Sponsored by..

Friday, 3 August 2012

"Your Photos" spam / moskow-carsharing.ru

This terse spam leads to malware on moskow-carsharing.ru:

From: [redacted]
Sent: venerdì 3 agosto 2012 17:09
To: [redacted]
Subject: Your Photos

Hi,
your photos - http://www.[redacted].com/upload.htm
 The malicious payload is at [donotclick]moskow-carsharing.ru:8080/forum/showthread.php?page=5fa58bce769e5c2c (report here) hosted on the following IPs:

67.227.183.77
203.80.16.81
213.170.99.11

The following domain names are also related and should be blocked:

ipadvssonyx.ru
leprisoruim.ru
mysqlfordummys.ru
onerussiaboard.ru
online-cammunity.ru
online-gaminatore.ru
switched-games.ru

AT&T spam / globixlowerright.org

These fake AT&T spam emails lead to an attempted malware page at globixlowerright.org:


Date:      Fri, 3 Aug 2012 11:03:52 -0300
From:      "AT&T Online Services" [att-services@email.att-mail.com]
Subject:      Pay your AT&T bill online

<td style="padding: 0px 10px 0px 10px;" width:33%="" valign="top">
att.com | Support | My AT&T Account    
<td style="padding: 0px 10px 0px 10px;" width:34%="" valign="top">
Your online bill is ready to be accessed
Dear Esteemed Customer,

A new bill for your AT&T services is prepared.

Any transactions completed after your bill period expires will not be shown in the bill amount listed directly below. If you have made a recent payment, please refer to the current balance on the Account Overview and the Bill & Payments pages.

Service     Account ending in     Bill Amount     Due Date
Internet and Home Phone     {LET:0     $460.46     08/06/2012

Log in to online account management to view your bill and bill notices, maintain your email account or make a payment. If you are not registered for online account management, you must do so to view and print your full bill and bill notices at www.att.com/managemyaccount.
Log in to online account management to view your bill, maintain your email account or make a payment.



Thank you for choosing AT&T. We value your business and look forward to serving you!

Thank you,
AT&T Online Services
www.att.com

Contact Us
AT&T Support - quick & easy support is available 24/7.

   

Moving Soon?
Stay connected with AT&T. Visit us online at att.com/move.

<td style="padding: 0px 10px 0px 10px;" width:33%="" valign="top">
AT&T Online Services
Get more time to do what you want. What would you do?
Show me how

Automatic Payments
Save time and pay your monthly bill automatically!
Sign up now

Special Offers
Visit our Special Offers to check out our best promotions.
Learn more

Online Information
AT&T Community
Repair
   
Home Phone
Special Offers
PLEASE DO NOT REPLY TO THIS MESSAGE
All replies are automatically deleted. For questions regarding this message, refer to the contact information listed above.

�2012 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks contained herein are the property of their respective owners.
Privacy Policy

==========


Date:      Fri, 3 Aug 2012 10:25:59 -0300
From:      "AT&T Online Services" [att-services@email.att-mail.com]
Subject:      Your AT&T bill is ready to be viewed

<td style="padding: 0px 10px 0px 10px;" width:33%="" valign="top">
att.com | Support | My AT&T Account    
<td style="padding: 0px 10px 0px 10px;" width:34%="" valign="top">
Your online bill is ready to be accessed
Dear Valued Customer,

A new bill for your AT&T account is ready.

Any transactions made after your bill period expires will not be reflected in the bill amount listed directly below. If you have made a recent payment, please refer to the current balance on the Account Overview and the Bill & Payments pages.

Service     Account ending in     Bill Amount     Due Date
Home Phone     1     $718.25     08/06/2012

Log in to online account management to view your bill and bill notices, maintain your email account or make a payment. If you are not registered for online account management, you must do so to view and print your full bill and bill notices at www.att.com/managemyaccount.
Log in to online account management to view your bill, maintain your email account or make a payment.



Thank you for choosing AT&T. We value your business and look forward to serving you!

