blog.dynamoo.com
Open in
urlscan Pro
2a00:1450:4001:831::2013
Public Scan
Submitted URL: http://blog.dynamoo.com/
Effective URL: https://blog.dynamoo.com/
Submission: On December 16 via manual from GB — Scanned from GB
Effective URL: https://blog.dynamoo.com/
Submission: On December 16 via manual from GB — Scanned from GB
Form analysis
0 forms found in the DOMText Content
DYNAMOO'S BLOG Malware, spam, scams and random stuff, by Conrad Longmore. LINK LIST * Blogger.com * Dynamoo's Blog * Dynamoo.com * Get Updates on Twitter SPONSORED BY.. WEDNESDAY, 24 FEBRUARY 2021 UPDATED 3NT SOLUTIONS LLP / INFERNO.NAME / V3SERVERS.NET IP RANGES (2021 EDITION) It's been about a zillion years (well, OK it was 2017) when I last published a list of IPs belonging to 3NT Solutions LLP that you probably want to block. Their name came up yet again in something I was looking at, and I was slightly surprised to see that the old list was still somewhat valid. However a bit of research found some new ranges and some that have been potentially cleaned up. Current 5.45.64.0/19 5.61.32.0/19 37.1.192.0/19 37.252.0.0/20 46.22.211.0/25 46.22.211.128/26 80.79.124.128/26 91.193.180.0/22 92.48.122.0/28 92.48.122.16/28 92.48.122.32/28 92.48.122.48/28 130.0.232.0/21 185.4.64.0/22 188.116.27.0/24 212.95.54.0/24 212.95.58.0/24 212.95.63.0/24 Potentially clean 95.168.165.0/24 95.168.173.0/24 95.168.177.0/24 95.168.178.0/24 95.168.191.0/24 184.154.38.40/29 Posted by Conrad Longmore at 17:08 No comments: Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest Labels: Evil Network, inferno.name, Serbia TUESDAY, 24 NOVEMBER 2020 WEBSITES OWNED BY PHILIP JOHN SABIN AND ASSOCIATED COMPANIES Apropos of nothing, all these websites are hosted on 212.230.207.100 to 213.230.207.109 (Netcalibre, UK) and appear to be owned and controlled by Philip John Sabin and/or Luxury Sleuth Ltd (11482506), We Just Compare Ltd (12485232). Funnily enough I can't find an ICO registration for these companies, maybe that just me doing it wrong. Perhaps anyone who knows it can add something to the comments? www.britishluxuries.com www.couponsleuth.co.uk www.delivermeevents.co.uk www.delivermeoffers.co.uk www.delivermeoffers.com www.distinguishedclub.co.uk www.distinguisheddata.co.uk www.distinguishedtraveller.co.uk www.easylawnsltd.com www.eventsleuth.co.uk www.exclusive-travel-club.com www.filmsleuth.co.uk www.fusina.co.uk www.grandcartours.com www.homeimprovementsleuth.co.uk www.investingtrends.co.uk www.investmentsleuth.com www.journeysofdistinction.co.uk www.leads4sale.co.uk www.leadsleuth.co.uk www.luxurycartours.com www.luxury-rallies.co.uk www.luxuryrallies.com www.luxurysleuth.co.uk www.luxurysleuth.com www.luxuryupdates.co.uk www.mailhubs.co.uk www.mxchecker.com www.payhound.co.uk www.savvyinvesting.co.uk www.sleuth.media. www.sleuthmarketing.co.uk www.thepropertysleuth.co.uk www.thriveland.co.uk www.travellead.uk. www.travellerstrust.com www.travelsleuth.co.uk www.travelsleuth.com www.travelsleuth.uk. www.usesend.co.uk www.wejustcompare.co.uk www.wejustcompare.com www.wejustentertain.com www.wejustinsure.com www.wejustinvest.com www.whichfuneralplans.wejustcompare.com www.worldtradingpartners.com www.worldtravelpartners.co. www.worldtravelpartners.co.uk www.wtplimited.com www.youaregorgeous.co.uk www.yourpricecomparison.com Posted by Conrad Longmore at 10:16 No comments: Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest Labels: Data