Monday, 30 June 2008

"Royal Alliance Financial Investment" scam

A slightly strange scam from some outfit pretending to be "Royal Alliance Financial Investment" offering a low-cost loan. The initial email does not ask for much in the way of personal data, presumably that comes as the next step.

There is no such company as "Royal Alliance Financial Investment" in the UK. Originating IP is which is allocated to Swift Global Kenya Limited in Nairobi. Finance companies do not generally use free email accounts to solicit business, and the address is clearly wrong. Avoid.

From: "Royal Alliance Financial Investment"
Date: Mon, June 30, 2008 3:43 pm

Royal Alliance Financial Investment
(Financial Aid Professionals)
Contant Address:85 Fleet Street.
London EC4Y 1AE.
Manchester United Kingdom.

Are you searching for a Genuine loan? at an affordable interest rate ?
processed within 4 to 6 working days. Have you been turned down constantly
by your Banks and other financial institutions? The goodnews is here !!!

Welcome to Royal Alliance Financial Investment,interest rate at 3%.It
gladdens our
hearts to bring to your notice that we offer all kinds of loan to any
part of the world.Being a licensed and registered company under the
finance ministry here in the United Kingdom we make available to customers
legitimate loan offers that are quick and affordable with interest rate at
a mere 3%.

Our Packages include:*Home Loan *Auto Loan*Mortgage Loan*Business
Loan*International Loan*Personal Loan*And Much More.

Please if you are delighted and interested in our financial offer,Do not
hesitate to contact us if in need of our service as you will be required
to furnish us with the following details to commence with the process of
your loan sum accordingly


First Name:___________________________
Last Name:____________________________
Marital status:_______________________
Contact Address:______________________
City/Zip code:________________________
Date of Birth:________________________
Amount Needed as Loan:________________
Loan Duration:________________________
Monthly Income/Yearly Income:_________
Business name:________________________
Purpose for Loan:_____________________

Thanks For Your Patronage!

'Your Business Is Our Blessing'

Mr,Jerry Mccarthy,
London Operations Manager,
Contant Address:85 Fleet Street.
London EC4Y 1AE.
Manchester United Kingdom.

Asprox: new domains including .mobi

Another set of domains used in the Asprox SQL Injection attack:,,,,,,,,,,,,, and

It's the first time that I've seen .mobi used in this way. Blocking access to all .mobi domains will probably do little harm.

Thursday, 26 June 2008

Asprox: list of domains and mitigation steps

The folks over at Bloombit Software have a useful article called ASCII Encoded/Binary String Automated SQL Injection Attack which explains some of the technical details behind these attacks and also has another list of domains serving up malware which is useful to keep an eye on.


Another bunch of domains coming up in the latest batch of Asprox SQL Injection attacks:,,,,, - check your logs for these.

Wednesday, 25 June 2008

Microsoft Security Advisory (954462) - Rise in SQL Injection Attacks Exploiting Unverified User Data Input

A timely advisory from Microsoft on SQL Injection attacks plus some tools to help secure your setup are available on KB954462 with more information here and ISC's commentary here.

Of particular interest is the free Scrawlr tool available from HP. That could be a useful way to see if your server is vulnerable before the bad guys find it,

Monday, 23 June 2008


Former Moto fans such as myself have waited ages for a truly decent handset to come out from Motorola.

The Motorola ZINE ZN5 certainly has an impressive looking camera.. but the problem is that the rest of the phone is pretty unimpressive.

Motorola's woes have been well documented, but this certainly does look like Motorola's last chance. And it looks like the ZN5 is not really up to the task..

ISC: SQL Injection mitigation in ASP

If you're trying to secure your SQL server against the latest round of injection attacks, then check out this item from the Internet Storm Center, which gives some pointers on how to secure you database with ASP.

It probably makes much more sense to an SQL development than to me.. but the important point is that just cleaning up the injection attack is not enough - you also need to prevent it from happening again by securing your SQL server. And I'm afraid that probably involves spending some time and money..

