blog.dynamoo.com Open in urlscan Pro
2a00:1450:4001:831::2013  Public Scan

Submitted URL: http://blog.dynamoo.com/
Effective URL: https://blog.dynamoo.com/
Submission: On December 16 via manual from GB — Scanned from GB

Form analysis 0 forms found in the DOM

Text Content

DYNAMOO'S BLOG

Malware, spam, scams and random stuff, by Conrad Longmore.




LINK LIST

 * Blogger.com
 * Dynamoo's Blog
 * Dynamoo.com
 * Get Updates on Twitter






SPONSORED BY..





WEDNESDAY, 24 FEBRUARY 2021


UPDATED 3NT SOLUTIONS LLP / INFERNO.NAME / V3SERVERS.NET IP RANGES (2021
EDITION)





It's been about a zillion years (well, OK it was 2017) when I last published a
list of IPs belonging to 3NT Solutions LLP that you probably want to block.
Their name came up yet again in something I was looking at, and I was slightly
surprised to see that the old list was still somewhat valid. However a bit of
research found some new ranges and some that have been potentially cleaned up.



Current

5.45.64.0/19
5.61.32.0/19
37.1.192.0/19
37.252.0.0/20
46.22.211.0/25
46.22.211.128/26
80.79.124.128/26
91.193.180.0/22
92.48.122.0/28
92.48.122.16/28
92.48.122.32/28
92.48.122.48/28
130.0.232.0/21
185.4.64.0/22
188.116.27.0/24
212.95.54.0/24
212.95.58.0/24
212.95.63.0/24

Potentially clean

95.168.165.0/24
95.168.173.0/24
95.168.177.0/24
95.168.178.0/24
95.168.191.0/24
184.154.38.40/29



Posted by Conrad Longmore at 17:08 No comments:
Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest
Labels: Evil Network, inferno.name, Serbia




TUESDAY, 24 NOVEMBER 2020


WEBSITES OWNED BY PHILIP JOHN SABIN AND ASSOCIATED COMPANIES



Apropos of nothing, all these websites are hosted on 212.230.207.100 to
213.230.207.109 (Netcalibre, UK) and appear to be owned and controlled by Philip
John Sabin and/or Luxury Sleuth Ltd (11482506), We Just Compare Ltd (12485232).
Funnily enough I can't find an ICO registration for these companies, maybe that
just me doing it wrong. Perhaps anyone who knows it can add something to the
comments?

www.britishluxuries.com
www.couponsleuth.co.uk
www.delivermeevents.co.uk
www.delivermeoffers.co.uk
www.delivermeoffers.com
www.distinguishedclub.co.uk
www.distinguisheddata.co.uk
www.distinguishedtraveller.co.uk
www.easylawnsltd.com
www.eventsleuth.co.uk
www.exclusive-travel-club.com
www.filmsleuth.co.uk
www.fusina.co.uk
www.grandcartours.com
www.homeimprovementsleuth.co.uk
www.investingtrends.co.uk
www.investmentsleuth.com
www.journeysofdistinction.co.uk
www.leads4sale.co.uk
www.leadsleuth.co.uk
www.luxurycartours.com
www.luxury-rallies.co.uk
www.luxuryrallies.com
www.luxurysleuth.co.uk
www.luxurysleuth.com
www.luxuryupdates.co.uk
www.mailhubs.co.uk
www.mxchecker.com
www.payhound.co.uk
www.savvyinvesting.co.uk
www.sleuth.media.
www.sleuthmarketing.co.uk
www.thepropertysleuth.co.uk
www.thriveland.co.uk
www.travellead.uk.
www.travellerstrust.com
www.travelsleuth.co.uk
www.travelsleuth.com
www.travelsleuth.uk.
www.usesend.co.uk
www.wejustcompare.co.uk
www.wejustcompare.com
www.wejustentertain.com
www.wejustinsure.com
www.wejustinvest.com
www.whichfuneralplans.wejustcompare.com
www.worldtradingpartners.com
www.worldtravelpartners.co.
www.worldtravelpartners.co.uk
www.wtplimited.com
www.youaregorgeous.co.uk
www.yourpricecomparison.com



Posted by Conrad Longmore at 10:16 No comments:
Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest
Labels: Data Protection




MONDAY, 18 MARCH 2019


"CENTRAL INTELLIGENCE AGENCY - CASE #79238516" EXTORTION SPAM



I've seen various extortion spams over the past 12 months or so, but this one
has a particularly vicious twist.