Thank you,
AT&T Online Services
www.att.com

Contact Us
AT&T Support - quick & easy support is available 24/7.

   

Moving Soon?
Stay connected with AT&T. Visit us online at att.com/move.

<td style="padding: 0px 10px 0px 10px;" width:33%="" valign="top">
AT&T Online Services
Get more time to do what you want. What would you do?
Show me how

Automatic Payments
Save time and pay your monthly bill automatically!
Sign up now

Special Offers
Visit our Special Offers to check out our best promotions.
Learn more

Online Information
AT&T Community
Repair
   
Home Phone
Special Offers
PLEASE DO NOT REPLY TO THIS MESSAGE
All replies are automatically deleted. For questions regarding this message, refer to the contact information listed above.

�2012 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks contained herein are the property of their respective owners.
Privacy Policy

==========


Date:      Fri, 3 Aug 2012 15:17:49 +0200
From:      "AT&T Online Services" [att-services@email.att-mail.com]
Subject:      Your AT&T bill is ready to be paid now.

<td style="padding: 0px 10px 0px 10px;" width:33%="" valign="top">
att.com | Support | My AT&T Account    
<td style="padding: 0px 10px 0px 10px;" width:34%="" valign="top">
Your online bill is ready to be viewed
Dear Valued Customer,

A new bill for your AT&T services is prepared.

Any payments made after your bill period ends will not be shown in the bill amount listed directly below. If you have made a recent payment, please refer to the current balance on the Account Overview and the Bill & Payments pages.

Service     Account ending in     Bill Amount     Due Date
Internet access     5     $373.39     08/06/2012

Log in to online account management to view your bill and bill notices, maintain your email account or make a payment. If you are not registered for online account management, you must do so to view and print your full bill and bill notices at www.att.com/managemyaccount.
Log in to online account management to view your bill, maintain your email account or make a payment.



Thank you for choosing AT&T. We value your business and look forward to serving you!

Thank you,
AT&T Online Services
www.att.com

Contact Us
AT&T Support - quick & easy support is available 24/7.

   

Moving Soon?
Stay connected with AT&T. Visit us online at att.com/move.

<td style="padding: 0px 10px 0px 10px;" width:33%="" valign="top">
AT&T Online Services
Get more time to do what you want. What would you do?
Show me how

Automatic Payments
Save time and pay your monthly bill automatically!
Sign up now

Special Offers
Visit our Special Offers to check out our best promotions.
Learn more

Online Information
AT&T Community
Repair
   
Home Phone
Special Offers
PLEASE DO NOT REPLY TO THIS MESSAGE
All replies are automatically deleted. For questions regarding this message, refer to the contact information listed above.

�2012 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks contained herein are the property of their respective owners.
Privacy Policy
The link goes through a legitimate (but hacked) site and attempts to load a malware page at [donotclick]globixlowerright.org/main.php?page=6df8994172330e77 (report here) but at the moment it is not resolving as the domain appears to have been de-registered.

yg-network.org / Keyya Ltd domain scam

This is part of a domain scam that has been going on for years..

from:     Angela info@gytrademark.com
to:     sales@[redacted].com
date:     3 August 2012 03:21
subject:     Notice of Internet Intellectual Property



Dear Manager,

(If you are not the person who is in charge of this, please forward this to your CEO,Thanks)

This email is from China domain name registration center, which mainly deal with the domain name registration and dispute internationally in China and Asia.
On July 30th 2012, We received Keyya Ltd's application that they are registering the name "[redacted]" as their Internet Keyword and "[redacted].cn "、"[redacted].com.cn " 、"[redacted].asia "domain names etc.., they are China and ASIA domain names. But after auditing we found the brand name been used by your company. As the domain name registrar in China, it is our duty to notice you, so we are sending you this email to check. According to the principle in China, your company is the owner of the trademark, In our auditing time we can keep the domain names safe for you firstly, but our audit period is limited, if you object the third party application these domain names and need to protect the brand in china and Asia by yourself, please let the responsible officer contact us as soon as possible. Thank you!