SQL Injection:

Another SQL Injection domain to block or watch out for in your logs -

Other than that, the bad guys seem to have been quiet for a couple of days, however it does look like they've managed to exploit 3 million or so pages (according to Yahoo!) so it could just be that they are very busy.

Friday, 20 June 2008

List of SQL Injection domains

My postings here about SQL injected domains are a bit ad-hoc, but Shadowserver also have a pretty up-to-date list if you're looking at blocking them.

Quite a lot of these domains are .cn (China). You might want to consider completely blocking access to .cn, but if you only have basic filtering then you might find yourself blocking things like too (that took some diagnosing followed by a "d'oh!).

SQL injection:,,,,,,

More SQL Injection domains, this time,,,,, and Probably a good idea to check your logs and/or block access to these sites.

No change in the method of attack, and the cleanup of SQL servers is proceeding pretty slowly. It's clear that some sites are not going to be fixed any time soon, so if you see a site that hasn't been secured then perhaps a complaint to their web host might help.

Thursday, 19 June 2008, and Spyware Sucks offline

I'm a regular reader of Spyware Sucks and was surprised to see that it had been offline for a few days. It turns out that the server that runs the blogging service (used by main Microsoft specialists) got infected with this nasty.

The Google cache of the SBS Diva Blog throws up this information:

In getting ready for the upgrade to CS 2008 I was trying to make some special backups... that wouldn't work. Well in digging into the matter more, that' service that is missing some files which is causing the peer to peer backups between Brianna and Yoda to fail.. isn't a real service at all.

We have backups so first thing tomorrow morning I'll be calling PSS Security to, more than anything else find out the "how" this happened.

Bottom line we got a critter on the box and I didn't (intentially anyway) put it there.

And to check to see if Yoda should be quarantened (aka web server turned off) to protect web visitors as well. So if the blog goes off the air a bit we're just doing it to better protect viewers.


In looking at the log files and event logs of Yoda, I'm not liking what I'm seeing... so the blog site at and will be offline starting at 7p.m. Pacific possibly until Friday.

Apologies for the inconvenience to all the bloggers on the site and we'll get back online as soon as we can.

Microsoft recommends that any systems found to be compromised or suspected of being compromised be formatted and re-installed from a known good build (i.e. operating system CD + all security patches while disconnected from the network). CERT has a good web site that provides information on recovering from security incidents located at:
Oh well.. it can happen to anyone.

Wednesday, 18 June 2008

HTM Hell

One feature of these recent SQL Injection attacks is that the same sites will get repeatedly hit. So an infected site might have any number of malware-laded domains injected into the code. Click the image below to see a snippet from a really badly infected site.

The interesting thing about these attacks is that they are not very reliable. It's perfectly possible to visit an infected site and have the javascript fail to load because that particular node of the fast flux botnet is offline - but where there are several calls to several different domains, then the likelihood of infection is much greater. The upside is that any sharp-eyed user should notice something odd with these badly infected pages.

The latest domain in the SQL Injection attacks is (i.e. pointing to Domain is registered to a (probably fake) Chinese contact through a Chinese registrar. Delivery mechanism and payload seem to be identical to the latest attacks.

Tuesday, 17 June 2008

Yet more SQL injection domains

Keep an eye out for,,,,,,,,, all pointing to b.js (e.g. - all forming part of the latest SQL injection attack.

Registrar is VIVIDS MEDIA GMBH - let's see if they clean up their act.

If you're in tech support, check your outbound logs for connections to these domains. If you're an end user then I'd recommend Firefox with Noscript as a good way to protects youself.

Friday, 13 June 2008

One to watch:

What the heck is In fact, where the heck is .la anyway? And why am I asking?

As I've mentioned before, there are possibly two gangs carrying out the current round of SQL Injection attacks, one possibly based in China and one based in Russia. Their techniques are very similar, but the seem to have distinct differences. appears in many of the "Chinese" exploits - itself appears to be a legitimate web counter site. Presumably part of the bad guys' statistical tracking system the domain is combined with what appears to be a randomly named .js file.