If you haven't seen one of these before - it's just a spam, randomly sent to
your email address. You can safely ignore it.



> From:    Liza Guest [liza-guest@eosj.cia-gov-it.tk]
> Reply-To:    liza-guest@eosj.cia-gov-it.tk
> To:    [redacted]
> Date:    18 Mar 2019, 06:33
> Subject:    Central Intelligence Agency - Case #79238516

> 

> Case #79238516
> Distribution and storage of pornographic electronic materials involving
> underage children.
>    
>    
> My name is Liza Guest and I am a technical collection officer working for
> Central Intelligence Agency.
>    
> It has come to my attention that your personal details including your email
> address ([redacted]) are listed in case #79238516.
>    
> The following details are listed in the document's attachment:
>    
>  * Your personal details,
>  * Home address,
>  * Work address,
>  * List of relatives and their contact information.
> 
>    
>    
> Case #79238516 is part of a large international operation set to arrest more
> than 2000 individuals suspected of paedophilia in 27 countries.
>    
> The data which could be used to acquire your personal information:
>    
>  * Your ISP web browsing history,
>  * DNS queries history and connection logs,
>  * Deep web .onion browsing and/or connection sharing,
>  * Online chat-room logs,
>  * Social media activity log.
> 
>    
> The first arrests are scheduled for April 8, 2019.
>    
> Why am I contacting you ?
>    
> I read the documentation and I know you are a wealthy person who may be
> concerned about reputation.
>    
> I am one of several people who have access to those documents and I have
> enough security clearance to amend and remove your details from this case.
> Here is my proposition.
>    
> Transfer exactly $10,000 USD (ten thousand dollars - about 2.5 BTC) through
> Bitcoin network to this special bitcoin address:
>    
> 3QTV16BBsaEBVuwZv8wCjEgWZTKVVQPJ3h
>    
> You can transfer funds with online bitcoin exchanges such as Coinbase,
> Bitstamp or Coinmama. The deadline is March 27, 2019 (I need few days to
> access and edit the files).
>    
> Upon confirming your transfer I will take care of all the files linked to you
> and you can rest assured no one will bother you.
>    
> Please do not contact me. I will contact you and confirm only when I see the
> valid transfer.
>    
> Regards,
> Liza Guest
>    
> Technical Collection Officer
> Directorate of Science and Technology
> Central Intelligence Agency


Another version comes "from" tannerlynch@oiks.cia-gov-it.gq and solicits
payments to 32ngJWq6YYGUfvCbj3Ji7MNSnqi3rdM5qa. There are probably others. At
the time of writing, neither of these two Bitcoin wallets had received any
payment.

Posted by Conrad Longmore at 15:57 1 comment:
Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest
Labels: Bitcoin, Extortion, Scams, Spam



TUESDAY, 22 MAY 2018


PHISHING AND FRAUDULENT SITES HOSTED ON 188.241.58.60 (QHOSTER)



Nigerian registrants. Dodgy Eastern European  host offering bulletproof and
anonymous hosting. Yup, I very much doubt there is anything legitimate at all
hosted on 188.241.58.60.. or indeed any part of Qhoster's network.

