Sponsored by..

Monday, 17 September 2012

Spam with numbers and "hi" in it..

There seems to be a lot of this about today..

Date:      Mon, 17 Sep 2012 08:39:16 -0300
Subject:      Re: 89898877282500

Hi
The numbers vary in each email, from single digits to quite long sequences. The body text is always "Hi", nothing appears to be hidden or malicious in any way. One characteristic is that the recipient is not usually the one in the "To" field as the spam is using the BCC field to suppress recipients.


The emails are not harmful, but obviously there is something going on. One possibility is that this is a probing attack, where an outside source is attempting to enumerate live mailboxes or collate server responses for further use. A short email like this will get passed through many spam filters, so (for example) it could be that the attacker is looking for SMTP responses that indicate a real mailbox to spam again later rather than a dead one.





If you have any other ideas, then please share them in the Comments :)

Thursday, 13 September 2012

ADP spam / 46.249.37.122

This fake ADP spam tries to load malware from 46.249.37.122:

From: ADP_Online_Invoice_DoNotReply@adp.com ADP_Online_Invoice_DoNotReply@adp.com
Date: 13 September 2012 14:29
Subject: ADP Invoice Reminder

Your latest ADP Dealer Services Invoice is now available to view or pay online at ADP Online Invoice Management .

To protect the security of your data, you will need to enter your ID and password, then click on Access your Online Invoice Management account.

Total amount due by September 13, 2012

$17202.04

If you have already sent your payment please disregard this friendly reminder and Thank you for choosing ADP.

Questions about your bill?

Contact David Nieto by Secure Mail.

Note: This is an automated email. Please do not reply. 

After clicking the link bouncing through a couple of redirectors, the victim ends up at [donotclick]46.249.37.122/links/systems-links_warns.php which appears to be generating a 404 error (although it could be fake). This could be a legitimate but hacked server as it is also the IP address for a proxy service called dutchprox.com. In any case, you might decide you want to block the IP just in case.

Tuesday, 11 September 2012

US Airways spam / blue-lotusgrove.net

A couple of samples of a fake US Airways spam email leading to malware on blue-lotusgrove.net:


Date:      Tue, 11 Sep 2012 15:32:42 -0300
From:      "US Airways - Reservations" [reservations@myusairways.com]
Subject:      Please confirm your US Airways online registration.
   
You can check in from 24 hours and up to 60 minutes before your flight (2 hours if you're flying internationally). Then, all you need to do is print your boarding pass and proceed to the gate.

Confirmation code: 592499

Check-in online: Online reservation details

Flight

6840    
Departure city and time

Washington, DC (DCA) 10:00PM

Depart date: 9/12/2012    

We are committed to protecting your privacy. Your information is kept private and confidential. For information about our privacy policy visit usairways.com.

US Airways, 111 W. Rio Salado Pkwy, Tempe, AZ 85281 , Copyright US Airways , All rights reserved.

==========


Date:      Tue, 11 Sep 2012 23:29:14 +0700
From:      "US Airways - Reservations" [intuitpayroll@e.payroll.intuit.com]
Subject:      US Airways online check-in.

you {l2} check in from 24 hours and up to 60 minutes before your flight (2 hours if you're flying {l3}). {l4}, all you {l5} to do is print your boarding pass and {l6} to the gate.

confirmation code: {digit}

check-in online: online reservation details

flight

{digit}    
departure city and time

washington, dc (dca) 10:00pm

depart date: 9/12/2012    


we are committed to protecting your privacy. your information is kept private and confidential. for information about our privacy policy visit usairways.com.

us airways, 111 w. rio salado pkwy, tempe, az 85281 , copyright us airways , all rights reserved.

The malicious payload is at [donotclick]blue-lotusgrove.net/main.php?page=559e008e5ed98bf7 (report here) hosted on 203.91.113.6 (G Mobile, Mongolia), the same IP used in this attack. The following domains are on the same server, they can all be considered to be malicious:


padded.pl
spiki.pl
fruno.pl
nextbox.pl
omariosca.com
hemiga.com
decorera.com
seneesamj.com
unitmusiceditior.com
likenstendarts.com
flatbuzz.com
morepic.net
dushare.net
blue-lotusgrove.net
nitor-solutions.net
gsigallery.net
atfood.ru
indyware.ru
advia.kz
iowa.kz
autumn.kz
wet.kz

Friday, 7 September 2012

FedEx spam / dushare.net and gsigallery.net

Two fake FedEx campaigns today, with a format similar to the one found here but with different payload sites of dushare.net and gsigallery.net

In the first case, the malicious payload is at [donotclick]dushare.net/main.php?page=c82ec1c8d6998cf0 (report here) hosted on 203.91.113.6 (G Mobile, Mongolia). In the second case the payload is at [donotclick]gsigallery.net/main.php?page=2bfd5695763b6536 (report here) also hosted on 203.91.113.6.

The following domains are on the same server and should also be treated as being suspect.

padded.pl
spiki.pl
fruno.pl
nextbox.pl
omariosca.com
hemiga.com
decorera.com
seneesamj.com
obweesysho.com
unitmusiceditior.com
likenstendarts.com
flatbuzz.com
morepic.net
atfood.ru
indyware.ru
advia.kz
iowa.kz
autumn.kz
wet.kz
dushare.net
gsigallery.net

FedEx spam / studiomonahan.net

This somewhat mangled looking fake FedEx spam leads to malware on studiomonahan.net:


Date:      Thu, 6 Sep 2012 11:00:28 -0600
From:      BillingOnline@fedex.com
Subject:      Your Fedex invoice is ready to be paid now.

       
    FedEx Billing Online - Ready for Payment

        fedex.com        
       

<td wid="th="10"" rowspan="2">

Hello [redacted]
You have a new not paid bill from FedEx that is ready for payment.

The following ivoice(s) are ready for your review :

<table border-top="1px solid #000" solid="" #000"="" border-left="1px solid #ccc" border="-bottom="1px" height="55" width="473">
<td= class="resultstableheader">
Invoice Number
7215-17193


To pay or review these invoices, please sign in to your FedEx Billing Online account by clicking on this link: http://www.fedex.com/us/account/fbo

Note: Please do not use this email to submit payment. This email may not be used as a remittance notice. To pay your invoices, please visit FedEx Billing Online, http://www.fedex.com/us/account/fbo


Thank you,
Revenue Services
FedEx


   


    This message has been sent by an auto responder system. Please do not reply to this message.

The content of this message is protected by copyright and trademark laws under U.S. and international law.
Review our privacy policy. All rights reserved.

Subjects spotted so far include:

Pay your Fedex invoice online.
Your Fedex invoice is ready to be paid now.
Please pay your outstanding Fedex invoice.
Your Fedex invoice is ready.


The malicious payload is found at [donotclick]studiomonahan.net/main.php?page=2bfd5695763b6536 (report here) hosted on 206.253.164.43 (Hostigation, US). The server contains the following suspect domains which should also be blocked:

fireinthesgae.pl
joncarterlope.pl
storuofginezi.com
usagetorrenen.com
dinitrolkalor.com
comercicalinz.com
studiomonahan.net
globusbusworld.su
jordanpowelove.su
appropriatenew.su
cdfilmcounderw.su
studiomonahan.net

Wednesday, 5 September 2012

Nokia Lumia 920

This is nice. If you've been waiting a long time for Nokia to come up with something competitive in the smartphone market then the wait might be over, because the Lumia 920 is certainly as good as the best of them.