This doesn't appear to be a malware site in itself, but it could be a useful thing to look for in your proxy logs as it may well help track down machines that have visited infected sites. Either search for or perhaps just as part of your normal audit process.

Where is .la? Officially it is Laos, but the TLD is also being punted as "Los Angeles" by No clue there, but the fact that all the signups for are in Chinese really does indicate that there's a Chinese connection here. and

SQL injection time again, this time with two new domains and both loading a script called b.js (i.e. and

This is turning up on sites that have already been infected with other SQL injection attacks. The good news is that the new attacks seem to be smaller, indicating that people really are managing to secure their web servers.

Some notable infected sites (many of these have been cleaned up).
  • - BioImmune Inc (Health)
  • - Health
  • - Health
  • - Tandberg (Electronics)
  • - Technology Solutions Company (ERP services)
  • - The Polling Company (Market Research)
  • - St Petersburg College
  • - The Judge Group (jobs)
  • - IBS, Inc (IT Services)
  • - Business information
  • - Mintek Mobile Data Solutions
  • - Engineering jobs
  • - Digital storage
If you're searching for these domains yourself, I recommend using Yahoo! and Google as they give different results. Of course, these sites contain live malware so approach with caution.

Thursday, 12 June 2008 - lastest SQL injection domain

A continuation of the latest wave of SQL Injection attacks is - many sites infected with "older" attacks have been "upgraded" to The inserted code to look for is which then forwards to - this in turn seems to be able to deliver a variety of malware. is running on a fast flux botnet, so it's highly distributed and resilient but not very reliable at actually delivering a payload.

Tuesday, 10 June 2008

UK Goverment sites hit by SQL Injection attacks

Do you trust the government with your personal data? A look at some recent national and local government sites that have been compromised with SQL injection attacks might make you think again.

  • - Foreign and Commonwealth Office
  • - Department for Children, Schools and Families
  • - Harrow Council
  • - Cornwall County Council
  • - City of London
  • - City of London
  • - Nottingham City Council
  • - Leicetershire County Council
  • - Government Office Network
  • - London Development Agency
  • - UK Trade & Investment
  • - Northern Ireland leisure and tourism
  • - Colchester Borough Council
  • - Welsh assembly
  • - Welsh assembly
  • - Welsh assembly
  • - West Midlands Regional Assembly
  • - West Midlands Local Government Association
  • - Wycombe District Council
  • - South Shropshire District Council
  • - Business Development
  • - Shetland Council
  • - Essex County Council
  • - South Shropshire District Council
  • - Kingston Borough Council
  • - Cleveland Fire & Rescue
  • - Surrey Heath Council
  • - Royal Borough of Kensington and Chelsea
  • - Conwy County Council
These are some example searches that show the problem (note that the search results will change over time, and the results themselves may lead to malware). Yahoo! examples: 1 2 3 4 5; Google examples: 1 2 3 4

Widen the search to sites containing .gov with a "b.js" exploit in (the most common), and you can see that government sites all over the world have been compromised, with Yahoo! estimating 11,000 infected pages. Think about it.. these should be trusted sites, but clearly they are not safe. Remember: there is no such thing as a trusted site anymore.

SQL Injection:,,,

Another batch of domains being used in SQL Injection attacks:,,, Sanitize your inputs.

It looks like a lot of recent domains have been suspended by their registrar, some of the recent domains are with Xin Net who have been spam-friendly in the past, but may be cleaning up their act.

Google indicates that around 668,000 web pages are infected, but a search at Yahoo! shows around 3,000,000 infected pages which is probably more accurate.

Monday, 9 June 2008

Apple iPhone 3G

After lots and lots of rumours, the Apple iPhone 3G is finally here. It adds UMTS and HSDPA (3.5G), plus GPS and mapping. There's a new software platform, plus a number of other enhancements. But, really it's a bit disappointing.. the camera is still poor and you can't take out the battery.. and the 480 x 320 pixel display is so last year..