237buzz.com
255page.ga
702mine.com
779999977.com
a1cargomovers.com
abtprinting.com
adassco.com
admincamac.co.uk
afazendaideal.ml
afflluenceindia.com
africheck.com
alamiranut.com
alexandrahospitals.com
alliarnce.org.uk
allseaship.com
amba-medias.com
amiicogroup.com
andrzejkupnopark.eu
anook.info
ansaexpress.com
antrackdiplomaticcs.com
apidexconstruction.com
aramexbe.com
arshland.com
artyschat.com
atlanticfforum.com
aughana.com
battlegrounds-arena.com
baugeruest-handel.com
bevadgmbh.com
billdiamondfinance.co.uk
binaryoptionsmonitor.com
binco-sale.com
bit-masters.com
bitcoincashold.com
bitcoinsdrugsrehab.com
bitmain-alliances.com
bitmamashop.com
blecoman.com
bmpro.info
bourseafrique.com
britannia-pharmaceutical.co.uk
btccap.biz
btctriplermachine.com
buycounterfeitmoneys.com
calvinscott.biz
cameroonianbeauties.com
candodvillahotel.com
carphonewarehouse-eu.com
centroculturadigital.com
certificatesshop.com
chainconnect.co
chaseoffshoreonline.tk
chondomonitor.com
citydiaryfarms.com
classicdeliverycourier.com
clickhereforgiveaway.site
clickhereforgiveaway.xyz
cloud-bigfile.com
cncoslight-zh.com
cnximgang.com
coca-colafinancedept.com
coflaxfluidhandling.com
coinminners.com
coinrxstore.com
compasseguip.com
confirmedsoft.us
cosm0-hk.com
cosmosport24.com
creditonfcu.com
crewlinked.com
criagent.com
crypto023.com
cryptominingtechnology.com
cryptoshifters.com
cs-oilfeild.com
cureonlinepharmacy.org
denverlaserhairremoval.co
divecastle.com
dlnamicatrade.com
double-bitcoins-legit.com
eastmanimpex.cam
ebid-tg.com
efceosaudi.com
elitecertifiedhack.com
emailtime.info
ethiopianairilines.com
eurocertificationcentre.eu
fabftifun.com
faircloths.co.uk
fastcoine.com
fastestfingersfirst.com
fidelity-investment.co.uk
findingthepropercode.com
firstsuorceinc.com
forvisitingthankyou.com
fotesale.com
front-dashboard.com
gdp-international.com
general-funds.com
generate-dcash.biz
gettinginonthelow.com
global-news.center
globalinkscobsult.com
globalinksconsult.com
gmb-trade.com
goimsa.info
grand-sale.com
grantersmultiservices.com
greetapex.com
guaranteecds.com
hackers-list.com.de
harpack-ulma.com
heraeu.com
hereweareonit.com
hlroyoung.com
horizonpartnerrsltd.com
houseofspells.com
hsbrands-int.ml
humer1adminka.com
hyip.co.in
hyipcave.com
idexpresscargo.com
inlinefornine.com
interseadrill.com
item-desc.com
jdfrencis.com
jonihoppershowcase.com
kcf-th.com
kececiprofile.com
kencanafishing.com
kiingsay.com
kindres.com
kindres.de
kippaskagit.com
kmsinfoservice.com
ks-prod.com
lane-pres.com
legitrxonline.club
lifegoalsdevelopmentschool.com
litbitcoinembassy.com
littlerockbitcoins.com
live-rx-store.com
loactrippleser.ga
loan-assistance.com
loan-dealer.com
loudiclear.com
lurnentum.com
luwiex.com
manarpso.com
mannhiem.in
maomanlodocs.cf
marshawoifesquire.com
mcmg-tech.com
meetcameroonians.com
meetup4real.com
megachemstoreonline.com
miamibeachcoin.com
microclicker.com
mile22-casting.com
miningcrux.com
mission4christministry.com
movimientorevolucionariodelpueblo.org
ms-fi.com
mst4sale.com
mysite111.com
neatwaytogettheninth.com
neusportltd.com
news-world.center
nexttys.com
nightcapdice.com
ninthinline.com
nlsteinweg.com
nomuta.com
noworri.com
obsgruop.com
offshoreseadrill.com
onehereisreservedforyou.com
online-citibankgroup.com
ontothenextgame.com
opcolage.com
orifiameglobal.com
ourskynet.com
oxfords-pay.com
parcelservicess.com
pharmas4plus.com
plccsolutions.com
psypharm.com
ptochart.com
quicktitletransfer.com
rashedal-wataniagroup.com
rawgarner.com
realbuyrx.com
recordspharm.com
researchchem4us.com
resumedatabase11.xyz
rnailb.com
rnarhaba.com
ro-noutati-mondene.ml
robnsaconsult.com
rock-sale.com
rosenbaumcontemporarygroup.com
royalstandard.ga
rumlt.in
rush-sale.com
seachiefs.com
seguradoravirtual.com
seosenior.com
service-infoo.com
she-afro.com
shippingdynamics.com
showbarghana.com
siglobal.org
simplyitaly.dk
simplyitaly.it
skillocademy.com
sms-red-online.ga
solid-sale.com
southchina-sea.net
srcoin.ca
srnec-cn.com
stacksign.ga
superenterprise.work
superwhiteningpills.org
svclnlk.com
tax-gov.com
tccholdng-th.com
tecebusiness.com
techfronst.com
thebinaryoptionmonitor.org
thecolumbiabanks.com
thefutureofkitchen.com
theninthisin.com
thewomoorsfestival.co.uk
thisistheninth.com
tienhongjs.com
timetorefillthestock.com
torromodel.de
trans-atlanticdrilling.com
trustedhackers.com
turkiyenews247.tk
turkiyenews27.tk
twhe48.online
uk-pharmcay.com
ulmaparkaging.com
ultronnews.com
unipharma.bz
urnalaxmi-organics.com
usr-acc-serv.com
vendadebitcoin.com
visteonogbonnagroup.com
vpox.ru
vwork.pw
walletsofcoolandhip.com
weather-livenews.com
webs-host.pro
xcesstel.com
xopen.cc
yahoomailservice.com
youngcompamies.com
yoyooo.xyz
zestcrypto.com