Best Regards,

Angela Zhang



General Manager
Anhui Office (Head Office)
Registration Department Manager
Room 1008 Shenhui Building 
Haitian Road, Huli Anhui, China
Office:  +86 0553 4994789
Fax:     +86 0553 4994789
web:  www.yg-network.org

Basically the idea is to panic you into buying worthless domains from a dodgy Chinese registrar. Of course, there is no company actually trying to register these domains.. and even if there was there is no responsibility for the registrar to check trademark ownership (except in a tiny handful of cases such as sunrise registrations).

What's more.. I already own the .asia version of this domain name, so it is impossible that someone else is trying to register it.

So, this one is definitely a scam. Stay away.

Thursday, 2 August 2012

"Reset Your LinkedIn Password" spam / mysqlfordummys.ru

This fake LinkedIn email leads to malware on the oddly named domain of mysqlfordummys.ru:

Date:      Thu, 2 Aug 2012 02:27:38 -0300
From:      LinkedIn Password [password@linkedin.com]
Subject:      Reset Your LinkedIn Password

LinkedIn

Hi altera,

Can’t remember your LinkedIn password? No problem - it happens.

Please use this link to reset your password within the next 1 day:
Click here

Then sign in to LinkedIn with your new password and the email address where you received this message.

Thanks for using LinkedIn!

Flaws in SQL server implementations are a hacker's favourite target, so perhaps there is a wry sense of humour here. Anyway, the malicious payload is at [donotclick]mysqlfordummys.ru:8080/forum/showthread.php?page=5fa58bce769e5c2c (report here) hosted on 203.80.16.81 (MYREN Infrastructure, Malaysia)

The following domains and IPs are all related, you should block access to them if you can:

ipadvssonyx.ru
mysqlfordummys.ru
onerussiaboard.ru
online-cammunity.ru
online-gaminatore.ru
switched-games.ru
zenedin-zidane.ru

41.66.137.155
41.168.5.140
62.76.188.138
62.76.190.208
62.213.64.161
78.83.233.242
85.143.166.243
87.120.41.155
87.204.199.100
173.224.208.60
184.106.189.124
199.71.212.78
203.80.16.81
203.172.140.202

"Pay your AT&T bill online" spam / unboxhibernation.org

This fake AT&T spam leads to malware on unboxhibernation.org:

 From: Tonya Bates [mailto:robot@craigslist.org]
Sent: 02 August 2012 14:08
Subject: Pay your AT&T bill online
Importance: High

att.com | Support | My AT&T Account


Your online bill is ready to be downloaded
Dear Valued Customer,

A new bill for your AT&T account is ready.

Any operations completed after your bill period expires will not be reflected in the bill amount listed directly below. If you have made a recent payment, please refer to the current balance on the Account Overview and the Bill & Payments pages.
Service     Account ending in     Bill Amount     Due Date
Home Phone     6     $355.26     08/06/2012

Log in to online account management to view your bill and bill notices, maintain your email account or make a payment. If you are not registered for online account management, you must do so to view and print your full bill and bill notices at www.att.com/managemyaccount.
Log in to online account management to view your bill, maintain your email account or make a payment.



Thank you for choosing AT&T. We value your business and look forward to serving you!

Thank you,
AT&T Online Services
www.att.com

Contact Us
AT&T Support - quick & easy support is available 24/7.

 




Moving Soon?
Stay connected with AT&T. Visit us online at att.com/move.


AT&T Online Services
Get more time to do what you want. What would you do?
 Show me how

    Automatic Payments
Save time and pay your monthly bill automatically!
 Sign up now

    Special Offers
Visit our Special Offers to check out our best promotions.
 Learn more


  
Online Information
AT&T Community
Repair
Home Phone
Special Offers

________________________________________
PLEASE DO NOT REPLY TO THIS MESSAGE
All replies are automatically deleted. For questions regarding this message, refer to the contact information listed above.

