diplomatic spat as a Russian politician and member of the Duma, Valery Seleznev, is the father of the cyber criminal. In a statement from the Russian Foreign Ministry, the Russians accuse Maldives of ignoring their Bilateral Treaty of 1999 on Mutual Assistance in Criminal Matters. The statement says this is the third recent case of a similar situation, citing the examples of Viktor Bout and K.V. Yaroshenko as other recent cases where the US has forcibly taken a Russian citizen from a third country to stand trial in the United States. I strongly agree with the statement at the close of their statement, where they "strongly encourage our countryment to pay attention to the cautions posted by the Russian Foreign Ministry on their website about the risks associated with foreign travel, if there is a suspicion that U.S. law enforcement agencies can charge them with any crime." Who are these others who are mentioned? Viktor Bout (Виктор Анатольевич Бут) was arrested in Thailand in 2008 and extradited in 2010 to stand trial for terrorism charges for delivering anti-aircraft missiles to FARC in Colombia. He was convicted by a jury in Manhattan (More from The Guardian) Konstantin Yaroshenko was arrested in May 2010 in Liberia as a cocaine smuggler pilot when he landed his plane in Monrovia, Liberia and was arrested by the DEA as he tried to negotiate a contract for $4.5 million to deliver 5 tons of cocaine from Colombia to West Africa. Yaroshenko was knowingly working with smugglers who were raising funds for the Colombian terror group FARC. (See Superseding Indictment While I wouldn't put Seleznev on the same scale as Bout and Yaroshenko, he is definitely not small potatoes either. We wrote about Seleznev as part of the RICO racketeering case against the owners and operators of the Carder.su website. (See The Carder.su indictment: United States v. Kilobit et. al.) but that was only the first part of Seleznev's trouble. In the Kilobit indictment, the charges are that Seleznev did "Participate in a Racketeer Influenced Corrupt Organization [RICO]" and "Participated in a Conspiracy to Engage in a Racketeer Influenced Corrupt Organization." The whole group are described in the indictment like this: "The defendants herein, and others known and unknown, are members of, employed by, and associates of a criminal organization, hereafter referred to as "the Carder.su organization," whose members engage in acts of identity theft and financial fraud, including, but not limited to, acts involving trafficking in stolen means of identification; trafficking in, production and use of couterfeit identification documents; identity theft; trafficking in, production and use of unauthorized and counterfeit access devices; and bank fraud; and whose members interfere with interstate and foreign commerce through acts of identity theft and financial fraud. Members and associates of the Carder.su organization operate principally in Las Vegas, Nevada, and elsewhere. The important thing to understand about RICO is that as PART OF THE CORRUPT ORGANIZATION all of the charged members are sentenced as if the whole group did all of the crimes. What does that mean to Seleznev? In Las Vegas, Nevada, Seleznev is being charged with being part of a RICO group that is credited with directly causing, in actual measured and aggregated fraudulent transaction losses, $50,893,166.35!! But before Vegas gets their hands on him, Seleznev will face charges in the Western District of Washington for Case # 2:11-cr-0070-RAJ-1. In that case, Roman Seleznev, AKA TRACK2, AKA Roman Ivanov, AKA Ruben Samvelich, AKA nCuX, AKA Bulba, AKA bandysli64, AKA smaus, AKA Zagreb, AKA shmak is charged with: (Counts 1-5) Bank Fraud 18:1344 & 2 (6-13) Intentional Damage to a Protected Computer 18:1030(a)(5)(A) & 1030(c)(4)(B)(i) & 2 (14-21) Obtaining InformationFrom a Protected Computer 18:1030(a)(2) & 1030(c)(2)(ii) & 2 (22) Possession of Fifteen or More Unauthorized Access Devices 18:1029(a)(3) & 1029(c)(1)(A)(i) & 2 (23-24) Trafficking in Unauthorized Access Devices 18:1029(a)(2) & 1029(c)(1)(A)(i) & 2 (25-29) Aggravated Identity Theft 18:1028(a)(1) & 2 This 27 page indictment, filed March 3, 2011, was just unsealed on July 6, 2014 when Seleznev appeared in court in Guam. Washington charges that Seleznev "knowingly and willfully devised and executed and aided and abetted a scheme and artifice to defraud various financial institutions, including, but not limited to, Boeing Employees' Credit Union, Chase Bank, Capital One, Citibank, and Keybank, and to obtain moneys, funds, and credits under the custody and control of the banks by means of material false and fraudulent pretenses, representations and promises, as further described below." Seleznev would: 1. hack into retail businesses, 2. install malicious computer code onto those hacked computers, 3. and use the malware to steal credit card numbers from the victim businesses' customers 4. market and sell the stolen credit card numbers on "criminally inspired" websites 5. thus allowing these cards and the associated accounts to be used for fraudulent purposes by the customers of his service. Seleznev's malware primarily was controlled from a server named shmak.fvds.ru