Protection MONDAY, 18 MARCH 2019 "CENTRAL INTELLIGENCE AGENCY - CASE #79238516" EXTORTION SPAM I've seen various extortion spams over the past 12 months or so, but this one has a particularly vicious twist. If you haven't seen one of these before - it's just a spam, randomly sent to your email address. You can safely ignore it. > From: Liza Guest [liza-guest@eosj.cia-gov-it.tk] > Reply-To: liza-guest@eosj.cia-gov-it.tk > To: [redacted] > Date: 18 Mar 2019, 06:33 > Subject: Central Intelligence Agency - Case #79238516 > > Case #79238516 > Distribution and storage of pornographic electronic materials involving > underage children. > > > My name is Liza Guest and I am a technical collection officer working for > Central Intelligence Agency. > > It has come to my attention that your personal details including your email > address ([redacted]) are listed in case #79238516. > > The following details are listed in the document's attachment: > > * Your personal details, > * Home address, > * Work address, > * List of relatives and their contact information. > > > > Case #79238516 is part of a large international operation set to arrest more > than 2000 individuals suspected of paedophilia in 27 countries. > > The data which could be used to acquire your personal information: > > * Your ISP web browsing history, > * DNS queries history and connection logs, > * Deep web .onion browsing and/or connection sharing, > * Online chat-room logs, > * Social media activity log. > > > The first arrests are scheduled for April 8, 2019. > > Why am I contacting you ? > > I read the documentation and I know you are a wealthy person who may be > concerned about reputation. > > I am one of several people who have access to those documents and I have > enough security clearance to amend and remove your details from this case. > Here is my proposition. > > Transfer exactly $10,000 USD (ten thousand dollars - about 2.5 BTC) through > Bitcoin network to this special bitcoin address: > > 3QTV16BBsaEBVuwZv8wCjEgWZTKVVQPJ3h > > You can transfer funds with online bitcoin exchanges such as Coinbase, > Bitstamp or Coinmama. The deadline is March 27, 2019 (I need few days to > access and edit the files). > > Upon confirming your transfer I will take care of all the files linked to you > and you can rest assured no one will bother you. > > Please do not contact me. I will contact you and confirm only when I see the > valid transfer. > > Regards, > Liza Guest > > Technical Collection Officer > Directorate of Science and Technology > Central Intelligence Agency Another version comes "from" tannerlynch@oiks.cia-gov-it.gq and solicits payments to 32ngJWq6YYGUfvCbj3Ji7MNSnqi3rdM5qa. There are probably others. At the time of writing, neither of these two Bitcoin wallets had received any payment. Posted by Conrad Longmore at 15:57 1 comment: Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest Labels: Bitcoin, Extortion, Scams, Spam TUESDAY, 22 MAY 2018 PHISHING AND FRAUDULENT SITES HOSTED ON 188.241.58.60 (QHOSTER) Nigerian registrants. Dodgy Eastern European host offering bulletproof and anonymous hosting. Yup, I very much doubt there is anything legitimate at all hosted on 188.241.58.60.. or indeed any part of Qhoster's network. 