Perhaps the interesting thing is Windows Phone 8, based on the same core as the desktop version. It holds out the promise of eventual Active Directory integration and easier management for corporates. And it's a lot, lot sexier than a BlackBerry.

[via]

"Records passed to us show you're entitled to a refund.." SMS Spam (again)

These spammers are at it again:
Records passed to us show you're entitled to a refund approximately £2560 in compensation from mis-selling of PPI on your credit card or loan.Reply INFO or stop

The sending number is +447876628983 (although they will change this). Bearing in mind that I have never been mis-sold PPI, I can pretty much disregard this as a scam. Except, rather more seriously the implication is that the spammers are prepared to submit a fraudulent refund claim on your behalf, which is something rather more serious.

If you get one of these, you should forward the spam and the sender's number to your carrier. In the came of T-Mobile, O2 and Orange the number to report to is 7726 ("SPAM"). Vodafone customers should use 87726 ("VSPAM") and Three customers should use 37726 ("3SPAM"). Hopefully the carriers will act if there are enough complaints.

Fake HMRC spam leads to multi-phish

Here's something I haven't seen before.. it starts with an email:

From: HM Revenue & Customs [mailto:refund.request@hmrc.gov.uk]
Sent: 05 September 2012 14:27
Subject: Tax Refund Alert - Action Required



How to complain, ask for a review or make an appeal
Review process update
Review process - the first 12 months. Find out more
Claim Your Tax Refund Online
We identified an error in the calculation of your tax from the last payment, amounting to £ 859.00. In order for us to return the excess payment, we need to confirm a few extra details after which the funds will be credited to your specified bank account. Please click "Refund Me Now" below to claim your refund:
Refund Me Now
We are here to ensure the correct tax is paid at the right time, whether this relates to payment of taxes received by the department or entitlement to benefits paid.
Best Regards,
HM Revenue & Customs Refund Department
•    See also
•    Appeal and review news
•    Working and paying tax
•    Pensioners
•    Find a form
•    Complaints factsheet C/FS (PDF 67K)
•    Feedback

HM Revenue and Customs are the UK tax collecting agency, so this is basically a tax refund. The link goes to a somewhat authentic looking page.

The phishing site in this case is in Korea (durideco.co.kr in this case). The interesting part is the drop-down menu in the middle that the victim is meant to use to select their bank. There are 17 different UK banks to choose from. Each one leads to an individual phishing page for each bank, for example:


or


I won't bother pasting all the pictures here, but some of the pages are very good and a few don't work at all (e.g. Northern Rock, which doesn't really exist any more).

This is quite a clever approach. Normally a phishing email is a "one bank per phish" affair.. it's no use sending someone a Barclays phish if they're with HSBC. In this case pretty much all the major UK banks are covered in one email which is really quite sneaky..

Something evil on 195.225.55.130

These domains are pushing some sort of malware or other (possibly fake antivirus). It's hard to tell exactly what nastiness is here, but given that these are all recently registered domains with fake WHOIS details then it's certainly not going to be anything good.

Whatever it is, it seems to be promoted via spam and requires the correct User Agents and Referrer data to trigger. Sites are hosted on 195.225.55.130 (Dako Systems, Netherlands)

spokanesimplified.org
safetygold.org
businsideessfolowinggate.org
reservetri.org
cardreform.org
swapopen.org
businessfolowingdoor.org
smokersinsurancelinesguns.org
smokerslifeonlinesguns.org
smokerslifeoverlinesguns.org
livesstorytiderss.org
wiredesert.org
mylittallbeizz.org
gunslinzmouses.info
criticstocks.info
largusliananumbers.info
livesstorytiders.info
mailhostsboot.info

Tuesday, 4 September 2012

LinkedIn spam / 108.178.59.26 and myasuslaptop.com

This fake LinkedIn spam leads to malware on 108.178.59.26 and myasuslaptop.com:

Date:      Tue, 04 Sep 2012 10:43:03 +0100
From:      "noreply" [noreply@linkedin.com]
Subject:      Link LinkedIn Mail

LinkedIn
REMINDERS

Invitation reminders:
• From Charlie Alexander (Mexico Key Account Director at Quanta)


PENDING MESSAGES

• There are a total of 5 messages awaiting your response. Visit your InBox now.

Don't want to receive email notifications? Adjust your message settings.

LinkedIn values your privacy. At no time has LinkedIn made your email address available to any other LinkedIn user without your permission. © 2012, LinkedIn Corporation.


The malicious payload (report here) is at [donotclick]108.178.59.26/bv6rcs3v1ithi.php?w=6de4412e62fd13be (Singlehop, US) in a block 108.178.59.0/26 suballocated to a person in Italy.  A further malicious download is attempted from [donotclick]myasuslaptop.com/updateflashplayer.exe which appears to be a legitimate (but hacked site).

My personal preference with any emails purporting to be from LinkedIn is to block them at the perimeter. As far as most businesses are concerned it is simply a playground for recruiters trying to poach your staff..

Tuesday, 28 August 2012

"QuickBooks Security Update" spam / roadmateremove.org

This fake Intuit spam leads to malware on roadmateremove.org:


Date:      Tue, 28 Aug 2012 11:04:30 -0400
From:      "Intuit Payroll Services" [intuitpayroll@e.payroll.intuit.com]
Subject:      QuickBooks Security Update

You will not be able to access your Intuit QuickBooks without updated Intuit Security Tool (IST™) after 31th of August, 2012.

You can update Intuit Security Tool here.

After a successful download please run the setup for an automatic installation, then login to Intuit Quickbooks online to check that it is working properly.

This email was sent from an auto-notification system that can't accept incoming email. Please don't reply to this message.

You have received this business communication as part of our efforts to fulfill your request or service your account.
You may receive this and other business communications from us even if you have opted out of marketing messages.

Terms, conditions, pricing, features, and service options are subject to change. View our complete Terms of Service.


The malicious payload is at [donotclick]roadmateremove.org/main.php?page=9bb4aab85fa703f5 (report here) hosted on 89.248.231.122 (Mastak Telecom / JSC Quickline, Russia) along with these other malicious sites:

roadmateremove.org
restoreairpowered.net
allhugedeals.net
classic-poems.net

You can pretty safely assume that 89.248.231.122 is a bad server and should be blocked.

Monday, 27 August 2012

"Federal Tax Payment" spam / videomanipulationccflbacklit.pro

This spam attempts to load malware from videomanipulationccflbacklit.pro although at the moment the domain is not resolving:

Date:      Mon, 27 Aug 2012 18:15:37 +0300
From:      "Internal Revenue Service" [irs@service.govdelivery.com]
Subject:      Federal Tax transaction canceled

Your Tax transaction (ID: 849395748011), recently sent from your checking account was canceled by the your financial institution.

Rejected Tax transfer
Tax Transaction ID:     849395748011
Return Reason     See details in the report below
FederalTax Transaction Report     tax_report_849395748011.doc (Microsoft Word Document)


Internal Revenue Service, Metro Plex 1, 8401 Corporate Drive, Suite 300, Landover, MD 20785

==========

Date:      Mon, 27 Aug 2012 16:41:45 +0200
From:      "Internal Revenue Service" [irs@service.govdelivery.com]
Subject:      Rejected Federal Tax payment

Your Tax transaction (ID: 13394702616857), recently initiated from your bank account was returned by the your Bank.