One surprising thing is that the iPhone will ship to 70 countries from July onwards. They've managed to do all that while keeping the iPhone 3G very quiet indeed.

Oh well, perhaps the iPhone 3 will finally be the one that fits in everything but the kitchen sink!

SQL Injection:,,,,

Another batch of domains showing up in SQL injected are,,,,

Some notable compromised sites:

  • - Irish Stock Exchange
  • - City of Pittsfield
  • - Corangamite Shire, Victoria
  • - Brazilian government agency
  • - Local newspaper
  • - Campaigning organisation
  • - Recruiting
  • - Business information
  • - Financial information
  • - Computer storage
  • - Tairawhiti Polytechnic, New Zealand
The payload at the moment is undertermined, and some of these sites will have been cleaned up. At the time of writing, Irish Stock Exchange at is still compromised.

"Company Littmann Stethoscopes Co.Ltd" bogus job, spoofing is an "under construction" website belonging to the wholly legitimate Medisave UK Ltd, a supplier of medical equipment.

Unfortunately, there is a fake job offer being sent out in Medisave's name. One twist is that the "From:" address is, but the reply to address is The spammers are taking advantage of the fake the the "reply to" address is often not clear until the user clicks "reply", otherwise they tend to see the fake "from" address (note, is not compromised and is not sending out these emails).

The job offer is likely to be some sort of money mule/money laundering scam. Really there's no need to dig further. Of interest is the fact the the email address has been harvested from a UK retailer and this is a UK-targeted spam.

From: Company Littmann Stethoscopes Co.Ltd
Subject: Online Job Opportunity (Apply Now )

Would you like to earn £5,000 in a week?

Reply Back for more details

100% legal No upfront payment from you.

Risk Free - reverse pump and dump or blackmail?

I received this unintelligible email from an IP address in Russia (, probably relating to the recent mystery outage at

Subject: In what a problem?
Date: Mon, June 9, 2008 7:14 am

News agency Reuters informs about not to working capacity of a site in
current of two weeks since June, 9th and corresponding it to falling of share price. Be close
at work with them.
What gives? My best guess is that someone is trying to either drive the share price down (perhaps they have a put option), or perhaps it is part of some blackmail plot relating to the outage.

Unfortunately for the bad guys, the email is completely incomprehensible. As spam, this one is definitely destined for the failboat.

Thursday, 5 June 2008

Googling for SQL injection infected sites

A very rough and ready Google search shows (warning: results may lead to malware) 792,000 pages that were infected when Google visited the site. Sites that say "This site may harm your computer." can be considered as persistent offenders. Note also that the search results may have some false positives.

All very interesting, you might think. But if you work in an IT department, it can be very useful to find sites that your users might visit so that you can take action.. or perhaps you can even check your own business.

In this current round of attacks, the bad javascript file is called b.js, so you can find a lot of infected sites by Googling for "script src" b.js (you need to include the quotes). That gives hundreds of thousands of matches.

One obvious check is to add your company name, for example "script src" b.js "oceanic airlines", but Google is cleverer than that. If you use the "inurl" function, then you can search for sites in certain TLDs or with certain names. For example "script src" b.js inurl:gov lists several government sites, "script src" b.js inurl:oceanic would find results on sites such as,,

You can narrow down results by country by using the Advanced Search (or you could just use the "national" Google site such as, etc). You can use other search engines too, but really Google has the most powerful searching options.

Of course, if you want to confirm if the site is still infected, then you will need to visit it. If you don't want all the hassle of firing up a Linux box, then one safe tool is SamSpade for Windows which allows you to look at the underlying HTML safely. It's a pretty old tool, and not perfect, but very useful for a number of tasks. Alternatively, WGET for Windows is more powerful and it allows you to download files in a command line (although care needs to be taken once they are on your machine). I tend to use both.