237buzz.com 255page.ga 702mine.com 779999977.com a1cargomovers.com abtprinting.com adassco.com admincamac.co.uk afazendaideal.ml afflluenceindia.com africheck.com alamiranut.com alexandrahospitals.com alliarnce.org.uk allseaship.com amba-medias.com amiicogroup.com andrzejkupnopark.eu anook.info ansaexpress.com antrackdiplomaticcs.com apidexconstruction.com aramexbe.com arshland.com artyschat.com atlanticfforum.com aughana.com battlegrounds-arena.com baugeruest-handel.com bevadgmbh.com billdiamondfinance.co.uk binaryoptionsmonitor.com binco-sale.com bit-masters.com bitcoincashold.com bitcoinsdrugsrehab.com bitmain-alliances.com bitmamashop.com blecoman.com bmpro.info bourseafrique.com britannia-pharmaceutical.co.uk btccap.biz btctriplermachine.com buycounterfeitmoneys.com calvinscott.biz cameroonianbeauties.com candodvillahotel.com carphonewarehouse-eu.com centroculturadigital.com certificatesshop.com chainconnect.co chaseoffshoreonline.tk chondomonitor.com citydiaryfarms.com classicdeliverycourier.com clickhereforgiveaway.site clickhereforgiveaway.xyz cloud-bigfile.com cncoslight-zh.com cnximgang.com coca-colafinancedept.com coflaxfluidhandling.com coinminners.com coinrxstore.com compasseguip.com confirmedsoft.us cosm0-hk.com cosmosport24.com creditonfcu.com crewlinked.com criagent.com crypto023.com cryptominingtechnology.com cryptoshifters.com cs-oilfeild.com cureonlinepharmacy.org denverlaserhairremoval.co divecastle.com dlnamicatrade.com double-bitcoins-legit.com eastmanimpex.cam ebid-tg.com efceosaudi.com elitecertifiedhack.com emailtime.info ethiopianairilines.com eurocertificationcentre.eu fabftifun.com faircloths.co.uk fastcoine.com fastestfingersfirst.com fidelity-investment.co.uk findingthepropercode.com firstsuorceinc.com forvisitingthankyou.com fotesale.com front-dashboard.com gdp-international.com general-funds.com generate-dcash.biz gettinginonthelow.com global-news.center globalinkscobsult.com globalinksconsult.com gmb-trade.com goimsa.info grand-sale.com grantersmultiservices.com greetapex.com guaranteecds.com hackers-list.com.de harpack-ulma.com heraeu.com hereweareonit.com hlroyoung.com horizonpartnerrsltd.com houseofspells.com hsbrands-int.ml humer1adminka.com hyip.co.in hyipcave.com idexpresscargo.com inlinefornine.com interseadrill.com item-desc.com jdfrencis.com jonihoppershowcase.com kcf-th.com kececiprofile.com kencanafishing.com kiingsay.com kindres.com kindres.de kippaskagit.com kmsinfoservice.com ks-prod.com lane-pres.com legitrxonline.club lifegoalsdevelopmentschool.com litbitcoinembassy.com littlerockbitcoins.com live-rx-store.com loactrippleser.ga loan-assistance.com loan-dealer.com loudiclear.com lurnentum.com luwiex.com manarpso.com mannhiem.in maomanlodocs.cf marshawoifesquire.com mcmg-tech.com meetcameroonians.com meetup4real.com megachemstoreonline.com miamibeachcoin.com microclicker.com mile22-casting.com miningcrux.com mission4christministry.com movimientorevolucionariodelpueblo.org ms-fi.com mst4sale.com mysite111.com neatwaytogettheninth.com neusportltd.com news-world.center nexttys.com nightcapdice.com ninthinline.com nlsteinweg.com nomuta.com noworri.com obsgruop.com offshoreseadrill.com onehereisreservedforyou.com online-citibankgroup.com ontothenextgame.com opcolage.com orifiameglobal.com ourskynet.com oxfords-pay.com parcelservicess.com pharmas4plus.com plccsolutions.com psypharm.com ptochart.com quicktitletransfer.com rashedal-wataniagroup.com rawgarner.com realbuyrx.com recordspharm.com researchchem4us.com resumedatabase11.xyz rnailb.com rnarhaba.com ro-noutati-mondene.ml robnsaconsult.com rock-sale.com rosenbaumcontemporarygroup.com