Rejected Tax transfer
Tax Transaction ID:     13394702616857
Reason for rejection     See details in the report below
Tax Transaction Report     tax_report_13394702616857.doc (Microsoft Word Document)


Internal Revenue Service, Metro Plex 1, 8401 Corporate Drive, Suite 300, Landover, MD 20785

==========


Date:      Mon, 27 Aug 2012 16:41:35 +0200
From:      "Internal Revenue Service" [support@govdelivery.com]
Subject:      Federal Tax payment canceled

Your Tax transaction (ID: 7227784606474), recently initiated from your bank account was returned by the The Electronic Federal Tax Payment System.

Rejected Tax transfer
Tax Transaction ID:     7227784606474
Reason for rejection     See details in the report below
FederalTax Transaction Report     tax_report_7227784606474.doc (Microsoft Word Document)


Internal Revenue Service, Metro Plex 1, 8401 Corporate Drive, Suite 300, Landover, MD 20785

I've seen a few .pro domains in spam recently, but they seem to get shut down quite quickly. I thought this TLD was meant to have more careful vetting?

Malware sites to block 27/8/12

A small bunch of IPs and domains spotted in recent malicious spam campaigns that you might want to block..

24.171.200.91
50.116.38.138
89.248.231.122
109.164.221.176
173.234.9.17
184.107.119.39
199.167.138.113
200.29.107.84
allbooksbest.com
allhugedeals.net
basicsmarkeddown.pro
bikeslam.net
classic-poems.net
markelink.net
market-panel.net

Friday, 17 August 2012

UPS "End of Aug. Stat. Required" Spam / panalki.ru

This fake UPS spam leads to malware on panalki.ru:

Date:      Fri, 17 Aug 2012 06:50:08 -0400
From:      "Global Express" [ups-services@ups.com]
Subject:      Re: FW: End of Aug. Stat. Required
Attachments:     Invoices-26-2012.htm

Hallo,

as reqeusted I give you inovices issued to you per july.

Regards

The malicious payload is at [donotclick]panalki.ru:8080/forum/showthread.php?page=5fa58bce769e5c2c (report here) hosted on a bunch of familiar looking IP addresses which should be blocked if you can.

50.56.92.47 (Slicehost, US)
190.120.228.92 (Infolink, Panama)
203.80.16.81 (Myren, Malaysia)


Thursday, 16 August 2012

"Scan from a Hewlett-Packard ScanJet" spam / anapoli.ru

More fake printer spam, this time leading to malware on anapoli.ru:


Date:      Thu, 16 Aug 2012 12:20:25 +0500
From:      Mariah Gunn via LinkedIn [member@linkedin.com]
Subject:      Fwd: Scan from a Hewlett-Packard ScanJet #88682504
Attachments:     HP_scanDoc.htm

Attached document was scanned and sent



to you using a Hewlett-Packard HP 90027P.

SENT BY : SAVANNAH
PAGES : 1
FILETYPE: .HTML [Internet Explorer File]
The malicious payload is on [donotclick]anapoli.ru:8080/forum/showthread.php?page=5fa58bce769e5c2c (report here) hosted on a bunch of familiar looking IP addresses:
50.56.92.47 (Slicehost, US)
190.120.228.92 (Infolink, Panama)
203.80.16.81 (Myren, Malaysia)


Wednesday, 15 August 2012

mskoblastionline.ru - malicious spam goes nuts

The malicious spam pushers are trying very hard today to drive traffic to their malware site on mskoblastionline.ru with a variety of familiar-looking spam emails:

Date:      Wed, 15 Aug 2012 01:20:05 -0400
From:      CarinaRue@mail.com
Subject:      Fwd: Wire Transfer (1408EA58)
Attachments:     Wire_Transfer_N839.htm

Dear Operator,

WIRE TRANSACTION: AC-961141236714971

STATUS: CANCELLED

You can find details in the attached file.

==========

Date:      Wed, 15 Aug 2012 10:51:49 -0500
From:      "LEILANI Roe" [RoeRmLEILANI@hotmail.com]
Subject:      Fwd: Re: Wire Transfer Confirmation
Attachments:     Wire_Transfer_N839.htm

Dear Operator,

WIRE TRANSACTION: AC-6427060719674502

STATUS: CANCELLED

You can find details in the attached file.

==========


Date:      Wed, 15 Aug 2012 12:31:44 +0300
From:      sales1@victimdomain.com
Subject:      Re: Your Flight US 34-4827
Attachments:     FLIGHT_TICKET_US1650023.htm

Dear Customer,

FLIGHT NUMBER 42463-8276

DATE/TIME : SEPT 27, 2012, 11:12 PM

ARRIVING AIRPORT: SAN-DIEGO AIRPORT

PRICE : 449.06 USD

Your bought ticket is attached to the letter as a scan document .

To use your ticket you should print it.

ESMERALDA KNUTSON,

==========

Date:      Wed, 15 Aug 2012 08:06:14 +0100
From:      Collene Varner via LinkedIn [member@linkedin.com]
Subject:      Fwd: Re: Your Flight US 65-46595
Attachments:     FLIGHT_TICKET_US284399461.htm

Dear Customer,

FLIGHT NUMBER 4108-2738

DATE/TIME : SEPT 21, 2012, 10:15 PM

ARRIVING AIRPORT: SAN-DIEGO AIRPORT

PRICE : 083.97 USD

Your bought ticket is attached to the letter as a scan document .

To use your ticket you should print it.

Abeni PINA,

==========

Date:      Wed, 15 Aug 2012 00:50:03 -0800
From:      LinkedIn [welcome@linkedin.com]
Subject:      Fwd: Better Business Bureau Complaint
Attachments:     Complaint_ID45JG836043169.htm

Good afternoon,

Here with the Better Business Bureau would like to inform you that we have received a complaint (ID 1630630165) from a customer of yours in regard to their dealership with you.

Please open the COMPLAINT REPORT attached to this email (open with Internet Explorer/Mozilla Firefox) to view the details on this issue and suggest us about your position as soon as possible.

We hope to hear from you shortly.

Regards,

KARRI PENA

Dispute Counselor

Better Business Bureau

==========


Date:      Wed, 15 Aug 2012 04:02:26 +0600
From:      Ashley Madison [donotreply@ashleymadison.com]
Subject:      Re: Better Business Bureau Complaint
Attachments:     Complaint_N35XL147712.htm

Good afternoon,

Here with the Better Business Bureau would like to inform you that we have received a complaint (ID 63959031295)
from a customer of yours in regard to their dealership with you.

Please open the COMPLAINT REPORT attached to this email (open with Internet Explorer/Mozilla Firefox) to view the details on this issue and suggest us about your position as soon as possible.

We hope to hear from you shortly.

Regards,

CONNIE DORAN

Dispute Counselor

Better Business Bureau

==========

Date:      Wed, 15 Aug 2012 05:31:19 -0500
From:      LinkedIn Connections [connections@linkedin.com]
Subject:      Re: Fwd: Better Business Bureau Complaint
Attachments:     Complaint_ID61Zu4932887.htm

Good afternoon,

Here with the Better Business Bureau would like to inform you that we have received a complaint (ID 501379901) from a customer of yours in regard to their dealership with you.

Please open the COMPLAINT REPORT attached to this email (open with Internet Explorer/Mozilla Firefox) to view the details on this issue and suggest us about your position as soon as possible.