2012 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks contained herein are the property of their respective owners.
Privacy Policy

The malicious payload is at [donotclick]unboxhibernation.org/main.php?page=19152be46559e39d (report here) hosted on 78.87.123.114 (CYTA Hellas, Greece) which also hosts the apparently legitimate site infosector.gr, although some DNS results are coming back with 211.157.105.160 in China instead.. and this IP address is definitely malicious as it contains the following malware domains:

advancementwowcom.org
damidc.com
retweetadministrator.org
stafffire.net
unboxhibernation.org

Blocking both IPs may well be prudent.

Also, the following nameservers are indicative of an evil host, keep an eye out for them..
ns1.ashton-pitt.net
64.37.54.215

ns2.ashton-pitt.net
111.214.135.11

Wednesday, 1 August 2012

xinthesidersdown.com injection attack in progress

There is currently an injection attack using a script pointing to [donotclick]xinthesidersdown.com/sl.php  doing the rounds. The malicious code is hosted on 194.28.115.150, the same IP address as used in this attack yesterday.

Tuesday, 31 July 2012

Something evil on 194.28.115.150 and lasimp04risoned.rr.nu

The following domains appear to be part of an ongoing injection attack (using lasimp04risoned.rr.nu at present). They are hosted by black-hat web host Specialist ISP in Transnistria. Block the IP range of 194.28.112.0 - 194.28.115.255 (194.28.112.0/22) is a very good idea as this is one of the worst netblocks I know of.

aelis30greek.rr.nu
aff29ili.rr.nu
aljo73hnsto.rr.nu
ambers00supplem.rr.nu
ano98the.rr.nu
appoin62tmentba.rr.nu
asciia28rmcover.rr.nu
ati92oni.rr.nu
ation82gamma.rr.nu
avia83resou.rr.nu
bear37sall.rr.nu
bitr07aryc.rr.nu
bles41steve.rr.nu
carrie01rskans.rr.nu
che59mica.rr.nu
chn34olo.rr.nu
comme17rcial.rr.nu
cons63isten.rr.nu
cos69tbu.rr.nu
cov59erm.rr.nu
cthu85srisc.rr.nu
ctsc60anli.rr.nu
eates01publi.rr.nu
ection18depres.rr.nu
elew72isst.rr.nu
enedm79ultina.rr.nu
enegat43ivecon.rr.nu
engag75edfol.rr.nu
enge75sfra.rr.nu
enormousw1illa.com
ens122zzzddazz.com
entio21nsamba.rr.nu
esgen48erally.rr.nu
eside00ntwin.rr.nu
fee89edi.rr.nu
gra98desi.rr.nu
hitam41ultime.rr.nu
hoperjoper.ru
iab35ilit.rr.nu
ialac93idcod.rr.nu
icans11deskto.rr.nu
ident08winner.rr.nu
impo82rtse.rr.nu
int99onin.rr.nu
ion68you.rr.nu
ited51pala.rr.nu
ive23lit.rr.nu
kpo82stp.rr.nu
lasimp04risoned.rr.nu
lighte93dnickel.rr.nu
limina94tedefi.rr.nu
mainglobilisi.com
mals30ynta.rr.nu
mpa89qaut.rr.nu
mtube-ssl.com
ncomp97aredli.rr.nu
neou44slypa.rr.nu
ngsin45dividu.rr.nu
nstitu42tional.rr.nu
nting91uncle.rr.nu
nusi60ngmus.rr.nu
ocat47edha.rr.nu
ocum04entat.rr.nu
oneflo30orcall.rr.nu
onsco10mdexpo.rr.nu
ort26ibm.rr.nu
ort53hori.rr.nu
ovie26tther.rr.nu
pxm-tube.com
qtr49exis.rr.nu
raff60icke.rr.nu
rlyspa21rcleona.rr.nu
rsm95ario.rr.nu
scue08doral.rr.nu
selle33rsjunk.rr.nu
sicb79enef.rr.nu
sor52tium.rr.nu
ssic2061thligh.rr.nu
ssmo24king.rr.nu
sweepstakesandcontestsdo.com
sweepstakesandcontestsinfo.com
syno98nepet.rr.nu
takeo46versav.rr.nu
tanswe24ringni.rr.nu
tarts63exten.rr.nu
timel08arges.rr.nu
tiona82lclos.rr.nu
tormco48nstitu.rr.nu
tssign51stechno.rr.nu
vada86subje.rr.nu
velit30eratu.rr.nu
viv17eddr.rr.nu
whyi70splay.rr.nu
yint60eres.rr.nu
ysoci94alspec.rr.nu
zbol42lahg.rr.nu