royalstandard.ga rumlt.in rush-sale.com seachiefs.com seguradoravirtual.com seosenior.com service-infoo.com she-afro.com shippingdynamics.com showbarghana.com siglobal.org simplyitaly.dk simplyitaly.it skillocademy.com sms-red-online.ga solid-sale.com southchina-sea.net srcoin.ca srnec-cn.com stacksign.ga superenterprise.work superwhiteningpills.org svclnlk.com tax-gov.com tccholdng-th.com tecebusiness.com techfronst.com thebinaryoptionmonitor.org thecolumbiabanks.com thefutureofkitchen.com theninthisin.com thewomoorsfestival.co.uk thisistheninth.com tienhongjs.com timetorefillthestock.com torromodel.de trans-atlanticdrilling.com trustedhackers.com turkiyenews247.tk turkiyenews27.tk twhe48.online uk-pharmcay.com ulmaparkaging.com ultronnews.com unipharma.bz urnalaxmi-organics.com usr-acc-serv.com vendadebitcoin.com visteonogbonnagroup.com vpox.ru vwork.pw walletsofcoolandhip.com weather-livenews.com webs-host.pro xcesstel.com xopen.cc yahoomailservice.com youngcompamies.com yoyooo.xyz zestcrypto.com Posted by Conrad Longmore at 11:01 No comments: Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest Labels: Nigeria, Qhoster, Scams THURSDAY, 10 MAY 2018 MALWARE SPAM: "NEW DOCUMENTS AVAILABLE FOR DOWNLOAD" / SERVICE@BARCLAYSDOWNLOADS.CO.UK / BARCLAYSDOWNLOADS.COM This fake Barclays spam seems to lead to the Trickbot banking trojan. > From: Barclays [service@barclaysdownloads.co.uk] > Date: 10 May 2018, 13:16 > Subject: New documents available for download > Signed by: barclaysdownloads.co.uk > Security: Standard encryption (TLS) Learn more > > Barclays Bank PLC Has Sent You Important Account Documents to Sign > > You can view the document in your Barclays Cloud account. For additional > security, the sender has set an open password for this document. > > Documents assigned to: jlines@[redacted] > Your unique download password: "CJ98oZOwye" > > To view or download the document please click here. > > The submission number is id: bc7729-272sec912-91navc. > Please quote this number in any communications with Barclays. > > Disclaimer: This email and any attachments are confidential and for the sole > use of the recipients. If you have received this email in error please notify > the sender. > > Email Security Powered by Barclays IBE. > > Copyright 2018 Barclays PLC. All rights reserved. The download password and submission number are the same in all cases I have seen. Clicking the link leads to a landing page at barclaysdownloads.com. Entering the password downloads a document AccountDocuments.doc with a VirusTotal detection rate of 14/58, and Hybrid Analysis indicates that this uses an Equation Editor flaw to run a Powershell that downloads an additional component from: http://basedow-bilder.de/kporto.bin http://crimefiles.net/logo.bin The .bin file is saved as %TEMP%\lovemete.exe and this currently has a detection rate of 15/65. Hybrid Analysis indicates this is Trickbot. barclaysdownloads.co.uk and barclaysdownloads.com have both been registered for this purpose, the latter of which is hosted at Cloudflare. Posted by Conrad Longmore at 15:10 3 comments: Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest Labels: Cloudflare, Malware, Spam, Viruses FRIDAY, 4 MAY 2018 "BEST PORNO EVER" NECURS SPAM This spam (apparently from the Necurs botnet) promises much, but seems not to deliver. > From: Susanne@victimdomain.tld [Susanne@victimdomain.tld] > Date: 4 May 2018, 10:22 > Subject: Best porno ever > > Hi [redacted], > > Best gay,teen,animal porno ever > Please click the following link to activate your account. > > hxxp:||46.161.40.145:3314 > > Regards, > Susanne The sender's name varies, but is always in the same domain as the victim. I only saw four different links in the body text: Warning live links - do not click http://46.161.40.145:3314/ http://37.1.211.221:1699/ http://31.207.47.125/3FgtbvCf http://77.72.84.115/ None of these sites were working when I tested them. Hosting IPs are: 46.161.40.145 (Ankas Ltd, Moldova) 37.1.211.221 (3NT Solutions, UK) 31.207.47.125 (Hostkey, Netherlands) 77.72.84.115 (Netup, UK) 3NT Solutions are a well-known purveyor of badness and I recommend blocking everthing, What the payload is here is unclear, but you can guarantee that's it's nothing good. And probably not smut either. Posted by Conrad Longmore at 12:14 1 comment: Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest Labels: inferno.name, Malware, Spam SUNDAY, 1 APRIL 2018 NEW TRAFFIC LIGHT PROTOCOL (TLP) LEVELS FOR 2018 The Traffic Light Protocol should be familiar to anyone working with sensitive data, with levels RED, AMBER, GREEN and WHITE being used to specify how far information can be shared. In recent years it has become clear that these four levels are not enough, so the United Nations International Committee on Responsible Naming (UN/ICoRN) has introduced nine new TLP levels for implementation from the first day of April 2018. It seems to me that these new levels do offer a much more nuanced approach to sensitive data and are in alignment with real-world needs. What do you think? TLP Level Description RED Information cannot be disclosed to anyone other than the current participants. AMBER Information can be disclosed within participant’s organisations where appropriate. GREEN Information can be shared within the community but not published. WHITE Information can be published subject to copyright. BLACK Information can be retained by participants until the end of the meeting when their minds will be wiped with a Neuralyzer. BROWN Knowledge of this information may cause recipients to soil themselves. PINK Information is intended to be TLP:RED but someone will inevitably treat it as TLP:WHITE. BLUE Knowledge of this information entitles recipients to a free ride in a police car. BEIGE Information is so unmemorable that participants will not be able to recall it even if they try (cf. TLP:BLACK) TARTAN Information is a complex mix of different TLP levels that cannot be easily separated. YELLOW Knowledge of this information may cause recipients to wet themselves. (cf. TLP:BROWN) GREY It is not known if participants should have knowledge of this information or not. RAINBOW Information pertains to the existence of unicorns. Image credit Posted by Conrad Longmore at 00:10 3 comments: Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest Older Posts Home Subscribe to: Posts (Atom) SUBSCRIBE TO Posts Atom Posts All Comments Atom All Comments POPULAR POSTS * Websites owned by Philip John Sabin and associated companies Apropos of nothing, all these websites are hosted on 212.230.207.100 to 213.230.207.109 (Netcalibre, UK) and appear to be owned and controll... * Bogus porn blackmail attempt from adulthehappytimes.com This blackmail attempt is completely bogus, sent from a server belonging to the adulthehappytimes.com domain. From : Hannah Taylor ... * "Central