We hope to hear from you shortly.

Regards,

Romeo Keyes

Dispute Counselor

Better Business Bureau
The malicious payload is at [donotclick]mskoblastionline.ru:8080/forum/showthread.php?page=5fa58bce769e5c2c (report here) hosted on the following IPs:


50.56.92.47 (Slicehost, US)
190.120.228.92 (Infolink, Panama)
203.80.16.81 (Myren, Malaysia)


The following IPs and domains are all connected and should be blocked:
50.56.92.47
190.120.228.92
203.80.16.81
spb-koalitia.ru
gorysevera.ru
sergikgorec.ru
mskoblastionline.ru
kefrikin.ru
pussyriotss.ru
ashanrestaurant.ru
panamamoskow.ru
mirdymas.ru




Tuesday, 14 August 2012

"Federal Tax" spam / wireframeglee.info

This tax-themed spam leads to malware on wireframeglee.info:


Date:      Tue, 14 Aug 2012 15:21:33 +0200
From:      "Internal Revenue Service" [alerts@irs.gov]
Subject:      Rejected Federal Tax transfer

Your Tax payment (ID: 38969777924999), recently sent from your checking account was returned by the The Electronic Federal Tax Payment System.

Rejected Tax transaction
Tax Transaction ID:     38969777924999
Return Reason     See details in the report below
Tax Transaction Report     tax_report_38969777924999.doc (Microsoft Word Document)


Internal Revenue Service, Metro Plex 1, 8401 Corporate Drive, Suite 300, Landover, MD 20785

==========

Date:      Tue, 14 Aug 2012 13:31:21 +0000
From:      "Internal Revenue Service" [support@irs.gov]
Subject:      Federal Tax payment canceled

Your federal Tax payment (ID: 903463682456), recently from your bank account was rejected by the your financial institution.

Rejected Tax transfer
Tax Transaction ID:     903463682456
Reason of rejection     See details in the report below
FederalTax Transaction Report     tax_report_903463682456.doc (Microsoft Word Document)


Internal Revenue Service, Metro Plex 1, 8401 Corporate Drive, Suite 300, Landover, MD 20785

==========


Date:      Tue, 14 Aug 2012 14:42:19 +0200
From:      "Internal Revenue Service" [noreply@irs.gov]
Subject:      Your Federal Tax transaction

Your Tax transaction (ID: 80110764248536), recently initiated from your checking account was returned by the your Bank.

Canceled Tax transaction
Tax Transaction ID:     80110764248536
Reason of rejection     See details in the report below
FederalTax Transaction Report     tax_report_80110764248536.doc (Microsoft Word Document)


Internal Revenue Service, Metro Plex 1, 8401 Corporate Drive, Suite 300, Landover, MD 20785

The malicious payload is at [donotclick]wireframeglee.info/main.php?page=39630332cf486f5a (report here) hosted on 78.87.123.114 (CYTA, Greece) which has been seen several times lately and should be blocked if you can.

"We can not charge your credit card" spam / kefrikin.ru

This spam pretends to be from Amazon. Or UPS. Or perhaps both. Anyway, it leads to malware on kefrikin.ru:


Date:      Tue, 14 Aug 2012 05:26:05 +0200
From:      "ups" [mail@ups.com]
Subject:      We can not charge your credit card
Attachments:     Amazon_Invoice.htm

    Your Account | Help
Your credit card was blocked.
We tried to withdraw money from your credit card, but your bank decline it. In the attachment you will be found a invoice from your last order. Please pay this invoice as soon as possible.

Conditions of Use Privacy Notice � 1996-2012, Amazon.com, Inc. or its affiliates

The attachment Amazon_Invoice.htm is malicious and it attempts to download a malicious script from [donotcick]kefrikin.ru:8080/forum/showthread.php?page=5fa58bce769e5c2c (report here) hosted on the following IPs (which have all been used for malware distribution several times):

190.120.228.92
199.71.212.78
203.80.16.81


Monday, 13 August 2012

Even more malware sites to block on 194.28.115.150

More evil sites to block on 194.28.115.150 (Specialist ISP) following on from these:

idi42nga.rr.nu
kprud89entia.rr.nu
hin66gof.rr.nu
iste03dengi.rr.nu
hing30emplo.rr.nu
ize84dso.rr.nu
ind42icat.rr.nu
lack33andw.rr.nu

"Scan from a Xerox WorkCentre Pro" spam / mirdymas.ru

This spam leads to malware on mirdymas.ru:

From: messages-noreply@bounce.linkedin.com [mailto:messages-noreply@bounce.linkedin.com] On Behalf Of LinkedIn Password
Sent: 13 August 2012 08:59
Subject: Fwd: Re: Re: Scan from a Xerox WorkCentre Pro #9484820

A Document was sent to you using a XEROX WorkJet OP578636.


SENT BY : JIN
IMAGES : 1
FORMAT (.JPEG) DOWNLOAD

DEVICE: 109A62DS953L

The malicious payload is at [donotclick]mirdymas.ru:8080/forum/showthread.php?page=5fa58bce769e5c2 (report here) hosted on the following familiar IP addresses:

46.51.218.71 (Amazon, Ireland)
71.89.140.153 (Cloudaccess.net, US)
203.80.16.81 (Myren, Malaysia)

Blocking access to these IPs will prevent other malicious sites on the same servers from being a problem.

Something evil on 178.63.195.128/26

The IP address range 178.63.195.128/26 nominally belongs to grey hat host Hetzner in Germany, although it has been reallocated to a registrant in Israel. This block recently came up as the source for a ZeroAccess infection picked up from 178.63.195.170.

A look at the 178.63.195.128/26 range (178.63.195.128 - 178.63.195.191) shows several suspicious websites with domains apparently generated by DoItQuick (more info here). Most of the domains are too new to have any reputation, although given the live distribution of malware and the randomly chosen names then they are unlikely to be doing anything nice.

Also, I notice that quite a lot of suspect sites have recently been moved from this range to point at 127.0.0.1 instead, a common trick when malcious domains needs to be pointed somewhere else quickly.

The registrant for this block is:
 inetnum:         178.63.195.128 - 178.63.195.191
netname:         R5X
descr:           r5x
country:         DE
admin-c:         TG3863-RIPE
tech-c:          TG3863-RIPE
status:          ASSIGNED PA
mnt-by:          HOS-GUN
source:          RIPE # Filtered

person:          Tomas Gailiavicius
address:         r5x
address:         Kalinina 47-71
address:         188760 Priozersk
address:         RUSSIAN FEDERATION
phone:           +79876960550
nic-hdl:         TG3863-RIPE
mnt-by:          HOS-GUN
source:          RIPE # Filtered

178.63.195.163
altspanning.org
atherosplaylists.org
betasreceivable.org
bringsgrade.org
contenderfilesplitting.org
csidisengage.org
designercomcast.org
encouragesprosuite.org
excellentinvolving.org
firefoxorbitz.org
harvardhqv.org
journalcleanup.org
musicmakingranging.org
ndascontinuum.org
netbiosmediocre.org
originatingcomplicated.org
outlinedpart.org
pantspool.org
preciselycolormatching.org
rantcloned.org
sciencehearted.org
splitnearparent.org
threeparagraphrequirements.org
undeniableblues.org
upscalingfinalproduction.org
vhsintellectual.org
violationsmazes.org
weekendshadows.org
wellthoughtoutestablish.org
workforcefortunately.org