or smaus.fvds.ru at the IP address 188.120.225.66. A collection of malware found at the root site of that website, including malware named shmak, shmak2, kameo, hameo, zameo, dtc, dtc2, dtc4, rsca, remcomsvc, and others. Seleznev's websites for selling cards were primarily bulba.cc, secure.bulba.cc, Track2.name, and secure.Track2.name. The targeted businesses usually had several "point of sale" terminals "up front" and a "back of the house computer" which may have been a server or perhaps even just the manager's computer. Some of Seleznov's victims included: The Broadway Grill - 32,000 unique credit card numbers from Dec 1, 2009 to Oct 22, 2010 Grand Central Baking Company in Seattle, WA four Mad Pizza restaurants (three in Seattle, one in Tukwila, WA) Village Pizza in Anacortes, WA Casa Mia Italian in Yelm, WA. Schlotsky's Deli in Coeur d'Alene, Idaho Active Networks in Frostburg, MD Days Jewelry in Waterville, Maine Latitude Bar and Grill, NY, NY Mary's Pizza Shack in Sonoma, CA City News Stand in Chicago and Evanston, IL Bulba would advertise when he had new cards for sale, claiming as many as 17,000 "Fresh Dumps" (newly stolen and never before used for fraud) cards and offering guarantees, including free card replacement for cards that were declined. Seleznev/Bulba had such high quality, that the owners of the popular crdsu.su and carder.biz allowed Seleznev and others to assume Monopoly status as the preferred card vendors for their boards, which were extremely prevalent in the underground. According to the newly unsealed indictment, Seleznev personally stole (through his malware) more than 200,000 cards, and succesfully sold over 140,000 of those cards through his websites bulba.cc and Track2.name between November 15, 2010 and February 22, 2011, generating direct illicit profits in excess of $2,000,000 USD. Just the cards stolen by Seleznev at the Broadway Grill have been associated with $79,317 in fraudulent charges, and all of the cards stolen by Seleznev are responsible for actual fraud charges of at least $1,175,217.37. November 15-16, 2010, $83,490 in charges were made against Boeing Employees Credit Union cards. Jan 31-Feb 1, 2011, $30,716 in charges against BECU. Seleznev will have a hearing in Guam on July 22, and then be transferred to the Seattle courts. ↧ NEW GAMEOVER ZEUS VARIANT USES FASTFLUX C&C July 11, 2014, 5:53 am ≫ Next: Urgent Court Notice from GreenWinick Lawyers delivers malware ≪ Previous: Roman Seleznev (AKA Bulba, AKA Track2, AKA NCUX) appears in US Court in Guam $ 0 0 Over on the Malcovery Security Blog yesterday we covered a new version of GameOver Zeus (see: GameOver Zeus Mutates, Launches Attack ) that was distributed in three spam campaigns on July 10, 2014. At the bottom of that blog post, we're sharing a detailed "T3 Report" by analysts Brendan Griffin and Wayne Snow that gives all the details. In our reporting yesterday we mentioned that the new bot is using a Fast Flux Command & Control structure and that it is using a Domain Generation Algorithm to allow the malware distributed in the spam to locate and connect to the Command & Control servers. I wanted to geek that a bit deeper for those who want more details on both of those subjects. First, let's look at the Fast Flux. FAST FLUX COMMAND & CONTROLLED BOTNET Fast Flux is a technique that allows a criminal who controls many servers to obfuscate the true location of his server by building a tiered infrastructure. Sometimes there are additional "tiers" or levels of misdirection. We don't yet know how many layers there are in this newGOZ botnet. Image may be NSFW. Clik here to view. (click to enlarge) Here's the flow . . . 1. the newGOZ criminal pays the Cutwail spammers to send out emails to infect new victims 2. the Cutwail spammer sends out his emails. On July 10th, they were "Essentra Past Due" and emails imitating M&T Bank and NatWest Bank 3. while many people delete the emails, ignore the emails, or have them blocked by spam, SOME people click on the emails 4. the ".scr" email attachment infects their computer and starts generating "Domain Generation Algorithm" domains. 5. each domain is queried for. the Bot computers say "Hey, Internet! Does this domain exist?" 6. on July 10th, cfs50p1je5ljdfs3p7n17odtuw.biz existed ... "the Internet" said "Yes, this exists and NS1.ZAEHROMFUY.IN is the Nameserver that can tell you where it is." 7. When most nameservers tell the address of a computer, they give a "Time To Live" that says "The answer I'm giving you is probably good for 24 hours" or 2 days, or a week, or whatever. But the Nameserver used in a FastFlux Bot, like, NS1.ZAEHROMFUY.IN, usually gives a "Time To Live" answer that says "The answer I'm giving you is only good for about 5 minutes. After 5 minutes, you need to ask me again in case the address has changed." 8. NS1.ZAEHROMFUY.IN receives constant updates from "newGOZ Criminal" of servers all over the world (but mostly in Ukraine) that have been hacked. Almost every time you ask the nameserver "Where is the newGOZ domain?" it will give you a different answer. 