Friday, 27 July 2012

Malware on online-gaminatore.ru

Another malicious spam run, although I don't have a sample of the actual spam this time.. however, the payload is at [donotclick]online-gaminatore.ru:8080/forum/showthread.php?page=5fa58bce769e5c2c (report here), hosted on the following IPs:

89.111.177.151
203.80.16.81
78.83.233.242

These IPs have been used several times recently and should be blocked.

Thursday, 26 July 2012

"Federal Tax transfer" spam / retweetadministrator.org

These fake "Federal Tax Transfer" spams lead to malware on retweetadministrator.org:


Date:      Thu, 26 Jul 2012 20:56:10 +0530
From:      "Internal Revenue Service" [alerts@irs.gov]
Subject:      Federal Tax transfer returned

Your federal Tax payment (ID: 632004160993), recently from your checking account was rejected by the your financial institution.

Canceled Tax transfer
Tax Transaction ID:     632004160993
Rejection Reason     See details in the report below
Tax Transaction Report     tax_report_632004160993.doc (Microsoft Word Document)


Internal Revenue Service, Metro Plex 1, 8401 Corporate Drive, Suite 300, Landover, MD 20785


==========

Date:      Thu, 26 Jul 2012 20:55:41 +0530
From:      "Internal Revenue Service" [support@irs.gov]
Subject:      Rejected Federal Tax transaction

Your Tax payment (ID: 766644379032), recently initiated from your checking account was rejected by the your financial institution.

Rejected Tax transfer
Tax Transaction ID:     766644379032
Reason of rejection     See details in the report below
FederalTax Transaction Report     tax_report_766644379032.doc (Microsoft Word Document)


Internal Revenue Service, Metro Plex 1, 8401 Corporate Drive, Suite 300, Landover, MD 20785

==========

Date:      Thu, 26 Jul 2012 12:00:54 -0300
From:      "Internal Revenue Service" [support@irs.gov]
Subject:      Rejected Federal Tax transfer

Your federal Tax payment (ID: 776394251906), recently from your checking account was returned by the your financial institution.

Canceled Tax transfer
Tax Transaction ID:     776394251906
Reason of rejection     See details in the report below
FederalTax Transaction Report     tax_report_776394251906.doc (Microsoft Word Document)


Internal Revenue Service, Metro Plex 1, 8401 Corporate Drive, Suite 300, Landover, MD 20785


The malicious payload is on [donotclick]retweetadministrator.org/main.php?page=8b45f871830c6e5a (report here) hosted on 89.253.231.202 (Rusonyx Ltd, Moscow).

"Adobe CS4 License" spam / online-gaminatore.ru

This "Adobe CS4 License" spam leads to malware on online-gaminatore.ru:


Date:      Thu, 26 Jul 2012 09:24:01 +0900
From:      FentonpJsGh9LIsiah@aol.com
Subject:      Order N81149


Dear Sirs,


You can download your Adobe CS4 License here -


We encourage you to explore its new and enhanced capabilities with these helpful tips, tutorials, and eSeminars.

Thank you for buying Adobe InDesign CS4 software.


Adobe Systems Incorporated

The malicious payload is at [donotclick]online-gaminatore.ru:8080/forum/showthread.php?page=5fa58bce769e5c2c (report here) hosted on the following IPs:


89.111.177.151 (Garant-Park-Telecom, Russia)
78.83.233.242 (Spectrum Net JSC, Bulgaria)


These IPs should be blocked if you can.