178.63.195.167
builtvaults.org
crystaljacket.org
photomanagementheadhunternet.org
spywareonlyadept.org
starshapedoutstanding.org
static-globe.info

178.63.195.168
bentowe.org
catchespayoff.org
connect4free.in
dvstitems.com
eeechock.org
flyeralone.info
flyersregard.com
free2connect.org
free4connect.org
hatssystem.org
internalpackaged.info
interviewsyamaha.org
operateriot.org
packageswml.info
playerhill.info
successfulmpfs.org
tetrisbroaden.com
zippedjump.com

178.63.195.170
abroad.name
cloud18.name
crimson25.name
dr4ms.name
du5t.name
fakejoke.name
fastservice.name
hlops.name
r0cket.name
ramaro.name
sameday.name
strongalc.name

178.63.195.171
bedtimeblues.org
book-placed.info
bookpart.info
bookpedias.info
bookposters.info
bookposts.info
builderviral.org
jeat-services.info
jeatservices.info
jeatstore.info
jetpremiums.info
jetsbookings.info
krym-house.info
krym-invest.info
krym4x4.info
krymvip-avto.info
krymzakupka.info
netledgerstumblrs.org
teatr-benefis.info
teatrbilet.info
teatrflowers.info
teatrglas.info
teatrgroup.info
trust-spb.info
truthbearers.info
trutrance.info
trworkshop.info
tryfxdata.info

Also these domains appear to be deactivated by pointing them to 127.0.0.1, but you might want to block them just in case:
addonsthoughultrasharp.info
adjustmentsmarginal.info
affectingmacrobiotics.org
alternatelylaughs.info
amalgamie.org
androidstwothirds.info
appleawardwinningstarshaped.info
attractionintrusive.org
aufdeal.info
blurbswatermarks.org
boltsmaking.info
caligarisflipboard.org
circlekidlandias.org
citegologo.org
cleanerspreview.info
collagesenjoyed.info
compensateversamail.info
computercontrolledtelsurf.info
conducivesnag.org
createasimfreemium.info
criesvendor.info
csspoets.info
curiousrebuilding.info
deletingpricelinecom.org
dependentssecond.org
desksorganize.org
didcontinuous.org
discoveredshuts.info
discussioncommentingmonths.info
disqushomepremier.info
embracedpreset.info
endurancescream.info
enforcesfinetune.org
epublishingtodays.info
exploredestabilized.info
extendscrosscountry.org
feedsproxystyle.org
filesyncingenigmatic.org
founderslogin.info
friendshipinterrupt.org
grandmasterpre.org
gunsgml.info
heftyends.info
idlpatterns.org
inboxtie.org
inputsecho.info
invoicedimplementations.info
javacentricunencumbered.org
kevinverizon.info
legalzoomspeak.org
licensedcrispest.org
likingmodule.info
lingeriegiftgiving.org
lodebombermonster.org
machinesruns.info
merchandiseorderingcommerce.org
mixedprone.info
mobileslockeddown.org
mouthmindmanager.org
mydocumentsredirected.info
myspaceatsale.org
namepasswordcobble.info
nanimatedpaperclip.info
notificationloose.org
obihaiwebfriendly.org
omissioncurve.info
onboardstougher.info
onchipimpressively.info
oneoffsynched.info
outshineresearcher.info
ownorcleared.info
pairautoupdate.info
permittighter.org
pimsluernarrating.info
programundo.org
realarcadeextranet.org
reallifeinformation.org
referjustifies.org
relinquishfloated.org
removersitevalidation.info
resettingeyeopening.info
ripoffsfliers.info
roadtripearlier.info
rocfloating.org
sanknowledge.info
selfemployedspeed.info
sierrastorms.org
silenceshalls.info
softpedalswav.info
solitaryorions.org
southmouse.org
specimenfortunate.info
spellingsurfinshield.info
sportsbare.info
stateforbid.org
staticmarkets.org
steveapprovals.org
stumbledunrooted.info
stylizeawarded.info
submenusonlineoriented.info
supplantbriefly.org
suspendersnine.org
textuallythrifty.org
tiabberation.info
touchtypinglower.org
treasuregiftgiving.org
turningcustomized.info
underlinedavira.org
uniquenesstrademarks.info
visibilityprerecorded.info
wavernewlyminted.org
wellasideallotted.org

Sunday, 12 August 2012

More malware sites to block on 184.82.162.163 and 184.22.103.202

These domains are on 184.82.162.163 and 184.22.103.202, recently used in some injection attacks.

local-dns.org
lertionk15.be

More malware sites to block on 54.245.115.106

More bad stuff in Amazon's cloud, this time on 54.245.115.106  which already hosts these other malware sites. Block the IP if you can, else block these news domains in addition to these.

fbqdazvojhyc.info
mrqfxznhke.info
wcgqelbpvdn.info
hbiewmkjdytr.info

More malware sites to block on 81.17.24.69

A follow up to this post, 81.17.24.69 (Private Layer Inc, Switzerland) now hosts some additional malware domains that you should block if you can't block the IP address:

ose-para-tek-ines.org
oseparatekines.org
ose-para-tek-ines.net

Friday, 10 August 2012

Intuit.com spam / ashanrestaurant.ru

This fake Intuit spam leads to malware on ashanrestaurant.ru:

Date:      Fri, 10 Aug 2012 09:03:06 -0300
From:      Ashley Madison [donotreply@ashleymadison.com]
Subject:      Your Intuit.com software order.
Attachments:     Intuit_Order-N15090.htm

Dear customer: Thank you for ordering from Intuit Market. We are processing and will message you when your order ships. If you ordered multiple items, we may sned them in more than one delivery (at no extra cost to you) to ensure quicker delivery. If you have questions about your order please call 1-900-364-2935 ($1.29/min).
ORDER INFORMATION
Please download your complete order id #3262340 from the attachment.(Open with Internet Explorer)
�2012 Intuit, Inc. All rights reserved. Intuit, the Intuit Logo, Quickbooks, Quicken and TurboTax, among others, are registered trademarks of Intuit Inc.

The malicious payload is at [donotclick]shanrestaurant.ru:8080/forum/showthread.php?page=5fa58bce769e5c2c (report here) hosted on the following familiar-looking IPs that should be blocked if you can:

203.80.16.81
190.120.228.92

"Verify your order" / yrikdhxzwo.org

This spam leads to malware on yrikdhxzwo.org:

Date:      Fri, 10 Aug 2012 13:43:57 +0200
From:      "New order" [8A4EDCFB@williamsvilla.com]
To:      [redacted]
Subject:      Verify your order

Dear [redacted],

please verify your order #809910 at http://simplythebestevents.com/wp-content/plugins/mm-forms-community/upload/temp/tracking17948.php?user_id=[redacted]&order_id=8D17821C359

We hope to see you again soon!

The malicious payload is at [donotclick]yrikdhxzwo.org/main.php?page=3f19233d6515cd5d (the payload is defying analysis at the moment), hosted on 54.245.115.156 (Amazon, US). The domain btgjoulrys.info is also on the same server and can be safely assumed to be malicious.