9. the "FastFlux C&C" boxes are now running nginx proxy software that says "Whatever you ask me, I will ask the servers at the Evil Lair of newGOZ. Whatever the Evil Lair of newGOZ wants to say, I will pass back to you. 10. Updates from the Evil Lair get passed back THROUGH the FastFlux Proxy and give the newGOZ bots new malware or commands 11. All traffic to and from the newGOZ bot, whether it is the bot "checking in" or the criminal pushing an "update" goes through one of the proxies, which are constantly changing. FAST FLUX NEWGOZ RESOLUTIONS All of the servers (or workstations) in this table were used as Fast Flux C&C nodes last night by the newGOZ botnet. We'll keep tracking this with friends from ShadowServer, DissectCyber.com and others and sharing this information with our trusted partners, but I wanted to throw out this example. If you have ability to look at "Net Flow" for any of these computers, you may be able to help us locate "The Evil Lair of the newGOZ Criminal." (Which sounds like a lot more fun than just looking at packet dumps, doesn't it? Sorry, this isn't my job, it is my passion. Geeks have to convince themselves they are Fighting Evil or we would get bored. Since the first GOZ enabled the theft of $100 Million or so ( for more see as an example Crooks Seek Revival of GameOver Zeus Botnet where Brian even shares the FBI Wanted Poster of the guy who is thought to be behind Zeus. 2014-07-10 20:37:10-05 92.248.160.157 92.248.128.0/17 OLYMPUS-NSP-AS ZAO _AKADO-Ekaterinburg_,RU 30868 RU ripencc 2014-07-10 20:38:04-05 108.20.219.49 108.20.0.0/16 UUNET - MCI Communications Services, Inc. d/b/a Verizon Business,US 701 US arin 2014-07-10 20:38:36-05 113.163.13.252 113.163.0.0/19 VNPT-AS-VN VNPT Corp,VN 45899 VN apnic 2014-07-10 20:39:03-05 114.46.251.46 114.46.0.0/16 HINET Data Communication Business Group,TW 3462 TW apnic 2014-07-10 20:39:24-05 176.108.15.141 176.108.0.0/19 KADRTV-AS Cadr-TV LLE TVRC,CZ 57800 UA ripencc 2014-07-10 20:40:39-05 178.150.136.252 178.150.136.0/22 BANKINFORM-AS TOV _Bank-Inform_,UA 13188 UA ripencc 2014-07-10 20:40:52-05 37.25.4.162 37.25.0.0/19 BELCOMUA-AS ZAO _Belcom_,UA 25385 UA ripencc 2014-07-10 20:41:05-05 69.143.45.75 69.143.0.0/16 CMCS - Comcast Cable Communications, Inc.,US 33657 US arin 2014-07-10 20:41:18-05 77.242.172.30 77.242.172.0/24 UHT-AS UHT - Ukrainian High Technologies Ltd.,UA 30955 UA ripencc 2014-07-10 20:41:31-05 85.29.179.7 85.29.179.0/24 ORBITA-PLUS-AS ORBITA-PLUS Autonomous System,KZ 21299 KZ ripencc 2014-07-10 20:47:43-05 24.101.46.15 24.101.32.0/19 ACS-INTERNET - Armstrong Cable Services,US 27364 US arin 2014-07-10 20:47:56-05 37.115.246.222 37.115.0.0/16 KSNET-AS _Kyivstar_ PJSC,UA 15895 UA ripencc 2014-07-10 20:48:10-05 67.68.99.137 67.68.96.0/22 BACOM - Bell Canada,CA 577 CA arin 2014-07-10 20:48:23-05 70.24.225.245 70.24.224.0/22 BACOM - Bell Canada,CA 577 CA arin 2014-07-10 20:48:43-05 75.76.166.8 75.76.128.0/17 WOW-INTERNET - WideOpenWest Finance LLC,US 12083 US arin 2014-07-10 20:48:57-05 76.127.161.112 76.127.128.0/17 COMCAST-7015 - Comcast Cable Communications Holdings, Inc,US 7015 US arin 2014-07-10 20:49:21-05 91.197.171.38 91.197.168.0/22 INTRAFFIC-AS Intraffic LLC,UA 43658 UA ripencc 2014-07-10 20:49:44-05 99.248.110.218 99.224.0.0/11 ROGERS-CABLE - Rogers Cable Communications Inc.,CA 812 CA arin 2014-07-10 20:50:02-05 100.44.184.18 100.44.160.0/19 WAYPORT - Wayport, Inc.,US 14654 US arin 2014-07-10 20:52:54-05 109.207.127.59 109.207.112.0/20 TELELAN-AS Teleradiocompany TeleLan LLC,UA 196740 UA ripencc 2014-07-10 21:07:24-05 178.214.223.104 178.214.192.0/19 UOS Ukraine Optical Systems LLC,UA 42546 UA ripencc 2014-07-10 21:07:56-05 212.22.192.224 212.22.192.0/24 FREENET-AS Freenet Ltd.,UA 31148 UA ripencc 2014-07-10 21:08:11-05 31.133.118.121 31.133.118.0/24 ENTERRA-AS Private Enterprise _Enterra_,UA 48964 UA ripencc 2014-07-10 21:08:24-05 37.229.149.56 37.229.0.0/16 KSNET-AS _Kyivstar_ PJSC,UA 15895 UA ripencc 2014-07-10 21:08:45-05 46.119.77.105 46.119.0.0/16 KSNET-AS _Kyivstar_ PJSC,UA 15895 UA ripencc 2014-07-10 21:09:21-05 98.14.34.141 98.14.0.0/16 SCRR-12271 - Time Warner Cable Internet LLC,US 12271 US arin 2014-07-10 21:09:37-05 98.109.164.97 98.109.0.0/16 UUNET - MCI Communications Services, Inc. d/b/a Verizon Business,US 701 US arin 2014-07-10 21:12:28-05 109.162.0.21 109.162.0.0/18 KSNET-AS _Kyivstar_ PJSC,UA 15895 UA ripencc 2014-07-10 21:12:41-05 178.140.183.193 178.140.0.0/16 NCNET-AS OJSC Rostelecom,RU 42610 RU ripencc 2014-07-10 21:13:42-05 178.158.135.20 178.158.134.0/23 ISP-EASTNET-AS EAST.NET Ltd.,UA 50780 UA ripencc 2014-07-10 21:28:15-05 192.162.118.118 192.162.116.0/22 ANOXIN FIZICHNA OSOBA-PIDPRIEMEC ANOHIN IGOR VALENTINOVICH,UA 39056 UA ripencc 2014-07-10 21:28:18-05 208.120.58.109 208.120.0.0/18 SCRR-12271 - Time Warner Cable Internet LLC,US 12271 US arin 2014-07-10 21:28:18-05 213.111.221.67 213.111.192.0/18 MAINSTREAM-AS PP MainStream,UA 44924 UA ripencc 2014-07-10 21:28:18-05 24.207.209.129 24.207.128.0/17 CHARTER-NET-HKY-NC - Charter Communications,US 20115 US arin 2014-07-10 21:28:18-05 46.181.215.20 46.180.0.0/15 ELIGHT-AS E-Light-Telecom,RU 39927 RU ripencc 2014-07-10 21:28:19-05 68.45.64.5 68.44.0.0/15 CMCS - Comcast Cable Communications, Inc.,US 33659 US arin 2014-07-10 21:28:19-05 75.131.252.100 75.131.224.0/19 CHARTER-NET-HKY-NC - Charter Communications,US 