Posted by Conrad Longmore at 11:01 No comments:
Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest
Labels: Nigeria, Qhoster, Scams



THURSDAY, 10 MAY 2018


MALWARE SPAM: "NEW DOCUMENTS AVAILABLE FOR DOWNLOAD" /
SERVICE@BARCLAYSDOWNLOADS.CO.UK / BARCLAYSDOWNLOADS.COM



This fake Barclays spam seems to lead to the Trickbot banking trojan.



> From:    Barclays [service@barclaysdownloads.co.uk]
> Date:    10 May 2018, 13:16
> Subject:    New documents available for download
> Signed by:    barclaysdownloads.co.uk
> Security:    Standard encryption (TLS) Learn more
> 
> Barclays Bank PLC Has Sent You Important Account Documents to Sign
> 
> You can view the document in your Barclays Cloud account. For additional
> security, the sender has set an open password for this document.
> 
> Documents assigned to: jlines@[redacted]
> Your unique download password: "CJ98oZOwye"
> 
> To view or download the document please click here.
> 
> The submission number is id: bc7729-272sec912-91navc.
> Please quote this number in any communications with Barclays.
> 
> Disclaimer: This email and any attachments are confidential and for the sole
> use of the recipients. If you have received this email in error please notify
> the sender.
> 
> Email Security Powered by Barclays IBE.
> 
> Copyright 2018 Barclays PLC. All rights reserved. 



The download password and submission number are the same in all cases I have
seen. Clicking the link leads to a landing page at barclaysdownloads.com.




Entering the password downloads a document AccountDocuments.doc with a
VirusTotal detection rate of 14/58, and Hybrid Analysis indicates that this uses
an Equation Editor flaw to run a Powershell that downloads an additional
component from:

http://basedow-bilder.de/kporto.bin
http://crimefiles.net/logo.bin

The .bin file is saved as %TEMP%\lovemete.exe and this currently has a detection
rate of 15/65. Hybrid Analysis indicates this is Trickbot.

barclaysdownloads.co.uk and barclaysdownloads.com have both been registered for
this purpose, the latter of which is hosted at Cloudflare.

Posted by Conrad Longmore at 15:10 3 comments:
Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest
Labels: Cloudflare, Malware, Spam, Viruses



FRIDAY, 4 MAY 2018


"BEST PORNO EVER" NECURS SPAM



This spam (apparently from the Necurs botnet) promises much, but seems not to
deliver.



> From:    Susanne@victimdomain.tld [Susanne@victimdomain.tld]
> Date:    4 May 2018, 10:22
> Subject:    Best porno ever
> 
> Hi [redacted],
> 
> Best gay,teen,animal porno ever
> Please click the following link to activate your account.
> 
> hxxp:||46.161.40.145:3314
> 
> Regards,
> Susanne

The sender's name varies, but is always in the same domain as the victim.

I only saw four different links in the body text:
Warning live links - do not click
http://46.161.40.145:3314/
http://37.1.211.221:1699/
http://31.207.47.125/3FgtbvCf
http://77.72.84.115/

None of these sites were working when I tested them. Hosting IPs are:

46.161.40.145 (Ankas Ltd, Moldova)
37.1.211.221 (3NT Solutions, UK)
31.207.47.125 (Hostkey, Netherlands)
77.72.84.115 (Netup, UK)

3NT Solutions are a well-known purveyor of badness and I recommend blocking
everthing, What the payload is here is unclear, but you can guarantee that's
it's nothing good. And probably not smut either.