Intelligence Agency - Case #79238516" extortion spam I've seen various extortion spams over the past 12 months or so, but this one has a particularly vicious twist. If you haven't s... * Updated 3NT Solutions LLP / inferno.name / V3Servers.net IP ranges (2021 edition) It's been about a zillion years (well, OK it was 2017) when I last published a list of IPs belonging to 3NT Solutions LLP that you proba... * Malware spam: "Your Sage subscription invoice is ready" / noreply@sagetop.com This fake Sage invoice leads to Locky ransomware. Quite why Sage are picked on so much by the bad guys is a bit of a mystery. Subject ... * Updated 3NT Solutions LLP / inferno.name / V3Servers.net IP ranges [For the February 2021 version of this list, click here ] When I was investigating IOCs for the recent outbreak of BadRabbit ransomware I... * QTUM Cryptocurrency spam This spam email appears to be sent by the Necurs botnet, advertising a new Bitcoin-like cryptocurrency called QTUM. Necurs is often used t... * Malware spam: "New documents available for download" / service@barclaysdownloads.co.uk / barclaysdownloads.com This fake Barclays spam seems to lead to the Trickbot banking trojan. From : Barclays [service@barclaysdownloads.co.uk] Date : 10... * "Best porno ever" Necurs spam This spam (apparently from the Necurs botnet) promises much, but seems not to deliver. From: Susanne@victimdomain.tld [Susanne@victi... * New Traffic Light Protocol (TLP) levels for 2018 The Traffic Light Protocol should be familiar to anyone working with sensitive data, with levels RED, AMBER, GREEN and WHITE being used to ... BLOG ARCHIVE * ▼ 2021 (1) * ▼ February (1) * Updated 3NT Solutions LLP / inferno.name / V3Serve... * ► 2020 (1) * ► November (1) * ► 2019 (1) * ► March (1) * ► 2018 (6) * ► May (3) * ► April (1) * ► March (1) * ► January (1) * ► 2017 (45) * ► December (1) * ► October (5) * ► September (6) * ► August (7) * ► July (3) * ► June (2) * ► May (2) * ► April (10) * ► March (4) * ► February (2) * ► January (3) * ► 2016 (333) * ► December (11) * ► November (25) * ► October (18) * ► September (23) * ► August (17) * ► July (21) * ► June (13) * ► May (26) * ► April (23) * ► March (50) * ► February (44) * ► January (62) * ► 2015 (389) * ► December (50) * ► November (38) * ► October (40) * ► September (27) * ► August (26) * ► July (22) * ► June (23) * ► May (12) * ► April (38) * ► March (34) * ► February (39) * ► January (40) * ► 2014 (387) * ► December (25) * ► November (26) * ► October (35) * ► September (46) * ► August (31) * ► July (37) * ► June (28) * ► May (27) * ► April (23) * ► March (32) * ► February (42) * ► January (35) * ► 2013 (557) * ► December (22) * ► November (29) * ► October (36) * ► September (46) * ► August (43) * ► July (61) * ► June (42) * ► May (39) * ► April (66) * ► March (65) * ► February (60) * ► January (48) * ► 2012 (490) * ► December (48) * ► November (43) * ► October (62) * ► September (34) * ► August (38) * ► July (27) * ► June (33) * ► May (25) * ► April (55) * ► March (57) * ► February (41) * ► January (27) * ► 2011 (194) * ► December (49) * ► November (18) * ► October (23) * ► September (22) * ► August (10) * ► July (22) * ► June (18) * ► May (11) * ► April (11) * ► March (7) * ► February (3) * ► 2010 (152) * ► December (5) * ► November (7) * ► October (18) * ► September (13) * ► August (15) * ► July (32) * ► June (9) * ► May (11) * ► April (14) * ► March (2) * ► February (12) * ► January (14) * ► 2009 (131) * ► December (5) * ► November (13) * ► October (13) * ► September (5) * ► August (9) * ► July (11) * ► June (9) * ► May (13) * ► April (15) * ► March (10) * ► February (16) * ► January (12) * ► 2008 (193) * ► December (11) * ► November (16) * ► October (28) * ► September (25) * ► August (20) * ► July (22) * ► June (33) * ► May (5) * ► April (8) * ► March (11) * ► February (6) * ► January (8) * ► 2007 (52) * ► December (3) * ► November (1) * ► October (2) * ► September (3) * ► August (8) * ► July (7) * ► May (9) * ► April (6) * ► March (4) * ► February (3) * ► January (6) LABELS Spam (2135) Viruses (1835) Malware (1821) Russia (385) DOC (352) Dridex (305) Scams (236) EXE-in-ZIP (220) Amerika (216) RU:8080 (208) Ukraine (175) OVH (169) Locky (167) Ransomware (158) Evil Network (149) Germany (140) Job Offer Scams (136) Money Mule (121) Stupidity (98) France (89) Linode (89) Hetzner (87) SQL Injection (83) Lapatasker (78) Netherlands (71) Turkey (71) China (69) Injection Attacks (69) Latvia (67) GoDaddy (61) Canada (59) Dyre (52) Romania (52) Upatre (51) Asprox (49) Phishing (46) NACHA (44) BBB (43) Printer Spam (42) India (41) LinkedIn (40) Facebook (39) Mongolia (39) ThreeScripts (39) Domains (38) INTUIT (38) DINETHOSTING (37) Banking (36) Amazon (35) Bulgaria (35) ADP (33) Fake Pharma (31) Fax Spam (31) Korea (31) Microsoft (31) 1&1 (29) Scam (29) Spain (29) Nigeria (28) Endurance International Group (27) Redret (27) Thailand (27) .SU (26) Brazil (25) IRS (25) Poland (25) TheFirst-RU (25) Trojans (25) Italy (24) Lithuania (24) Moldova (24) Pump and Dump (24) Fail (23) SMS (23) Nuclear Fallout Enterprises (22) Malvertising (21) UPS (21) USPS (21) Google (20) PayPal (20) eFax (20) Joe Job (19) Leaseweb (19) Sweden (19) Vietnam (19) Blackhole (18) Teslacrypt (18) Australia (16) HMRC (16) Slicehost (16) Taiwan (16) Advanced Fee Fraud (15) Angler EK (15) Dating Scams (15) Gandi (15) Hungary (15) Phones (15) Serverius (15) Zbot (15) Czech Republic (14) PDFs (14) Serbia (14) AICPA (12) False Positive (12) PPI (12) Pakistan (12) R5X.org (12) Somnath Bharti (12) South Africa (12) Adware (11) GHOSTnet (11) Greece (11) Jolly Works Hosting (11) NAPPPA (11) US Airways (11) inferno.name (11) BizSummits (10) CA (10) Colombia (10) Estonia (10) F3Y (10) FedEx (10) Intergenia (10) Israel (10) Singapore (10) Specialist ISP (10) Transnistria (10) security (10) 419 (9) Apple (9) CNN (9) Cryptowall (9) Porn (9) Switzerland (9) UAE (9) eTrust (9) Android (8) CyberBunker (8) Japan (8) Patches (8) Politics (8) Simply Transit (8) Solar VPS (8) Zerigo (8) Anti-Virus Software (7) Argentina (7) Black Hat (7) Chile (7) Dropbox (7) Dynamic DNS (7) Egypt (7) Fake Anti-Virus (7) Fiji (7) Kenya (7) Montenegro (7) Sagade Ltd (7) Saudi Arabia (7) UK2.NET (7) Adobe (6) Advertising (6) Appraisals (6) IPMA (6) Institute of Project Management America (6) Ireland (6) Kazakhstan (6) Mystery Shopper (6) Netserv Consult SRL (6) Philippines (6) Piradius.net (6) Sky (6) UkrStar ISP (6) Voice Mail (6) Webazilla (6) Austria (5) Bogus Ads (5) Bosnia (5) Crime (5) DHL (5) Elstow (5) Google Maps (5) Hacked sites (5) Hosting (5) Iran (5) Mexico (5) NetTemps Inc (5) PestPatrol (5) Postini (5) Privacy (5) Senegal (5) Sidharth Shah (5) Twitter (5) Xeex (5) logol.ru (5) BBC (4) Blogger (4) Bredolab (4) Bundespolizei (4) Cerber (4) Data Breach (4) Fake Retailers (4) Finance Scams (4) Finland (4) Gary McNeish (4) Hoax (4) Indonesia (4) Lithunia (4) LizaMoon (4) Nokia (4) Norway (4) Pony (4) Portugal (4) Seychelles (4) Shifu (4) Spamcop (4) Tetrus Telecoms (4) TrickBot (4) VBScript (4) Weather (4) Zeus (4) .htaccess (3) BLNX.L (3) Blogging (3) Botnet (3) Dubai (3) Emailmovers Ltd (3) Etisalat (3) F-Secure (3) Firefox (3) Google Streetview (3) HostForWeb (3) Humour (3) Java (3) Lottery Scam (3) MLM (3) Nymaim (3) Passwords (3) Phishtank (3) Pizza (3) Police (3) Project Management International (3) SEO (3) Smart Roadster (3) Sweet Orange (3) Telepests (3) Uzbekistan (3) Vawtrak (3) Video (3) Virgin Media (3) Voxility (3) Waledac (3) Windows (3) World of Warcraft (3) Yahoo (3) Yohost.org (3) eBay (3) snow (3) Acid Free Coffee (2) AdWords (2) Bitcoin (2) Blinkx (2) Bob Gatchel (2) Botswana (2) CareerBuilder (2) Censorship (2) Classmates.com (2) Clickbank (2) Cloudflare (2) Craigslist (2) DDOS (2) Data Protection (2) DreamHost (2) Edis (2) Exchange (2) Fake Postcard (2) Hostfresh (2) Hostinger (2) IIS (2) Iframe attacks (2) Internet Explorer (2) Law (2) MarketBay (2) Maxhosting (2) Mobiquant (2) NA3PA (2) Nadine Dorries (2) Netdirekt (2) Neutrino (2) New Zealand (2) Nuclear EK (2) OpenX (2) PHP (2) Palestine (2) Panama (2) Phorm (2) Pinball Corporation (2) Pinterest (2) Qhoster (2) Retro (2) Samsung (2) Sapphire Town Real Estate (2) Sinowal (2) Slovakia (2) Spin (2) TDS (2) The Funding Institute (2) Tor (2) Vet (2) Wikipedia (2) uadomen.com (2) AOL (1) Andromeda (1) Art Scam (1) Aruba (1) Bedford (1) Bedfordshire (1) Belarus (1) Belize (1) Bing (1) Blink (1) Brexit (1) Bulgari (1) Computer Misuse Act (1) Conficker (1) CookieBomb (1) Cryptocurrency (1) DNS (1) Elections (1) Electronics (1) Email (1) Epsilon (1) Escrow (1) Etiquette (1) Extortion (1) Fast Serv (1) Fiesta EK (1) FirefoxOS (1) Friendster (1) Funny (1) Gawker (1) Ghana (1) Gogax (1) Gold Scam (1) Google Drive (1) Google Voice (1) Gumblar (1) HYIP (1) Hancitor (1) Hetzer (1) Hong Kong (1) Hotbar (1) Iceland (1) Infographic (1) Kelihos (1) Kidnap (1) LBM (1) LNK (1) Latnet (1) LinkShare (1) Luxembourg. GoDaddy (1) Macedonia (1) Macintosh (1) Magnitude (1) Malaysia (1) Malware Viruses (1) Maware (1) Mea Culpa (1) Motorola (1) Mozilla (1) Music (1) NATO (1) Najada Ltd (1) Nemucod (1) Network Operations Center (1) Networking4Africa.com (1) New Zealing (1) Paragon Software Group (1) Parcel Mule (1) Paul Aunger (1) Qatar (1) Relikts BVK (1) Robert G Allen (1) Rootkits (1) SMTP (1) SOCA (1) SOPA (1) Santrex (1) Serverconnect.se (1) Servia (1) Shifu. Malware (1) Skype (1) Slimeware (1) SoftLayer (1) Spam Scams (1) Spam. Malware (1) Spoofing (1) SpyEye (1) Symantec (1) Syria (1) Sysprep (1) T-Mobile (1) TopSites (1) Tunisia (1) Tylers Coffees (1) Upatre. Dyre (1) Vietname (1) Viruse (1) Viruses. DOC (1) Viruses. Dyre (1) Vline Ltd (1) WTF (1) Worm (1) XSS (1) YouTube (1) Zero Day (1) Zombies (1) ZoneAlarm (1) gambling (1) hardware (1) microlines.lv (1) pddomains.com (1) review (1) theciosummits.org (1) LINKS * Retromobe * Mobile Gazette * Petrol Direct * Slimeware * The Truth about Conrad Longmore Never email donotemail@wearespammers.com . Powered by Blogger. This site uses cookies from Google to deliver its services and to analyse traffic. Your IP address and user agent are shared with Google, together with performance and security metrics, to ensure quality of service, generate usage statistics and to detect and address abuse.Learn moreOk