20115 US arin 2014-07-10 21:28:19-05 91.196.60.108 91.196.60.0/22 ARHAT-AS PE Bondar TN,UA 50204 UA ripencc 2014-07-10 21:28:19-05 91.243.218.157 91.243.192.0/19 ID-TELECOM-AS Intellect Dnepr Telecom LLC,UA 59567 UA ripencc 2014-07-10 21:28:19-05 96.246.91.160 96.246.0.0/17 UUNET - MCI Communications Services, Inc. d/b/a Verizon Business,US 701 US arin 2014-07-10 21:28:19-05 134.249.11.2 134.249.0.0/16 KSNET-AS _Kyivstar_ PJSC,UA 15895 UA ripencc 2014-07-10 21:49:21-05 188.190.5.162 188.190.0.0/19 ASINTTEL Inttel Ltd.,UA 56370 UA ripencc 2014-07-10 21:49:22-05 5.248.110.252 5.248.0.0/16 KSNET-AS _Kyivstar_ PJSC,UA 15895 UA ripencc 2014-07-10 21:49:22-05 31.43.162.96 31.43.160.0/19 KRASNET-UA-AS Krasnet ltd.,UA 50576 UA ripencc 2014-07-10 21:49:22-05 31.135.144.54 31.135.144.0/22 Technical Centre Radio Systems Ltd.,UA 20539 UA ripencc 2014-07-10 21:49:22-05 37.112.195.140 37.112.192.0/22 KRSK-AS CJSC _ER-Telecom Holding_,RU 50544 RU ripencc 2014-07-10 21:49:22-05 46.119.181.97 46.118.0.0/15 KSNET-AS _Kyivstar_ PJSC,UA 15895 UA ripencc 2014-07-10 21:49:22-05 50.83.36.2 50.83.32.0/21 MEDIACOM-ENTERPRISE-BUSINESS - Mediacom Communications Corp,US 30036 US arin 2014-07-10 21:49:23-05 176.8.92.131 176.8.0.0/16 KSNET-AS _Kyivstar_ PJSC,UA 15895 UA ripencc 2014-07-10 21:49:23-05 176.98.12.218 176.98.0.0/19 CRYSTAL-AS Crystal Telecom Ltd,CZ 49889 UA ripencc 2014-07-10 21:49:23-05 178.137.8.215 178.137.0.0/17 KSNET-AS _Kyivstar_ PJSC,UA 15895 UA ripencc 2014-07-10 22:08:06-05 95.110.45.151 95.110.0.0/17 JSCBIS-AS OJSC _Bashinformsvyaz_,RU 28812 RU ripencc 2014-07-10 22:08:08-05 176.8.21.85 176.8.0.0/16 KSNET-AS _Kyivstar_ PJSC,UA 15895 UA ripencc 2014-07-10 22:08:08-05 178.150.89.211 178.150.89.0/24 BANKINFORM-AS TOV _Bank-Inform_,UA 13188 UA ripencc 2014-07-10 22:08:08-05 188.231.191.140 188.231.191.0/24 FREENET-AS Freenet Ltd.,UA 31148 UA ripencc 2014-07-10 22:08:08-05 80.66.79.74 80.66.76.0/22 RISS-AS LLC _Ris-Tel_,RU 20803 RU ripencc 2014-07-10 22:08:09-05 81.200.148.6 81.200.144.0/20 ARTEM-CATV-AS JSC Artemovskoye Interaktivnoe Televidenie,RU 41070 RU ripencc 2014-07-10 22:08:09-05 95.46.219.178 95.46.219.0/24 VITEBSK-TV-ISP-AS OAO Vitebskiy Oblastnoy Techno-Torgoviy Center Garant,BY 50528 CZ ripencc 2014-07-10 22:08:09-05 95.78.166.17 95.78.128.0/18 ERTH-CHEL-AS CJSC _ER-Telecom Holding_,RU 41661 RU ripencc 2014-07-10 22:29:38-05 178.214.169.234 178.214.160.0/19 LUGANET-AS ARTA Ltd,UA 39728 UA ripencc 2014-07-10 22:29:38-05 188.16.223.225 188.16.192.0/18 USI OJSC Rostelecom,RU 6828 RU ripencc 2014-07-10 22:29:38-05 194.246.105.173 194.246.104.0/23 ASN-FUJILINE Trade House _Inet_ Ltd,UA 31000 UA ripencc 2014-07-10 22:29:39-05 70.75.230.0 70.75.0.0/16 SHAW - Shaw Communications Inc.,CA 6327 CA arin 2014-07-10 22:29:39-05 78.137.17.91 78.137.0.0/19 MCLAUT-AS LLC _McLaut-Invest_,UA 25133 UA ripencc 2014-07-10 22:29:39-05 176.117.86.162 176.117.80.0/20 LURENET-AS PP _Lurenet_,UA 50643 UA ripencc 2014-07-10 22:48:09-05 213.111.163.205 213.111.128.0/18 ALNET-AS PP SKS-Lugan,UA 35804 UA ripencc 2014-07-10 22:48:10-05 99.249.29.20 99.249.0.0/16 ROGERS-CABLE - Rogers Cable Communications Inc.,CA 812 CA arin 2014-07-10 22:48:10-05 109.254.35.236 109.254.0.0/16 DEC-AS Donbass Electronic Communications Ltd.,UA 20590 UA ripencc 2014-07-10 22:48:10-05 136.169.151.67 136.169.128.0/19 UBN-AS OJSC _Ufanet_,RU 24955 RU ripencc 2014-07-10 22:48:10-05 176.102.209.127 176.102.192.0/19 KUTS-AS Center for Information Technologies _Fobos_ Ltd.,UA 39822 UA ripencc 2014-07-10 22:48:10-05 178.141.160.202 178.141.0.0/16 MTS-KRV-AS MTS OJSC,RU 44677 RU ripencc 2014-07-10 22:48:10-05 178.213.191.181 178.213.184.0/21 SKYNET-UA-AS FOP Shoruk Andriy Olexanderovich,UA 196777 UA ripencc 2014-07-10 22:48:10-05 184.152.102.159 184.152.0.0/16 SCRR-12271 - Time Warner Cable Internet LLC,US 12271 US arin 2014-07-10 22:48:10-05 213.110.137.77 213.110.128.0/19 SUNNET-AS PE Gritcun Oleksandr Viktorovich,UA 47889 UA ripencc 2014-07-10 23:08:56-05 91.219.254.25 91.219.254.0/24 MONOLITH-AS LLC MONOLITH.NET,UA 48230 UA ripencc 2014-07-10 23:08:58-05 109.87.83.213 109.87.80.0/22 BANKINFORM-AS TOV _Bank-Inform_,UA 13188 UA ripencc 2014-07-10 23:09:00-05 178.137.176.9 178.137.128.0/17 KSNET-AS _Kyivstar_ PJSC,UA 15895 UA ripencc 2014-07-10 23:09:00-05 78.109.46.210 78.109.46.0/24 SIBRON-AS Closed Joint Stock Company COMSTAR-Regiony,RU 13155 RU ripencc 2014-07-10 23:09:00-05 80.70.71.41 80.70.64.0/20 ENERGYTEL Energytel LLC,UA 51317 UA ripencc 2014-07-10 23:27:45-05 71.75.52.101 71.75.0.0/16 SCRR-11426 - Time Warner Cable Internet LLC,US 11426 US arin 2014-07-10 23:27:45-05 176.8.72.36 176.8.0.0/16 KSNET-AS _Kyivstar_ PJSC,UA 15895 UA ripencc 2014-07-10 23:27:45-05 178.74.214.94 178.74.192.0/18 EVEREST-AS _Everest_ Broadcasting Company Ltd,UA 49223 UA ripencc 2014-07-10 23:27:45-05 178.141.9.72 178.141.0.0/16 MTS-KRV-AS MTS OJSC,RU 44677 RU ripencc 2014-07-10 23:27:45-05 188.230.87.17 188.230.80.0/21 ABUA-AS LLC AB Ukraine,UA 43266 UA ripencc 2014-07-10 23:27:45-05 37.229.79.59 37.229.0.0/16 KSNET-AS _Kyivstar_ PJSC,UA 15895 UA ripencc 2014-07-10 23:27:45-05 62.16.38.131 62.16.32.0/19 FPIC-AS CJSC _COMSTAR-regions_,RU 15640 RU ripencc 2014-07-10 23:49:05-05 176.113.227.109 176.113.224.0/19 LUGANET-AS