Posted by Conrad Longmore at 12:14 1 comment:
Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest
Labels: inferno.name, Malware, Spam



SUNDAY, 1 APRIL 2018


NEW TRAFFIC LIGHT PROTOCOL (TLP) LEVELS FOR 2018


The Traffic Light Protocol should be familiar to anyone working with sensitive
data, with levels RED, AMBER, GREEN and WHITE being used to specify how far
information can be shared. In recent years it has become clear that these four
levels are not enough, so the United Nations International Committee on
Responsible Naming (UN/ICoRN) has introduced nine new TLP levels for
implementation from the first day of April 2018.

It seems to me that these new levels do offer a much more nuanced approach to
sensitive data and are in alignment with real-world needs. What do you think?



TLP Level
Description
RED
Information cannot be disclosed to anyone other than the current participants.
AMBER
Information can be disclosed within participant’s organisations where
appropriate.
GREEN
Information can be shared within the community but not published.
WHITE
Information can be published subject to copyright.
BLACK
Information can be retained by participants until the end of the meeting when
their minds will be wiped with a Neuralyzer.
BROWN
Knowledge of this information may cause recipients to soil themselves.
PINK
Information is intended to be TLP:RED but someone will inevitably treat it as
TLP:WHITE.
BLUE
Knowledge of this information entitles recipients to a free ride in a police
car.
BEIGE
Information is so unmemorable that participants will not be able to recall it
even if they try (cf. TLP:BLACK)
TARTAN
Information is a complex mix of different TLP levels that cannot be easily
separated.
YELLOW
Knowledge of this information may cause recipients to wet themselves. (cf.
TLP:BROWN)
GREY
It is not known if participants should have knowledge of this information or
not.
RAINBOW
Information pertains to the existence of unicorns.




Image credit

Posted by Conrad Longmore at 00:10 3 comments:
Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest


Older Posts Home

Subscribe to: Posts (Atom)



SUBSCRIBE TO

Posts
Atom

Posts

All Comments
Atom

All Comments





POPULAR POSTS

 * Websites owned by Philip John Sabin and associated companies
   Apropos of nothing, all these websites are hosted on 212.230.207.100 to
   213.230.207.109 (Netcalibre, UK) and appear to be owned and controll...
   
 * Bogus porn blackmail attempt from adulthehappytimes.com
   This blackmail attempt is completely bogus, sent from a server belonging to
   the adulthehappytimes.com domain. From :    Hannah Taylor ...
   
 * "Central Intelligence Agency - Case #79238516" extortion spam
   I've seen various extortion spams over the past 12 months or so, but this one
   has a particularly vicious twist. If you haven't s...
   
 * Updated 3NT Solutions LLP / inferno.name / V3Servers.net IP ranges (2021
   edition)
   It's been about a zillion years (well, OK it was 2017) when I last published
   a list of IPs belonging to 3NT Solutions LLP that you proba...
   
 * Malware spam: "Your Sage subscription invoice is ready" / noreply@sagetop.com
   This fake Sage invoice leads to Locky ransomware. Quite why Sage are picked
   on so much by the bad guys is a bit of a mystery. Subject ...
   
 * Updated 3NT Solutions LLP / inferno.name / V3Servers.net IP ranges
     [For the February 2021 version of this list, click here ] When I was
   investigating IOCs for the recent outbreak of BadRabbit ransomware I...
   
 * QTUM Cryptocurrency spam
   This spam email appears to be sent by the Necurs botnet, advertising a new
   Bitcoin-like cryptocurrency called QTUM. Necurs is often used t...
   
 * Malware spam: "New documents available for download" /
   service@barclaysdownloads.co.uk / barclaysdownloads.com
   This fake Barclays spam seems to lead to the Trickbot banking trojan. From
   :    Barclays [service@barclaysdownloads.co.uk] Date :    10...
   
 * "Best porno ever" Necurs spam
   This spam (apparently from the Necurs botnet) promises much, but seems not to
   deliver. From:    Susanne@victimdomain.tld [Susanne@victi...
   
 * New Traffic Light Protocol (TLP) levels for 2018
   The Traffic Light Protocol should be familiar to anyone working with
   sensitive data, with levels RED, AMBER, GREEN and WHITE being used to ...
   