More SQL injection fun:, and

Yet more new domains in this never ending wave of SQL Injection attacks:, and Infected sites load a malicious javascript from or which redirects through - that in turn might try any number of things to infect the visitor's PC.

Chinese "selling-domain" mails

Probably not a scam, and really only a moderate hit on the Spam-O-Meter, but there do seem to be a number of emails from a person called Liu offering to sell a .cn version of your .com domain.

Subject: selling-domain:
Date: Thu, June 5, 2008 1:13 am

We have and think it is useful for you to made a China Website and
to explore China market.

We are pleased to inform you that we are now engage an activity by which you
can purchase this domain only with $1000 USD. If you are interested in it
,please reply to us and discuss the domain tranfer matters.
We could finish the transaction through which is a international
Domain trade agency.Then, will help you transferred the domain.
China is the biggest market in the world £¡ domains is a symbol of
enterprises in China£¡10,000,000 .cn domains are been registered£¡

At last,Sorry for the disturb if any.

Wish you a happy new year 2008, and welcome to our China to visit Olympic Games.

Best Regards.



Some large international companies use .cn domain in China. The world's largest search company China Station The world's largest online bookstore company
China Station he is the sub-stations in China

It used to be the case that anyone wanting to register a .CN name had to either live in China or have a business that operated in China, although this is no longer the case and it seems everyone can register a .CN name (some restrictions apply on names and content). Neulevel's FAQs on the .CN TLD are enlightening. There is a dispute policy if you feel that your domain name has been registered unfairly.

To be honest, I'm not at all bothered about .CN names and I certainly won't be shelling out $1000 for something I won't use. But as ever, if you want to protect your brand abroad then perhaps securing the .cn version of your domain might be a good idea, there's a list of registrars at CNNIC. and SQL injection attacks

More in the ever morphing world of SQL injection attacks. Sites that were hit with the attack are now directing to and sites previously infected with are now pointing to appears to be a dynamic DNS service, is a fast flux botnet. My best guess is that there are two rival groups performing SQL injections, one of them is Chinese and the other Russian.

The nature of the botnet means that the payload delivery is a bit erratic, but with a bit of effort coughs up a reference to fake anti-spyware site That tries to install a trojan which is pretty well detected by most AV products.

Thanks also to Amir who pointed us in the direction of his guide to preventing SQL injection attacks - if your server has been hit by one of these exploits, then it might be useful to you.

Wednesday, 4 June 2008 and related sites serving up malware

One notable name that keeps coming up with regards to the latest round of SQL Injection attacks is, published by 1105 Media, Inc as well as a number of sister sites. For a publication for IT professionals to be so badly impacted by SQL injection attacks raise some eyebrows.

A quick bit of Google searching shows how bad it is: a search for "1105 media" shows 35 infected pages belonging to,,, and Searching for "1105 media" comes up with 121 matches for and There are similar hits when searching for and

An alternative search you can do is b.js "1105 media" where this current batch of injected javascripts can clearly be seen (of course, this blog entry will also turn up for the same search string in time!)

This problem goes back to at least April when was infected by the attack.

Here's the thing: the sites showing up in Google are not infected at the moment, but they were when Google crawled them. Clearly 1105 Media cleans up the attacks quickly, but it has not yet managed to secure its SQL server against injection attacks. Perhaps 1105 Media should read some of their own articles on the subject (see - visit at your own risk!),, and another SQL injection attack

Yet another SQL injection attack doing the rounds, this time inserting references to, and The javascript redirects to (Obviously, don't visit these sites unless you know what you are doing!)

All the domains run on a distributed botnet and were freshly registered this morning to a no-doubt fake address:

whois -h ...

whois -h ...
Registration Service Provided By: VIVIDS MEDIA GMBH
Contact: +49.3094413291

Domain Name: WIN496.COM

lera (
reklama uslug 727 94-00
Tel. +7.4952345672

Creation Date: 04-Jun-2008
Expiration Date: 04-Jun-2009

Domain servers in listed order:

Administrative Contact:
lera (
reklama uslug 727 94-00
Tel. +7.4952345672

Technical Contact:
lera (
reklama uslug 727 94-00
Tel. +7.4952345672

Billing Contact:
lera (
reklama uslug 727 94-00
Tel. +7.4952345672

There are probably several different payloads, one we have seen is the Danmec trojan which drops a file called aspimgr.exe into the SYSTEM32 folder (more details here, here and here). The payload delivery may be randomised, it seems to be quite difficult to determine exactly what is going on.