ARTA Ltd,UA 39728 UA ripencc 2014-07-10 23:49:05-05 193.106.184.92 193.106.184.0/22 BOSPOR-AS Bospor-Telecom LLC,UA 42238 UA ripencc 2014-07-10 23:49:05-05 46.172.231.154 46.172.224.0/19 TOPHOST-AS SPD Kurilov Sergiy Oleksandrovich,UA 45043 UA ripencc 2014-07-10 23:49:05-05 74.129.235.88 74.128.0.0/12 SCRR-10796 - Time Warner Cable Internet LLC,US 10796 US arin 2014-07-10 23:49:05-05 77.121.129.181 77.121.128.0/21 VOLIA-AS Kyivski Telekomunikatsiyni Merezhi LLC,UA 25229 UA ripencc 2014-07-10 23:49:05-05 78.27.159.112 78.27.128.0/18 DOMASHKA-AS Domashnya Merezha LLC,UA 15683 UA ripencc 2014-07-10 23:49:05-05 91.196.55.7 91.196.52.0/22 KOMITEX-AS PP KOM i TEX,UA 30886 UA ripencc 2014-07-10 23:49:06-05 94.153.23.170 94.153.0.0/16 KSNET-AS _Kyivstar_ PJSC,UA 15895 UA ripencc 2014-07-10 23:49:06-05 109.87.222.148 109.87.222.0/24 BANKINFORM-AS TOV _Bank-Inform_,UA 13188 UA ripencc 2014-07-11 00:07:17-05 178.215.178.112 178.215.176.0/20 FENIXVT-AS Private Enterprise Firma Fenix VT,RU 39399 UA ripencc 2014-07-11 00:07:19-05 195.90.130.19 195.90.128.0/18 ROSNET-AS OJSC Rostelecom,RU 6863 RU ripencc 2014-07-11 00:07:19-05 37.25.118.55 37.25.96.0/19 WILDPARK-AS ISP WildPark, Ukraine, Nikolaev,UA 31272 UA ripencc 2014-07-11 00:07:19-05 37.229.215.18 37.229.0.0/16 KSNET-AS _Kyivstar_ PJSC,UA 15895 UA ripencc 2014-07-11 00:07:19-05 87.244.34.238 87.244.32.0/21 SUNLINK-AS Sunlink Telecom ISP, Tula, Russia,RU 35401 RU ripencc 2014-07-11 00:07:19-05 91.219.233.40 91.219.232.0/22 REALWEB-AS Private Enterprise RealWeb,UA 41161 UA ripencc 2014-07-11 00:07:20-05 173.95.149.72 173.92.0.0/14 SCRR-11426 - Time Warner Cable Internet LLC,US 11426 US arin 2014-07-11 00:07:20-05 178.150.221.2 178.150.220.0/23 BANKINFORM-AS TOV _Bank-Inform_,UA 13188 UA ripencc 2014-07-11 00:07:20-05 178.151.165.182 178.151.165.0/24 BANKINFORM-AS TOV _Bank-Inform_,UA 13188 UA ripencc 2014-07-11 00:28:03-05 109.87.42.122 109.87.40.0/21 BANKINFORM-AS TOV _Bank-Inform_,UA 13188 UA ripencc 2014-07-11 00:28:04-05 109.200.228.156 109.200.224.0/19 BREEZE-NETWORK TOV TRK _Briz_,UA 34661 UA ripencc 2014-07-11 00:28:04-05 31.135.226.91 31.135.224.0/20 TRYTECH-AS Trytech Ltd.,RU 44056 RU ripencc 2014-07-11 00:28:04-05 46.172.145.109 46.172.128.0/19 UTEAM-AS Uteam LTD,UA 49125 UA ripencc 2014-07-11 00:49:18-05 109.229.198.37 109.229.192.0/19 PRONET_LV SIA _PRONETS_,LV 43075 LV ripencc 2014-07-11 00:49:20-05 178.165.98.17 178.165.64.0/18 CITYNET-AS Maxnet Autonomous System,UA 34700 UA ripencc 2014-07-11 00:49:20-05 195.114.145.69 195.114.144.0/20 DATAGROUP PRIVATE JOINT STOCK COMPANY _DATAGROUP_,UA 21219 UA ripencc 2014-07-11 00:49:20-05 5.58.15.61 5.58.0.0/18 NOLAN-AS Lanet Network Ltd,UA 43120 UA ripencc 2014-07-11 00:49:20-05 46.147.186.225 46.147.184.0/22 NEOLINK CJSC _ER-Telecom Holding_,RU 34590 RU ripencc 2014-07-11 00:49:20-05 46.219.50.56 46.219.50.0/24 FREENET-AS Freenet Ltd.,UA 31148 UA ripencc 2014-07-11 00:49:20-05 89.185.24.218 89.185.24.0/21 TVCOM-AS TVCOM Ltd.,UA 34092 UA ripencc 2014-07-11 00:49:20-05 94.158.73.89 94.158.64.0/20 BIGNET-AS PE Yuri Stanislavovich Demenin,UA 43668 UA ripencc 2014-07-11 00:49:20-05 95.47.151.247 95.47.148.0/22 TKS-AS Sumski Telecom Systems Ltd,UA 41967 CZ ripencc 2014-07-11 01:09:51-05 71.227.196.156 71.227.128.0/17 COMCAST-33650 - Comcast Cable Communications, Inc.,US 33650 US arin 2014-07-11 01:09:52-05 87.224.164.135 87.224.128.0/17 TELENET-AS OJSC Rostelecom,RU 35154 RU ripencc 2014-07-11 01:09:52-05 93.127.60.17 93.127.60.0/23 ALKAR-AS PRIVATE JOINT-STOCK COMPANY _FARLEP-INVEST_,RU 6703 UA ripencc 2014-07-11 01:09:52-05 109.227.127.25 109.227.96.0/19 MCLAUT-AS LLC _McLaut-Invest_,UA 25133 UA ripencc 2014-07-11 01:09:52-05 178.151.9.221 178.151.9.0/24 BANKINFORM-AS TOV _Bank-Inform_,UA 13188 UA ripencc 2014-07-11 01:09:52-05 178.151.154.233 178.151.154.0/24 BANKINFORM-AS TOV _Bank-Inform_,UA 13188 UA ripencc 2014-07-11 01:09:52-05 194.187.108.182 194.187.108.0/22 TERABIT TERABIT LLC,UA 29491 UA ripencc 2014-07-11 01:09:52-05 37.229.149.148 37.229.0.0/16 KSNET-AS _Kyivstar_ PJSC,UA 15895 UA ripencc 2014-07-11 01:09:52-05 46.118.151.246 46.118.0.0/16 KSNET-AS _Kyivstar_ PJSC,UA 15895 UA ripencc 2014-07-11 01:09:52-05 46.219.77.143 46.219.77.0/24 FREENET-AS Freenet Ltd.,UA 31148 UA ripencc 2014-07-11 01:28:30-05 178.137.232.234 178.137.128.0/17 KSNET-AS _Kyivstar_ PJSC,UA 15895 UA ripencc 2014-07-11 01:28:31-05 178.150.177.83 178.150.176.0/23 BANKINFORM-AS TOV _Bank-Inform_,UA 13188 UA ripencc 2014-07-11 01:28:31-05 178.151.14.223 178.151.14.0/24 BANKINFORM-AS TOV _Bank-Inform_,UA 13188 UA ripencc 2014-07-11 01:28:31-05 178.151.227.102 178.151.227.0/24 BANKINFORM-AS TOV _Bank-Inform_,UA 13188 UA ripencc 2014-07-11 01:28:31-05 188.231.170.228 188.231.170.0/24 FREENET-AS Freenet Ltd.,UA 31148 UA ripencc 2014-07-11 01:28:31-05 5.34.112.211 5.34.0.0/17 SATELCOM-AS SA-Telcom LLP,KZ 35566 KZ ripencc 2014-07-11 01:28:31-05 46.56.64.196 46.56.64.0/19 MTSBY-AS Mobile TeleSystems JLLC,BY 25106 BY ripencc 2014-07-11 01:28:31-05 46.173.171.188 46.173.168.0/22 BEREZHANY-AS Galitski Telekommunications Ltd,UA 49183 UA ripencc 2014-07-11 01:28:31-05 176.215.86.177 176.215.84.0/22 KRSK-AS CJSC _ER-Telecom Holding_,RU 50544 RU ripencc 2014-07-11 01:49:53-05 