BLOG ARCHIVE

 * ▼  2021 (1)
   * ▼  February (1)
     * Updated 3NT Solutions LLP / inferno.name / V3Serve...

 * ►  2020 (1)
   * ►  November (1)

 * ►  2019 (1)
   * ►  March (1)

 * ►  2018 (6)
   * ►  May (3)
   * ►  April (1)
   * ►  March (1)
   * ►  January (1)

 * ►  2017 (45)
   * ►  December (1)
   * ►  October (5)
   * ►  September (6)
   * ►  August (7)
   * ►  July (3)
   * ►  June (2)
   * ►  May (2)
   * ►  April (10)
   * ►  March (4)
   * ►  February (2)
   * ►  January (3)

 * ►  2016 (333)
   * ►  December (11)
   * ►  November (25)
   * ►  October (18)
   * ►  September (23)
   * ►  August (17)
   * ►  July (21)
   * ►  June (13)
   * ►  May (26)
   * ►  April (23)
   * ►  March (50)
   * ►  February (44)
   * ►  January (62)

 * ►  2015 (389)
   * ►  December (50)
   * ►  November (38)
   * ►  October (40)
   * ►  September (27)
   * ►  August (26)
   * ►  July (22)
   * ►  June (23)
   * ►  May (12)
   * ►  April (38)
   * ►  March (34)
   * ►  February (39)
   * ►  January (40)

 * ►  2014 (387)
   * ►  December (25)
   * ►  November (26)
   * ►  October (35)
   * ►  September (46)
   * ►  August (31)
   * ►  July (37)
   * ►  June (28)
   * ►  May (27)
   * ►  April (23)
   * ►  March (32)
   * ►  February (42)
   * ►  January (35)

 * ►  2013 (557)
   * ►  December (22)
   * ►  November (29)
   * ►  October (36)
   * ►  September (46)
   * ►  August (43)
   * ►  July (61)
   * ►  June (42)
   * ►  May (39)
   * ►  April (66)
   * ►  March (65)
   * ►  February (60)
   * ►  January (48)

 * ►  2012 (490)
   * ►  December (48)
   * ►  November (43)
   * ►  October (62)
   * ►  September (34)
   * ►  August (38)
   * ►  July (27)
   * ►  June (33)
   * ►  May (25)
   * ►  April (55)
   * ►  March (57)
   * ►  February (41)
   * ►  January (27)

 * ►  2011 (194)
   * ►  December (49)
   * ►  November (18)
   * ►  October (23)
   * ►  September (22)
   * ►  August (10)
   * ►  July (22)
   * ►  June (18)
   * ►  May (11)
   * ►  April (11)
   * ►  March (7)
   * ►  February (3)

 * ►  2010 (152)
   * ►  December (5)
   * ►  November (7)
   * ►  October (18)
   * ►  September (13)
   * ►  August (15)
   * ►  July (32)
   * ►  June (9)
   * ►  May (11)
   * ►  April (14)
   * ►  March (2)
   * ►  February (12)
   * ►  January (14)

 * ►  2009 (131)
   * ►  December (5)
   * ►  November (13)
   * ►  October (13)
   * ►  September (5)
   * ►  August (9)
   * ►  July (11)
   * ►  June (9)
   * ►  May (13)
   * ►  April (15)
   * ►  March (10)
   * ►  February (16)
   * ►  January (12)

 * ►  2008 (193)
   * ►  December (11)
   * ►  November (16)
   * ►  October (28)
   * ►  September (25)
   * ►  August (20)
   * ►  July (22)
   * ►  June (33)
   * ►  May (5)
   * ►  April (8)
   * ►  March (11)
   * ►  February (6)
   * ►  January (8)

 * ►  2007 (52)
   * ►  December (3)
   * ►  November (1)
   * ►  October (2)
   * ►  September (3)
   * ►  August (8)
   * ►  July (7)
   * ►  May (9)
   * ►  April (6)
   * ►  March (4)
   * ►  February (3)
   * ►  January (6)