Fake job domains 10/8/12

A bit of an oddity here - I noticed a marked uptick in people searching for very old fake job domains that had expired. It turns out that the scammers are back (probably the Lapatasker crew), and lazily they have just re-registered their old domains. Current ones doing that rounds that you should avoid are:

americafindjob.com
arbetase.com
career-depart.com
careerin-finance.com
espanajob.com
eurojobbnet.com
eurojobcouk.com
eurojobscouk.com
europ-consult.com
jobbankinusa.com
readycarts.com
top10jobbs.com
ukitcareer.com
usaitcareers.com

wetter.com compromised? oseparatekines.net and 81.17.24.69

The weather site wetter.com is the 25th most popular site in Germany (and nukber 602 in the world) according to Alexa.

Right at the moment there appears to be a compromised ad being served up by billabong3.wetter.com  redirecting to a exploit kit on [donotclick]oseparatekines.net/forum/index.php?showtopic=903878 hosted on 81.17.24.69 which is apparently hosted in Switzerland, belonging to a small netblock as follows:

inetnum:         81.17.24.64 - 81.17.24.95
netname:         CLIENT2391
descr:           CLIENT2391
country:         CH
admin-c:         JP5315-RIPE
tech-c:          JP5315-RIPE
status:          ASSIGNED PA
mnt-by:          KP73900-MNT
source:          RIPE # Filtered

person:          James Prado
address:         Torres De Las Americas Torre C Floor 29 Suite 2901 Panama City, Panama
phone:           +5078365602
nic-hdl:         JP5315-RIPE
mnt-by:          KP73900-MNT
source:          RIPE # Filtered

route:           81.17.16.0/20
descr:           Ripe Allocation
origin:          AS51852
mnt-by:          KP73900-MNT
source:          RIPE # Filtered

The following domains are hosted on that IP address and you should assume they are malicious:
pilotjobsingrash.org
oseparatekines.org
onlineswotchers.org
fishersmansslow.org
oseparatekines.com
swstockhers.com
pilotjobsingrash.in
pilotjobsingrash.info
webswedish.info
oseparatekines.net
onlineswotchers.net

The entire 81.17.24.64/27 range looks suspicious in my opinion. Blocking that range would probably be prudent.

You can see the full script that is being used in the attack here - http://pastebin.com/CMuUm05f

Yet more malware sites to block on 194.28.115.150

Another batch of malware sites to block on 194.28.115.150 following on from these.. although to be franking, blocking access to 91.211.200.0/22  and 194.28.112.0/22 (Specialist ISP) plus all .rr.nu domains would be even better.

uresre17covered.rr.nu
ented89cable.rr.nu
erstor69msconse.rr.nu
gph46ili.rr.nu
nsu83lti.rr.nu
entl77ymail.rr.nu
rren48tlyvo.rr.nu
ersinq54uiries.rr.nu
sgradu88atevis.rr.nu
arrayt78emperat.rr.nu
ieddis18tribut.rr.nu

Thursday, 9 August 2012

"Verify your order" spam / qapskhnxlfuc.info

This spam leads to malware on qapskhnxlfuc.info:

Date:      Thu, 09 Aug 2012 21:25:41 +0200
From:      "New order" [30F5DC6@tendbeyond.com]
To:      [redacted]
Subject:      Verify your order

Dear [redacted],

please verify your order #447256 at http://mailnegnu.com/FlashSoundNew/welcome19205.php?user_id=[redacted]&order_id=1EDDB29B4E

We hope to see you again soon!

The malicious payload is at [donotclick]qapskhnxlfuc.info/main.php?page=3f19233d6515cd5d (http://wepawet.iseclab.org/view.php?hash=0192c837b292369c4205be3b8fbd34b9&t=1344548568&type=jshttp://wepawet.iseclab.org/view.php?hash=0192c837b292369c4205be3b8fbd34b9&t=1344548568&type=js) hosted on 54.245.115.106 (Amazon.com, US) along with the following domains that you can also assume are malicious:

keopsyc.org
ydxmzbrnjoqc.info
pjldxysgnfh.info
bfkepzvscyjh.info
drogiyfwan.info
vkycwjqdrn.info
zutacxsyiq.info
dnytximqszfr.info
wexnfvciumr.info
wfzijmubdgtv.info
nkcxlmgzuhw.info
fzblvmwoix.info
diocqvenmxz.info

"Your Photos" spam / gorysevera.ru

Another round of "Your photos" spam is in the offing, with a malicious payload on [donotclick]gorysevera.ru:8080/forum/showthread.php?page=5fa58bce769e5c2c (report here) hosted on the following IPs that have been seen several times before lately:

190.120.228.92 (Infolink, Panama)
203.80.16.81 (Myren, Malaysia)

Malware sites to block 9/8/12

Something nasty doing the rounds..you might want to block:

184.82.162.163
184.22.103.202

reslove-dns.com
10ba.com
dns-local.org
wesaf341.org
windows-update-server.com
wsef32asd1.org

Malware on panamamoskow.ru

I'm not sure of the particular nature of the spam run involved (it is possibly a UPS themed attack), but there's a campaign underway with a malicious payload on [donotclick]panamamoskow.ru:8080/forum/showthread.php?page=5fa58bce769e5c2c (report here) hosted on the following IPs:

178.33.106.254 (OVH, France)
190.120.228.92 (Infolink, Panama)

Blocking access to those IPs will prevent other malicious domains on the same server from being a threat.

Wednesday, 8 August 2012

More malware sites to block on 194.28.115.150

Yet more malware sites hosted on the same IP of 194.28.115.150 address from black hat host Specialist ISP in Transnistria, in addition to these and these. Blocking their entire ranges of 91.211.200.0/22  and 194.28.112.0/22 could save you a lot of grief.

vat19ica.rr.nu
rtr83eaga.rr.nu
utur33esma.rr.nu
rho99dena.rr.nu
sori10gina.rr.nu
spons91orapa.rr.nu
stingh58ousedra.rr.nu
rpci22nsta.rr.nu
slat80edeb.rr.nu
rmil91annob.rr.nu
ttedbr13oadplac.rr.nu
stric59tionac.rr.nu
rsob51stac.rr.nu
tssi48lenc.rr.nu
rned93airc.rr.nu
wishp97roduc.rr.nu
rop67ded.rr.nu
velysu88pported.rr.nu
tow03ard.rr.nu
urist44anford.rr.nu
stim49atesd.rr.nu
ting41peace.rr.nu
reser76veacce.rr.nu
stenn82essee.rr.nu
tro50lle.rr.nu
urech03rysle.rr.nu
rpl51ane.rr.nu
tsre36fere.rr.nu
rsgua98rante.rr.nu
sac11tive.rr.nu
rssol40elyhig.rr.nu
rmee55ting.rr.nu
sdoo02rdaug.rr.nu
rsqbsi32mplersh.rr.nu
ilsa05mpli.rr.nu
tfun34dedmi.rr.nu
rizat57ionmi.rr.nu
rov75isi.rr.nu
topse63curiti.rr.nu
tingsi83llegal.rr.nu
tid69rugm.rr.nu
robert62sultim.rr.nu
tion96gamm.rr.nu
tigato91rsonesm.rr.nu
teract53borlan.rr.nu
teb84ran.rr.nu
turere98presen.rr.nu
ssent69encin.rr.nu
rtro39ommin.rr.nu
ydet43ermin.rr.nu
ute37drin.rr.nu
tadve42rtisin.rr.nu
rre52nwin.rr.nu
ston80esco.rr.nu
shel27lsco.rr.nu
tton77stheo.rr.nu
sgill34ettewo.rr.nu
yield83ingap.rr.nu
wind89scomp.rr.nu
yin78gsp.rr.nu
ssdel12iversp.rr.nu
ustg99ener.rr.nu
steal73gener.rr.nu
sea12tfr.rr.nu
rgye90xpor.rr.nu
urroun55dingpr.rr.nu
riv58erpr.rr.nu
tici69ansr.rr.nu
uncert96aintyr.rr.nu
reque26ncies.rr.nu
ylor83cons.rr.nu
sframe80scarlos.rr.nu
zar00dous.rr.nu
tpro52duct.rr.nu
saryho39pingit.rr.nu
siveu11nlimit.rr.nu
striki53ngbent.rr.nu
state60potent.rr.nu
uff84erst.rr.nu
veacce31ssedrev.rr.nu
tandin81gfairv.rr.nu
ushed29isdrex.rr.nu
sre80pay.rr.nu