31.202.226.233 31.202.224.0/22 FORMAT-TV-AS MSP Format Ltd.,UA 6712 UA ripencc 2014-07-11 01:49:53-05 46.33.59.6 46.33.56.0/22 BLACKSEA TV Company _Black Sea_ Ltd,UA 31593 UA ripencc 2014-07-11 01:49:53-05 46.149.179.87 46.149.179.0/24 ISP-KIM-NET Kalush Information Network LTD,UA 197522 UA ripencc 2014-07-11 01:49:53-05 82.112.53.75 82.112.32.0/19 KTEL-AS K Telecom Ltd.,RU 48642 RU ripencc 2014-07-11 01:49:53-05 95.133.181.160 95.133.128.0/18 UKRTELNET JSC UKRTELECOM,UA 6849 UA ripencc 2014-07-11 01:49:53-05 109.86.112.170 109.86.112.0/22 BANKINFORM-AS TOV _Bank-Inform_,UA 13188 UA ripencc 2014-07-11 01:49:53-05 124.197.73.68 124.197.64.0/18 MOBILEONELTD-AS-AP MobileOne Ltd. Mobile/Internet Service Provider Singapore,SG 4773 SG apnic 2014-07-11 01:49:54-05 178.137.97.155 178.137.0.0/17 KSNET-AS _Kyivstar_ PJSC,UA 15895 UA ripencc 2014-07-11 01:49:54-05 217.112.220.202 217.112.208.0/20 TELEPORTSV PrivateJSC DataGroup,UA 15785 UA ripencc 2014-07-11 02:08:05-05 94.76.127.113 94.76.127.0/24 FREENET-AS Freenet Ltd.,UA 31148 UA ripencc 2014-07-11 02:08:05-05 213.231.6.9 213.231.0.0/18 BREEZE-NETWORK TOV TRK _Briz_,UA 34661 UA ripencc 2014-07-11 02:08:05-05 37.57.203.171 37.57.200.0/21 BANKINFORM-AS TOV _Bank-Inform_,UA 13188 UA ripencc 2014-07-11 02:29:13-05 31.40.33.46 31.40.32.0/19 GORSET-AS Gorodskaya Set Ltd.,RU 49776 RU ripencc 2014-07-11 02:29:13-05 37.53.73.152 37.52.0.0/14 6849 6877 UA ripencc 2014-07-11 02:29:14-05 46.119.213.230 46.119.0.0/16 KSNET-AS _Kyivstar_ PJSC,UA 15895 UA ripencc 2014-07-11 02:29:14-05 46.175.73.188 46.175.64.0/20 MEDIANA-AS Mediana ltd.,UA 56347 UA ripencc 2014-07-11 02:29:14-05 176.73.87.120 176.73.0.0/17 CAUCASUS-CABLE-SYSTEM Caucasus Online Ltd.,GE 20771 GE ripencc 2014-07-11 02:29:14-05 178.219.91.40 178.219.90.0/23 ASDNEPRONET Dnepronet Ltd.,UA 51069 UA ripencc 2014-07-11 02:29:14-05 185.14.102.108 185.14.102.0/24 ORBITA-PLUS-AS ORBITA-PLUS Autonomous System,KZ 21299 KZ ripencc 2014-07-11 02:29:14-05 195.225.147.101 195.225.144.0/22 UA-LINK-AS NPF LINK Ltd.,UA 34359 UA ripencc 2014-07-11 02:50:03-05 46.150.74.97 46.150.64.0/19 VIVANET-AS Vivanet Ltd,UA 44728 UA ripencc 2014-07-11 02:50:04-05 46.150.91.162 46.150.64.0/19 VIVANET-AS Vivanet Ltd,UA 44728 UA ripencc 2014-07-11 02:50:04-05 76.14.215.195 76.14.192.0/18 WAVE-CABLE - Wave Broadband,US 32107 US arin 2014-07-11 02:50:04-05 82.193.220.254 82.193.192.0/19 VODATEL-AS Metronet telekomunikacije d.d.,HR 25528 HR ripencc 2014-07-11 02:50:04-05 178.136.227.61 178.136.226.0/23 ALKAR-AS PRIVATE JOINT-STOCK COMPANY _FARLEP-INVEST_,RU 6703 UA ripencc 2014-07-11 02:50:04-05 178.137.69.209 178.137.0.0/17 KSNET-AS _Kyivstar_ PJSC,UA 15895 UA ripencc 2014-07-11 02:50:04-05 194.28.176.201 194.28.176.0/22 KUZNETSOVSK-AS FOP Chaika Nadija Jakivna,UA 197073 UA ripencc 2014-07-11 02:50:04-05 212.87.183.197 212.87.160.0/19 EDN-AS Online Technologies LTD,UA 45025 UA ripencc 2014-07-11 02:50:04-05 213.231.12.80 213.231.0.0/18 BREEZE-NETWORK TOV TRK _Briz_,UA 34661 UA ripencc 2014-07-11 02:50:04-05 46.119.175.13 46.119.0.0/16 KSNET-AS _Kyivstar_ PJSC,UA 15895 UA ripencc 2014-07-11 03:09:01-05 46.33.50.175 46.33.48.0/21 LIS Telecompany LiS LTD,UA 35588 UA ripencc 2014-07-11 03:09:04-05 46.98.237.27 46.98.0.0/16 FREGAT-AS ISP _Fregat_ Ltd.,UA 15377 UA ripencc 2014-07-11 03:09:04-05 46.185.73.100 46.185.64.0/18 KSNET-AS _Kyivstar_ PJSC,UA 15895 UA ripencc 2014-07-11 03:09:04-05 79.164.171.236 79.164.0.0/16 CNT-AS OJSC Central telegraph,RU 8615 RU ripencc 2014-07-11 03:09:04-05 91.244.137.151 91.244.128.0/20 PERVOMAYSK-AS PP _SKS-Pervomaysk_,UA 44798 UA ripencc 2014-07-11 03:09:05-05 109.86.234.51 109.86.232.0/21 BANKINFORM-AS TOV _Bank-Inform_,UA 13188 UA ripencc 2014-07-11 03:09:05-05 109.207.121.193 109.207.112.0/20 TELELAN-AS Teleradiocompany TeleLan LLC,UA 196740 UA ripencc 2014-07-11 03:09:05-05 176.108.235.203 176.108.232.0/22 SKM-AS PE Yaremenko O.V.,UA 39422 UA ripencc 2014-07-11 03:09:05-05 193.106.82.45 193.106.80.0/22 DATAGROUP PRIVATE JOINT STOCK COMPANY _DATAGROUP_,UA 21219 UA ripencc 2014-07-11 03:09:05-05 31.129.65.152 31.129.64.0/19 ASDNEPRONET Dnepronet Ltd.,UA 51069 UA ripencc 2014-07-11 03:09:05-05 37.232.181.13 37.232.160.0/19 INTERNET-CENTER-AS Net By Net Holding LLC,RU 42420 RU ripencc 2014-07-11 03:29:59-05 109.201.240.84 109.201.224.0/19 VOLIA-AS Kyivski Telekomunikatsiyni Merezhi LLC,UA 25229 UA ripencc 2014-07-11 03:30:00-05 141.101.11.69 141.101.0.0/19 WILDPARK-AS ISP WildPark, Ukraine, Nikolaev,UA 31272 UA ripencc 2014-07-11 03:30:00-05 188.230.1.99 188.230.0.0/21 ABUA-AS LLC AB Ukraine,UA 43266 UA ripencc 2014-07-11 03:30:01-05 46.119.134.13 46.118.0.0/15 KSNET-AS _Kyivstar_ PJSC,UA 15895 UA ripencc 2014-07-11 03:30:01-05 77.79.140.237 77.79.128.0/18 UBN-AS OJSC _Ufanet_,RU 24955 RU ripencc 2014-07-11 03:30:01-05 77.121.125.112 77.121.96.0/19 VOLIA-AS Kyivski Telekomunikatsiyni Merezhi LLC,UA 25229 UA ripencc 2014-07-11 03:30:01-05 77.123.241.141 77.123.224.0/19 IVC IVC-Donbass Ltd,UA 48169 UA ripencc 2014-07-11 03:48:03-05 213.231.4.163 213.231.0.0/18 BREEZE-NETWORK TOV TRK _Briz_,UA 34661 UA ripencc 2014-07-11 03:48:03-05 5.248.133.146 5.248.0.0/16 KSNET-AS _Kyivstar_ PJSC,UA 15895 UA ripencc 2014-07-11 03:48:03-05 81.163.136.160 81.163.128.0/19 DIDAN-AS