If your server has been infected, then you need to do more than just clean it up.. you need to sanitize your SQL inputs. You can read more details of how SQL injections works here.

Right now it is difficult to say how many sites are impacted as the domains are really very new.

Added: you can add to this list too. That was registered 5 days ago, and a Google search already shows over 2000 hits. Also has infected over 4000 pages in the same time frame.

Tuesday, 3 June 2008

Some people are stupid

A classic post over at the F-Secure blog where some muppet "hacker" accidentally emailed out their malware generation tool and put it right into the hands of anti-virus researchers. To quote F-Secure, Hey, thanks. Keep up the good work.

On a more serious note, this tool is used to generate trojanised PDF files. So go and check that your version of Adobe Reader is up to date right now before doing anything else.., and SQL injection attack

Another bunch of at least three domains (perhaps more) being used in SQL injection attacks are, and In each case the injected script points to b.js, and this then tries to redirect visitors to

It looks like some sort of fast flux network based on a botnet, so it's not actually very reliable and as yet it hasn't delivered a payload in our lab. The ISC indicate that the attack serves up a couple of infected Flash banners, although in this case the redirector seems to be

At the moment, these merely serves up another redirector to, but it would be easy enough for the botnet controllers to change it to a malicious payload.

Some notable infected sites:

  • (Technology magazine - again!)
  • (Anne Frank Museum)
  • (Indian movies)
  • (Sport)
  • (US TV station)
  • (UK local government)
  • (Marketing guide)
  • (Australia local government)
This is quite a fresh looking exploit, this is not comprehensive. It is very disappointing to see listed yet again, and we've seen sister publication infected before too. - yet another SQL injection attack

It looks like the sites hit by the attack have been hit again, this time with an injection to a script pointing at Right at the moment, the domain is not resolving, but it does appear to be hosted on in China.

It looks like the domain may well be a legitimate one that has somehow been compromised and looks like a pretty standard shared server.

It's possible that the infected sites were deliberately targeted, the resulting HTML is an awful mess though (see below).

Some notable infected sites:

  • (again)
  • (again)
  • (again)
  • (again)
  • (again)
  • (Iowa State legislature)
  • (Stockholm Museum)
  • (University)
  • (Child protection)
  • (Citizen's Advice Scotland)
  • (Technlogy magazine)
  • (Random House publishers, Australia)
  • (Northern Ireland tourism)
There are a number of other sites, notably in Ireland, Australia and Canada hit too.

This is not the only SQL injection attack doing the rounds today, and I suspect that some of them have been hit by another one pointing at

As an aside, these multiple SQL injections are really messy. A code snippet from demonstrates this:

Monday, 2 June 2008

Bizarre USPS scam

It's hard to tell what the scammer is trying here due to the amusingly bad English. Mail originates from the spammers favourite email service, Gmail ( but uses a French Yahoo! email address as a drop box with a Polish "From" address.

Clearly some sort of parcel scam where there will be a release fee of some description. Steer clear.

Subject: Please Contact Us With This Email Address Below (
From: "markwillams2"

Hello Dear,

Please i have to let you knowing this that your have reciverd your parcel,
and do not let me knowing about that since last year.

At this very point now, do to i have not heard from you to knowing the
sitution of things now, for your information track your parcel and you will
sean what am talking about please.

However if you knowing that you are not the one please do get back to me as
matter of urgent to day.please track and sean with this information Below

Label Number: 0515 0134 7110 8886 8806

Please Contact Us With This Email Address Below (

Mark Williams