LABELS

Spam (2135) Viruses (1835) Malware (1821) Russia (385) DOC (352) Dridex (305)
Scams (236) EXE-in-ZIP (220) Amerika (216) RU:8080 (208) Ukraine (175) OVH (169)
Locky (167) Ransomware (158) Evil Network (149) Germany (140) Job Offer Scams
(136) Money Mule (121) Stupidity (98) France (89) Linode (89) Hetzner (87) SQL
Injection (83) Lapatasker (78) Netherlands (71) Turkey (71) China (69) Injection
Attacks (69) Latvia (67) GoDaddy (61) Canada (59) Dyre (52) Romania (52) Upatre
(51) Asprox (49) Phishing (46) NACHA (44) BBB (43) Printer Spam (42) India (41)
LinkedIn (40) Facebook (39) Mongolia (39) ThreeScripts (39) Domains (38) INTUIT
(38) DINETHOSTING (37) Banking (36) Amazon (35) Bulgaria (35) ADP (33) Fake
Pharma (31) Fax Spam (31) Korea (31) Microsoft (31) 1&1 (29) Scam (29) Spain
(29) Nigeria (28) Endurance International Group (27) Redret (27) Thailand (27)
.SU (26) Brazil (25) IRS (25) Poland (25) TheFirst-RU (25) Trojans (25) Italy
(24) Lithuania (24) Moldova (24) Pump and Dump (24) Fail (23) SMS (23) Nuclear
Fallout Enterprises (22) Malvertising (21) UPS (21) USPS (21) Google (20) PayPal
(20) eFax (20) Joe Job (19) Leaseweb (19) Sweden (19) Vietnam (19) Blackhole
(18) Teslacrypt (18) Australia (16) HMRC (16) Slicehost (16) Taiwan (16)
Advanced Fee Fraud (15) Angler EK (15) Dating Scams (15) Gandi (15) Hungary (15)
Phones (15) Serverius (15) Zbot (15) Czech Republic (14) PDFs (14) Serbia (14)
AICPA (12) False Positive (12) PPI (12) Pakistan (12) R5X.org (12) Somnath
Bharti (12) South Africa (12) Adware (11) GHOSTnet (11) Greece (11) Jolly Works
Hosting (11) NAPPPA (11) US Airways (11) inferno.name (11) BizSummits (10) CA
(10) Colombia (10) Estonia (10) F3Y (10) FedEx (10) Intergenia (10) Israel (10)
Singapore (10) Specialist ISP (10) Transnistria (10) security (10) 419 (9) Apple
(9) CNN (9) Cryptowall (9) Porn (9) Switzerland (9) UAE (9) eTrust (9) Android
(8) CyberBunker (8) Japan (8) Patches (8) Politics (8) Simply Transit (8) Solar
VPS (8) Zerigo (8) Anti-Virus Software (7) Argentina (7) Black Hat (7) Chile (7)
Dropbox (7) Dynamic DNS (7) Egypt (7) Fake Anti-Virus (7) Fiji (7) Kenya (7)
Montenegro (7) Sagade Ltd (7) Saudi Arabia (7) UK2.NET (7) Adobe (6) Advertising
(6) Appraisals (6) IPMA (6) Institute of Project Management America (6) Ireland
(6) Kazakhstan (6) Mystery Shopper (6) Netserv Consult SRL (6) Philippines (6)
Piradius.net (6) Sky (6) UkrStar ISP (6) Voice Mail (6) Webazilla (6) Austria
(5) Bogus Ads (5) Bosnia (5) Crime (5) DHL (5) Elstow (5) Google Maps (5) Hacked
sites (5) Hosting (5) Iran (5) Mexico (5) NetTemps Inc (5) PestPatrol (5)
Postini (5) Privacy (5) Senegal (5) Sidharth Shah (5) Twitter (5) Xeex (5)
logol.ru (5) BBC (4) Blogger (4) Bredolab (4) Bundespolizei (4) Cerber (4) Data
Breach (4) Fake Retailers (4) Finance Scams (4) Finland (4) Gary McNeish (4)
Hoax (4) Indonesia (4) Lithunia (4) LizaMoon (4) Nokia (4) Norway (4) Pony (4)
Portugal (4) Seychelles (4) Shifu (4) Spamcop (4) Tetrus Telecoms (4) TrickBot
(4) VBScript (4) Weather (4) Zeus (4) .htaccess (3) BLNX.L (3) Blogging (3)
Botnet (3) Dubai (3) Emailmovers Ltd (3) Etisalat (3) F-Secure (3) Firefox (3)