Update: a couple of new ones via the ISC:
tentsf05luxfig.rr.nu
ksstar.rr.nu

Tuesday, 7 August 2012

Malware sites to block on 194.28.115.150

This is an updated list of evil domains on 194.28.115.150 (Specialist ISP in Transnistria). Blocking all of 194.28.112.0 - 194.28.115.255 (194.28.112.0/22) is the best idea, and blocking traffic to .rr.nu ain't a bad one either. But if you can only block by domains names then this is the latest list of malware-laden sites to avoid:

xinthesidersdown.com
sweepstakesandcontestsdo.com
ens122zzzddazz.com
ssi11fica.rr.nu
ari55nea.rr.nu
sre13vea.rr.nu
tartis78tscolla.rr.nu
djust16scotla.rr.nu
courie90rhydra.rr.nu
idaysc65artera.rr.nu
x1010thta.rr.nu
ealis86ticeva.rr.nu
sfl20ewwa.rr.nu
rece76iptsb.rr.nu
xvarfo29urdayec.rr.nu
res11tric.rr.nu
ake60rsc.rr.nu
like90varyc.rr.nu
popre01versed.rr.nu
atr56aid.rr.nu
mentme03talsind.rr.nu
rasvi52llage.rr.nu
inglon03grange.rr.nu
senior78custome.rr.nu
sbandb46aninve.rr.nu
surpr54iseove.rr.nu
tes364rdaf.rr.nu
seamer47icadiff.rr.nu
veryt17hingof.rr.nu
ailway42staging.rr.nu
didat35egraph.rr.nu
nals02south.rr.nu
tampas71overei.rr.nu
ekendd69espitei.rr.nu
funct78ionali.rr.nu
artyi03nflati.rr.nu
ofess10ional.rr.nu
ful26qual.rr.nu
var64iabl.rr.nu
ins62ail.rr.nu
orig10inall.rr.nu
ulty75cream.rr.nu
lco16mpan.rr.nu
refi88nedn.rr.nu
ariney05aleteen.rr.nu
ital10namen.rr.nu
ymi87nin.rr.nu
olddo85esgoin.rr.nu
reque83ntlyin.rr.nu
atchp64ension.rr.nu
ional93phaco.rr.nu
eathin54gcashdo.rr.nu
ati31ngpo.rr.nu
atsda53ngero.rr.nu
ein77gyo.rr.nu
getth82rowapp.rr.nu
tsoc11ketp.rr.nu
vin04gup.rr.nu
tsroy47alpar.rr.nu
eri56orar.rr.nu
andsto57cksstar.rr.nu
train59tsafer.rr.nu
ariae54ither.rr.nu
eighbo02rsbarr.rr.nu
ing80entr.rr.nu
brown74emphas.rr.nu
sto32rybs.rr.nu
ncom24pares.rr.nu
ctab59uwes.rr.nu
spr71ings.rr.nu
ssig49nals.rr.nu
ght91ers.rr.nu
elop28ments.rr.nu
acons09olidat.rr.nu
omp25let.rr.nu
tinc31omeu.rr.nu
cello11rassu.rr.nu
pre86view.rr.nu
ns1.hoperjoper.ru
ns2.hoperjoper.ru

123Greetings.com spam / remindingwands.org

This fake 123Greetings.com spam actually delivers malware instead, hosted on remindingwands.org:


Date:      Tue, 7 Aug 2012 16:34:21 +0200
From:      "123Greetings.com" [ecards@123greetings.com]
Subject:      New e-card for you.

Vanna amet.diam.eu@lorem.ca has just sent you an ecard from 123Greetings.com

You can view it by clicking here:
http://www.123greetings.com/send/view/999095:

Thanks to our new tracking feature, you can now access all the ecards received by you in the last 14 days.

Use the link below or copy & paste the link into your browser's address bar.
http://www.123greetings.com/connect/track

Or if you prefer you can go to http://www.123greetings.com/ and type your ecard number (0090593007) in the "Search Box" at the top right of the page.

Your ecard can be downloaded for the next 30 days.

Based on user feedback, 123Greetings.com has launched 6 new pages with the best ecards in the Most Popular/ Most Viewed/ Highest Rated/ Latest Additions/ Popular Now and Always There Sections listed on the homepage.

http://www.123greetings.com/top/most_popular.html
http://www.123greetings.com/top/most_viewed.html
http://www.123greetings.com/top/highest_rated.html
http://www.123greetings.com/top/latest.html
http://www.123greetings.com/top/popular_now.html
http://www.123greetings.com/top/always_there.html

If you need any help in viewing your ecard or any other assistance,
please visit our Help/ FAQ section at: http://help.123greetings.com/

We hope you enjoy your ecard,

Your friends at 123Greetings.com
http://www.123greetings.com

We respect your privacy. You will not be receiving any promotional emails from us
because of this ecard. To view our privacy policy, click on the link below:
http://info.123greetings.com/company/privacy_policy.html

Note: This is an auto generated mail. Please do not reply.

If you have any other problem please contact us by clicking on the following link:
http://help.123greetings.com/contact_us.html

This email was sent by 123Greetings.com, Inc., 1674 Broadway, New York, NY 10019.
The malicious payload is at [donotclick]remindingwands.org/main.php?page=861097b084221fd although at the moment it is not responding. This site is hosted on 78.87.123.114 (CYTA, Greece) which is a particularly evil IP that has been seen a lot of lately and can safely be blocked.

"Your Photos" spam / pussyriotss.ru

There's not much to the recurring "Your Photos" spam apart from some terse text and a link. In this case the spam leads to a malicious payload at [donotclick]pussyriotss.ru:8080/forum/showthread.php?page=5fa58bce769e5c2c (report here).

pussyriotss.ru? Well, if you follow the news in Russia at all then you will have heard of the Pussy Riot case. The IP addresses for pussyriotss.ru are:

190.120.228.92 (Infolink, Panama)
116.12.49.68 (Usonyx , Singapore)

These IPs are also associated with spb-koalitia.ru and a whole bunch of other badness, blocking them would be prudent.

Malware sites to block 7/8/12

A small selection of malicious domains to add to your blocklist this morning:

advancementwowcom.org
headtoheadblaster.org
searchlesswebwasher.info
voicecontroldevotes.info
swetadeline.com
threeffect.net

Monday, 6 August 2012

LinkedIn spam / headtoheadblaster.org

This LinkedIn spam attempts to load malware from headtoheadblaster.org:

Date:      Mon, 6 Aug 2012 17:07:08 +0300
From:      "LinkedIn Invitations" [invitations@linkedin.com]
To:      [redacted]
Subject:      Your friend sent you an invitation to join LinkedIn group.