Didan Group LTD,UA 47694 UA ripencc 2014-07-11 03:48:03-05 91.244.232.200 91.244.232.0/22 VITA-AS Teleradiokompaniya Vizit-A Limited Liability Company,UA 197175 UA ripencc 2014-07-11 03:48:03-05 176.112.17.229 176.112.0.0/19 MAINSTREAM-AS PP MainStream,UA 44924 UA ripencc 2014-07-11 03:48:03-05 176.124.1.31 176.124.0.0/19 DIDAN-AS Didan Group LTD,UA 47694 UA ripencc 2014-07-11 03:48:03-05 193.93.238.13 193.93.236.0/22 STAVSET-AS Kvartal Plus Ltd,RU 49325 RU ripencc 2014-07-11 04:09:03-05 46.118.136.44 46.118.0.0/16 KSNET-AS _Kyivstar_ PJSC,UA 15895 UA ripencc 2014-07-11 04:09:05-05 46.172.128.249 46.172.128.0/19 UTEAM-AS Uteam LTD,UA 49125 UA ripencc 2014-07-11 04:09:05-05 94.41.219.215 94.41.192.0/18 UBN-AS OJSC _Ufanet_,RU 24955 RU ripencc 2014-07-11 04:09:05-05 109.162.59.249 109.162.0.0/18 KSNET-AS _Kyivstar_ PJSC,UA 15895 UA ripencc 2014-07-11 04:09:05-05 178.45.188.246 178.45.160.0/19 OJSC Rostelecom,RU 15500 RU ripencc 2014-07-11 04:09:05-05 178.88.215.41 178.88.0.0/16 KAZTELECOM-AS JSC Kazakhtelecom,KZ 9198 KZ ripencc 2014-07-11 04:09:05-05 188.163.29.68 188.163.0.0/17 KSNET-AS _Kyivstar_ PJSC,UA 15895 UA ripencc 2014-07-11 04:09:05-05 5.14.25.76 5.12.0.0/14 RCS-RDS RCS & RDS SA,RO 8708 RO ripencc 2014-07-11 04:09:05-05 5.248.99.163 5.248.0.0/16 KSNET-AS _Kyivstar_ PJSC,UA 15895 UA ripencc 2014-07-11 04:27:48-05 178.151.23.241 178.151.22.0/23 BANKINFORM-AS TOV _Bank-Inform_,UA 13188 UA ripencc 2014-07-11 04:27:50-05 31.169.23.129 31.169.20.0/22 DTVKZ-AS JSC Kazakhtelecom,KZ 39725 KZ ripencc 2014-07-11 04:27:50-05 77.122.235.167 77.122.192.0/18 VOLIA-AS Kyivski Telekomunikatsiyni Merezhi LLC,UA 25229 UA ripencc 2014-07-11 04:27:50-05 78.62.94.153 78.62.80.0/20 TEOLTAB TEO LT AB Autonomous System,LT 8764 LT ripencc 2014-07-11 04:27:50-05 89.209.96.231 89.209.0.0/16 MTS MTS OJSC,RU 8359 UA ripencc 2014-07-11 04:27:50-05 93.79.143.194 93.79.128.0/17 VOLIA-AS Kyivski Telekomunikatsiyni Merezhi LLC,UA 25229 UA ripencc 2014-07-11 04:27:50-05 176.8.79.228 176.8.0.0/16 KSNET-AS _Kyivstar_ PJSC,UA 15895 UA ripencc 2014-07-11 04:27:50-05 178.141.98.171 178.141.0.0/16 MTS-KRV-AS MTS OJSC,RU 44677 RU ripencc 2014-07-11 04:49:18-05 176.113.146.32 176.113.144.0/20 BELICOM-AS FOP Bilenkiy Olexander Naumovich,UA 44010 UA ripencc 2014-07-11 04:49:21-05 178.137.109.91 178.137.0.0/17 KSNET-AS _Kyivstar_ PJSC,UA 15895 UA ripencc 2014-07-11 04:49:21-05 213.111.226.174 213.111.192.0/18 MAINSTREAM-AS PP MainStream,UA 44924 UA ripencc 2014-07-11 04:49:21-05 217.73.84.131 217.73.80.0/21 INFOMIR-NET Infomir JSC,UA 44291 UA ripencc 2014-07-11 04:49:21-05 5.20.162.237 5.20.160.0/19 CGATES-AS UAB _Cgates_,LT 21412 LT ripencc 2014-07-11 04:49:21-05 5.105.1.241 5.105.0.0/16 CDS-AS Cifrovye Dispetcherskie Sistemy,UA 43554 UA ripencc 2014-07-11 04:49:21-05 77.122.193.42 77.122.192.0/18 VOLIA-AS Kyivski Telekomunikatsiyni Merezhi LLC,UA 25229 UA ripencc 2014-07-11 04:49:21-05 91.225.162.98 91.225.160.0/22 ASSPDCHERNEGA SPD Chernega Aleksandr Anatolevich,UA 56400 UA ripencc 2014-07-11 04:49:21-05 91.236.249.33 91.236.248.0/22 SNAK-AS IP-Connect LLC,UA 57944 UA ripencc 2014-07-11 04:49:21-05 91.244.139.49 91.244.128.0/20 PERVOMAYSK-AS PP _SKS-Pervomaysk_,UA 44798 UA ripencc 2014-07-11 04:49:21-05 109.86.76.58 109.86.64.0/20 BANKINFORM-AS TOV _Bank-Inform_,UA 13188 UA ripencc 2014-07-11 04:49:21-05 176.36.67.204 176.36.0.0/14 LANETUA-AS Lanet Network Ltd.,UA 39608 UA ripencc 2014-07-11 05:08:15-05 46.46.96.199 46.46.64.0/18 FLAGMAN-AS TOV _Flagman Telecom_,UA 48045 UA ripencc 2014-07-11 05:08:16-05 46.149.178.203 46.149.176.0/20 ISP-KIM-NET Kalush Information Network LTD,UA 197522 UA ripencc 2014-07-11 05:08:16-05 95.37.213.26 95.37.128.0/17 NMTS-AS OJSC Rostelecom,RU 25405 RU ripencc 2014-07-11 05:08:16-05 178.251.109.168 178.251.104.0/21 DATALINE-AS Dataline LLC,UA 35297 UA ripencc 2014-07-11 05:08:17-05 31.41.128.57 31.41.128.0/21 ANOXIN FIZICHNA OSOBA-PIDPRIEMEC ANOHIN IGOR VALENTINOVICH,UA 39056 UA ripencc 2014-07-11 05:27:32-05 81.90.233.231 81.90.233.0/24 RADIOCOM-AS RadioCom ISP Autonomous System,UA 25071 UA ripencc 2014-07-11 05:27:32-05 81.162.70.217 81.162.64.0/20 GIGABYTE-AS Private Company Center for Development Information Technology _Gigabyte_,UA 198293 UA ripencc 2014-07-11 05:27:32-05 89.44.89.68 89.44.88.0/22 DNC-AS IM Data Network Communication SRL,MD 41053 RO ripencc 2014-07-11 05:27:32-05 91.244.148.241 91.244.144.0/21 PERVOMAYSK-AS PP _SKS-Pervomaysk_,UA 44798 UA ripencc 2014-07-11 05:27:32-05 188.168.94.122 188.168.0.0/16 TTK-RTL Closed Joint Stock Company TransTeleCom,RU 15774 RU ripencc 2014-07-11 05:27:32-05 62.80.161.77 62.80.160.0/19 INTERTELECOM-AS PJSC Inter-Telecom,UA 25386 UA ripencc 2014-07-11 05:30:03-05 198.105.254.240 198.105.254.0/24 SGINC - Search Guide Inc,US 36029 US arin 2014-07-11 05:30:03-05 198.105.244.240 198.105.244.0/24 SGINC - Search Guide Inc,US 36029 US arin ↧ URGENT COURT NOTICE FROM GREENWINICK LAWYERS DELIVERS MALWARE July 13, 2014, 6:31 am ≫ Next: .pif files, Polish spam from Orange, and Tiny Banker (Tinba) ≪ Previous: New GameOver Zeus Variant uses FastFlux C&C $ 0 0 I spent some time yesterday in the Malcovery Security Spam Data Mine looking at the E-Z Pass malware campaign. The ASProx spammers behind that