Google Streetview (3) HostForWeb (3) Humour (3) Java (3) Lottery Scam (3) MLM
(3) Nymaim (3) Passwords (3) Phishtank (3) Pizza (3) Police (3) Project
Management International (3) SEO (3) Smart Roadster (3) Sweet Orange (3)
Telepests (3) Uzbekistan (3) Vawtrak (3) Video (3) Virgin Media (3) Voxility (3)
Waledac (3) Windows (3) World of Warcraft (3) Yahoo (3) Yohost.org (3) eBay (3)
snow (3) Acid Free Coffee (2) AdWords (2) Bitcoin (2) Blinkx (2) Bob Gatchel (2)
Botswana (2) CareerBuilder (2) Censorship (2) Classmates.com (2) Clickbank (2)
Cloudflare (2) Craigslist (2) DDOS (2) Data Protection (2) DreamHost (2) Edis
(2) Exchange (2) Fake Postcard (2) Hostfresh (2) Hostinger (2) IIS (2) Iframe
attacks (2) Internet Explorer (2) Law (2) MarketBay (2) Maxhosting (2) Mobiquant
(2) NA3PA (2) Nadine Dorries (2) Netdirekt (2) Neutrino (2) New Zealand (2)
Nuclear EK (2) OpenX (2) PHP (2) Palestine (2) Panama (2) Phorm (2) Pinball
Corporation (2) Pinterest (2) Qhoster (2) Retro (2) Samsung (2) Sapphire Town
Real Estate (2) Sinowal (2) Slovakia (2) Spin (2) TDS (2) The Funding Institute
(2) Tor (2) Vet (2) Wikipedia (2) uadomen.com (2) AOL (1) Andromeda (1) Art Scam
(1) Aruba (1) Bedford (1) Bedfordshire (1) Belarus (1) Belize (1) Bing (1) Blink
(1) Brexit (1) Bulgari (1) Computer Misuse Act (1) Conficker (1) CookieBomb (1)
Cryptocurrency (1) DNS (1) Elections (1) Electronics (1) Email (1) Epsilon (1)
Escrow (1) Etiquette (1) Extortion (1) Fast Serv (1) Fiesta EK (1) FirefoxOS (1)
Friendster (1) Funny (1) Gawker (1) Ghana (1) Gogax (1) Gold Scam (1) Google
Drive (1) Google Voice (1) Gumblar (1) HYIP (1) Hancitor (1) Hetzer (1) Hong
Kong (1) Hotbar (1) Iceland (1) Infographic (1) Kelihos (1) Kidnap (1) LBM (1)
LNK (1) Latnet (1) LinkShare (1) Luxembourg. GoDaddy (1) Macedonia (1) Macintosh
(1) Magnitude (1) Malaysia (1) Malware Viruses (1) Maware (1) Mea Culpa (1)
Motorola (1) Mozilla (1) Music (1) NATO (1) Najada Ltd (1) Nemucod (1) Network
Operations Center (1) Networking4Africa.com (1) New Zealing (1) Paragon Software
Group (1) Parcel Mule (1) Paul Aunger (1) Qatar (1) Relikts BVK (1) Robert G
Allen (1) Rootkits (1) SMTP (1) SOCA (1) SOPA (1) Santrex (1) Serverconnect.se
(1) Servia (1) Shifu. Malware (1) Skype (1) Slimeware (1) SoftLayer (1) Spam
Scams (1) Spam. Malware (1) Spoofing (1) SpyEye (1) Symantec (1) Syria (1)
Sysprep (1) T-Mobile (1) TopSites (1) Tunisia (1) Tylers Coffees (1) Upatre.
Dyre (1) Vietname (1) Viruse (1) Viruses. DOC (1) Viruses. Dyre (1) Vline Ltd
(1) WTF (1) Worm (1) XSS (1) YouTube (1) Zero Day (1) Zombies (1) ZoneAlarm (1)
gambling (1) hardware (1) microlines.lv (1) pddomains.com (1) review (1)
theciosummits.org (1)



LINKS

 * Retromobe
 * Mobile Gazette
 * Petrol Direct
 * Slimeware
 * The Truth about Conrad Longmore








Never email donotemail@wearespammers.com . Powered by Blogger.



This site uses cookies from Google to deliver its services and to analyse
traffic. Your IP address and user agent are shared with Google, together with
performance and security metrics, to ensure quality of service, generate usage
statistics and to detect and address abuse.Learn moreOk