  
This is a notification that on August 5, Gage Herring sent you an invitation to become part of their professional network at LinkedIn.
Accept Gage Herring Invitation
  
On August 5, Gage Herring wrote:

> To: [redacted]
>
> I'd like to add you to my professional network on LinkedIn.
>
> Gage Herring   
  
You are receiving Reminder emails for pending invitations. Unsubscribe.
� 2012 LinkedIn Corporation. 2029 Stierlin Ct, Mountain View, CA 94043, USA.

==========


Date:      Mon, 6 Aug 2012 10:02:02 -0400
From:      "LinkedIn Invitations" [invitations@linkedin.com]
To:      [redacted]
Subject:      LinkedIn inviation notificaltion.

  
This is a notification that on August 5, Daniel Martinez sent you an invitation to join their professional network at LinkedIn.
Accept Daniel Martinez Invitation
  
On August 5, Daniel Martinez wrote:

> To: [redacted]
>
> I'd like to add you to my professional network on LinkedIn.
>
> Daniel Martinez   
  
You are receiving Reminder emails for pending invitations. Unsubscribe.
� 2012 LinkedIn Corporation. 2029 Stierlin Ct, Mountain View, CA 94043, USA.


The malicious payload is at [donotclick]headtoheadblaster.org/main.php?page=f6857febef53e332 (report here) although at the time of writing it does not seem to be resolving.

"Welcome to PayPal" spam / spb-koalitia.ru

This fake PayPal spam leads to malware on spb-koalitia.ru:

Subject: Welcome to PayPal - Choose your way to pay



Welcome
Hello [victim],
Thanks for paying with PayPal.
We congratulate you with your first Paypal money transfer. But we have hold it for the moment because the amount is over the security borders of our rules.

Here is what we have on file for you. Take a second to confirm we have your correct information.
Email
[reciptient]@victimdomain.com

Confirmation Code
1509-3962-8257-3886-7087
    Transfer Information
Amount: 18217.81 $
Reciever: Marcie William
E-mail: [another-recipient]@victimdomain.com


Accept Decline

 Help Center | Security Center
Please don't reply to this email. It'll just confuse the computer that sent it and you won't get a response.
Copyright 2012 PayPal, Inc. All rights reserved. PayPal is located at 2211 N. First St., San Jose, CA 95131.
PayPal Email ID PP9335

______________________________________________________________________
This email has been scanned by the Symantec Email Security.cloud service.
For more information please visit http://www.symanteccloud.com
______________________________________________________________________




The malicious payload is on [donotclick]spb-koalitia.ru:8080/forum/showthread.php?page=5fa58bce769e5c2c (report here) hosted on the following (familiar looking IPs):

67.227.183.77 (LiquidWeb / SourceDNS, US)
203.80.16.81 (Myren Infrastructure, Malaysia)
213.170.99.11 (Quantum Communications, Russia)


The following domains and IPs are all related:
41.66.137.155
41.168.5.140
62.76.188.138
62.76.190.208
67.227.183.77
78.83.233.242
87.120.41.155
87.204.199.100
173.224.208.60
41.66.137.155
199.71.212.78
203.80.16.81
203.172.140.202
213.170.99.11

moskow-carsharing.ru
mysqlfordummys.ru
leprisoruim.ru
onerussiaboard.ru
online-gaminatore.ru
spb-koalitia.ru
zenedin-zidane.ru

autoaxident.com spam / Lalchand Sobhani

This spam is preying on people in the UK who have had a accident, but it is actually based in India. It starts off with a pitch similar to this one:

From:     UL05 UL05@app12.sarvdns.org
Reply-To:     UL05@app12.sarvdns.org
Date:     3 August 2012 17:26
Subject:     Accident Injuries

Auto Axident
Claim Comfort

    Home
    Injury / Claim types
    Contact Us

Welcome
Header Image

We are the accident claim specialists, offering free advice, downloads and access to top no win no fee personal injury solicitors.There are many types of Personal Injury like

    Road Traffic Accident
    Work Accident
    Accident at Sea
    Aircraft Accident
    Faulty Product Accident
    Hairdressing Accident
    Holiday Accident
    Medical Negligency Accident
    Public Place Accident

Did you have an injury in the last two years?
If yes, Apply for Compensation below.
Apply for Claim here
Step 1
     
   RTA ( SELF MEDICATING CLAIMANT )
     
[snipped]

© Copyright 2012 autoaxident.com. All Rights Reserved.


Powered by SARV Mail

Click here to unsubscribe

The spam leads you to a side called autoaxident.com on 174.122.93.250 which appears to belong to Confluence Networks in the UAE. The WHOIS details are privacy protected (never a good sign for this type of site). Nameservers show an Indian connection, they are dns1.bigrock.in and dns2.bigrock.in. The spam is sent through a relay service at 74.117.60.126 (lbsmtp.org, India).

The website has no contact details or privacy policy, it is basically just a collector. However, sending a query does generate a response..

from:     AnnieThomas alaska05@rediffmail.com
date:     6 August 2012 08:15
subject:     Re: RTA - Injuries

Awaiting your reply.

Annie Thomas




From: "Swati"[alaska05@rediffmail.com]
Sent: Sat, 04 Aug 2012 14:11:40
Subject: RTA - Injuries
Dear Mr. Xxxx Xxxx

Thanks for sending us your message.

Please send your contact phone number and address.

Also if you have time please fill up form available at www.autoaxident.com and press continue button instead of submit to get the full claim form to be filled.

Upon receipt of your phone number solicitor Mr. Lamb Brook will contact you for compensation for your injury
---

 Annie Thomas
Customer Care Executive

Auto Accident Claim Company
London
Phone No. +44 20 3286 4645
Website - www.autoaxident.com 

The originating IP was 14.98.247.162 (TATA Indicom, India), so there's the Indian connection again.

Several things don't stand up with this pitch. One of them is the solicitor's name of "Mr. Lamb Brook". That's quite an unusual name, and it probably comes as no surprise to find that there is no such solicitor listed by the Law Society in the UK. Oddly, the telephone number quoted seems potentially valid and is a London number. Update: the name of the law firm is Lamb Brooks and not an individual solicitor, note however that Lamb Brooks are not sending out this unsolicited mail, I suspect that they are not even aware of it.

The email address of "Annie Thomas" alaska05@rediffmail.com also gives some clues. rediffmail.com is almost exclusively used in India, thus confirming that this is an Indian-based scam again, Googling this email address shows several clues with a background of buying and selling leads.

This thread ties the email address up with a user called lalchand38 and this is linked to a Twitter account at https://twitter.com/LCS38 (Lalchand / @LCS38) who appears to be Lalchand Sobhani who also uses an email address of lalchand38@yahoo.com. You can see his dating profile here and there are several other matches on Google for the same email address which show an interesting variety of enterprises including shipping prescription medications from India to the US.


So Annie Thomas is either Lalchand Sobhani or someone working for him. The solicitor in the UK does not exist. Mr Sobhani has gone to some efforts to hide his involvement here too.

What is probably going on here is lead generation through spam. Lalchand Sobhani is probably trying to generate personal injury leads to resell on to others. In any case, dealing with spammers is unlikely to be beneficial and it could lead to you being seriously out of pocket.