campaign have moved on to Court Notice again . . . Subjects like these: * Hearing of your case in Court No# * Notice of appearance * Notice of appearance in court No# * Notice to Appear * Notice to Appear in Court * Notice to appear in court No# * Urgent court notice * Urgent court Notice No# (All of the subjects that have "No#" are followed by a four digit integer.) Image may be NSFW. Clik here to view. (click to enlarge) As normal, the spammers for these "Court Appearance" spam campaigns have just grabbed an innocent law firm to imitate. No indication of any real problem at Green Winick, but I sure wish one or more of these abused law firms would step up and file a "John Doe" lawsuit against these spammers so we could get some civil discovery going on! These are the same criminals who have Previously imitated other law firms including Jones Day (jonesday.com), Latham Watkins (lw.com), Hogan Lovells (hoganlovells.com), McDermitt, Will & Emery (wme.com), and many more! Come on! Let's go get these spammers and the malware authors that pay them! We've seen 88 destination hosts between July 10th and this morning (list below) but it is likely there are many more! When malware spammers use malicious links in their email instead of attachments, they tend to have a much better success rate if they deliver unique URLs for every recipient. That is what is happening in this case, and what always happens in these ASProx / Kuluoz spam campaigns. An encoded pseudo-directory is used in the path portion of the URL, which is combined with rotating through hundreds of 'pre-compromised' websites to host their malicious content. Four patterns in the path portion of the URL are better indicators as we believe there will be MANY more destination hosts. * tmp/api/…STUFF…=/notice * components/api/…STUFF…=/notice * wp-content/api/…STUFF…=/notice * capitulo/components/api/…STUFF...=/notice where "...STUFF..." is an encoding that we believe is related to the original recipient's email address, but have been unable to confirm at this time. http:// arhiconigroup.com / wp-content / api / pwCYg4Ac5gk0WlQIVFEkRSPGL2E7vZhP8Qh4LMGbbAk= /notice (to protect the spam donor, the pwCYg... string above has been slightly altered. If you want to work on de-coding, let me know and I'm happy to provide a couple hundred non-altered strings.) Just like with last week's E-Z Pass spam campaign, visiting the destination website results in a uniquely geo-coded drop .zip file that contains a .exe file. As an example, when downloading from my home in Birmingham Alabama where my zip code is 35242, the copy I received was named: Notice_Birmingham_35242.zip which contained Notice_Birmingham_35242.exe, which is icon'ed in such a way that it appears to be a Microsoft Word document. The MD5 of my '.exe' was: 5c255479cb9283fea75284c68afeb7d4 The VirusTotal report for my .exe is here: VirusTotal Report (7 of 53 detects) Extra credit points to Kaspersky and Norman for useful and accurate naming ! Kaspersky = Net-Worm.Win32.Aspxor.bpyb Norman = Kuluoz.EP Each of the 88 destination websites that we observed was likely compromised to host the malware. We do not believe these are necessarily "Bad Websites" but they either have a vulnerability or have had the webmaster credentials stolen by criminals. If these are YOUR website - look for one of those directories I mentioned ... /tmp/api/ /components/api/ /wp-content/api/ /capitulo/components/api/ www.metcalfplumbing.com www.mikevanhattum.nl www.mieszkaniaradomsko.pl www.millionairemakeovertour.com www.mkefalas.com www.moldovatourism.ro www.mobitrove.com www.modultyp.com www.mommyabc.com www.monsterscalper.com www.myconcilium.de www.nellalongari.com www.northsidecardetailers.com.au www.parasitose.de www.paulruminski.eu www.petitecoach.com www.phasebooks.net www.plr-content.com www.profimercadeo.com www.propertyumbrellablueprint.com www.proviewhomeservices.com www.puntanews.com.uy www.qifc.ir www.rado-adventures.com www.rantandraveweddingplanning.com www.registrosakasicos.es www.rimaconsulting.com www.romiko.pl www.saffronelectronics.co.uk www.sasregion.com www.saxonthewall.com www.sealscandinavia.se www.stkatharinedrexel.org www.tecza.org www.theanimationacademy.com www.thehitekgroup.com www.tusoco.com www.urmasphoto.com www.vicmy.net www.viscom-online.com www.vtretailers.com www.warp.org.pl www.webelonghere.ca www.weihnachten-total.de www.wesele.eu www.whistlereh.com www.wicta.nl www.widitec.com.br www.wonderlandinteractive.dk www.wpprophet.com www.xin8.org www.zabytkowe.net www.zeitgeistportugal.org www.zmianywpodatkach.pl www.znamsiebie.pl www.zuidoost-brabant.nl www.zs1grodzisk.pl yourmentoraffiliatemarketing.com atenea.edu.ec comopuedoblanquearmisdientes.com arhiconigroup.com chris-coupe.com drnancycooper.com ian-mcconnell.com izkigolf.com kalemaquil.com kingdommessengernetwork.com ↧ Remove ADS Viewing all 265 articles First Page Page 2 Page 3 Page 4 Page 5 Page 6 ... Last Page Browse latest View live -------------------------------------------------------------------------------- Search RSSing.com -------------------------------------------------------------------------------- * RSSing>> * Latest * Popular * Top Rated * Trending © 2024 //www.rssing.com