Wednesday, 25 July 2012

"Wire Transfer" spam / furnitura-forums.ru

This fake "Wire Transfer" spam (or is it UPS?) leads to malware on furnitura-forums.ru:


Date: Wed, 25 Jul 2012 09:12:43 -0500
From: "Express MyUps" [upsservices@ups.com]
Subject: Fwd: Re: Wire Transfer
Attachments: Wire_ID88283.htm

Dear Operator,



WIRE FID: NO-004394626739460



STATUS: CANCELLED



You can find details in the attached file.

The attachment Wire_ID88283.htm attempts to load malware from [donotclick]furnitura-forums.ru:8080/forum/showthread.php?page=5fa58bce769e5c2c (report here) hosted on the following IPs:

78.83.233.242 (Spectrum Net JSC, Bulgaria)
203.80.16.81 (Myren, Malaysia)



..these two IP addresses also host some other malware sites and are worth blocking:
porschedesignrussia.ru
bmwforummsk.ru
phpforkiddies.ru
forumanarhist.ru

US Airways spam / reformattedfilmmaker.org and algebrayep.org

This fake US Airways spam leads to malware on reformattedfilmmaker.org:

Date: Wed, 25 Jul 2012 09:46:57 -0500
From: "US Airways - Reservations" [support@myusairways.com]
Subject: Confirm your US airways online reservation.

You should check in from 24 hours and up to 60 minutes before your flight (2 hours if you're flying abroad). After that, all you have to do is print your boarding pass and go to the gate.

Confirmation code: 210916

Check-in online: Online reservation details

Flight

4817
Departure city and time

Washington, DC (DCA) 10:00PM

Depart date: 7/26/2012


We are committed to protecting your privacy. Your information is kept private and confidential. For information about our privacy policy visit usairways.com.

US Airways, 111 W. Rio Salado Pkwy, Tempe, AZ 85281 , Copyright US Airways , All rights reserved.

The malicious payload is at [dotnotclick]reformattedfilmmaker.org/main.php?page=70ec803a01c84ddc (report here) hosted on the same Chinese IP address of 221.131.129.200 that was used in a similar spam run yesterday.

UPDATE: a similar US Airways spam run is also underway with a malicious payload on algebrayep.org on the same IP address.

Tuesday, 24 July 2012

PayPal Spam / teloexpressions.org

These fake PayPal spams lead to malware on teloexpressions.org:


Date:      Tue, 24 Jul 2012 18:06:49 +0330
From:      "Allan Marquez" <notify@paypal.com>
Subject:      Paypal has sent you a bank transfer.

<tr =="" valign="top">
<table =="" border="0" cellpadding="0" cellspacing="0" width="100%">

We are moving funds from Your Paypal account to your bank account.

Total amount transferred     $ 131.54
Bank account     BANK OF AMERICA
Transaction ID     59566237893344612

<div style="text-align: center;" class="footerLinks" 5px="" 0;="" padding:="">Help Center Resolution Center Security Center

Please don't reply to this email. It'll just confuse the computer that sent it and you won't get a response.

Copyright 2012 PayPal, Inc. All rights reserved. PayPal is located at 2211 N. First St., San Jose, CA 95131.

==========


Date:      Tue, 24 Jul 2012 11:33:00 -0300
From:      "Jody Wade" <notify@paypal.com>
Subject:      Paypal transfer to your bank account initiated.

<tr =="" valign="top">
<table =="" border="0" cellpadding="0" cellspacing="0" width="100%">

We are transferring funds from Your Paypal account to your bank account.

Total amount transferred     $ 944.68
Bank account     BANK OF NORTH CAROLINA
Transaction ID     67081555155766933

<div style="text-align: center;" class="footerLinks" 5px="" 0;="" padding:="">Help Center Resolution Center Security Center

Please don't reply to this email. It'll just confuse the computer that sent it and you won't get a response.

Copyright 2012 PayPal, Inc. All rights reserved. PayPal is located at 2211 N. First St., San Jose, CA 95131.

==========


Date:      Tue, 24 Jul 2012 11:10:58 -0300
From:      "Evan Battle" <notify@paypal.com>
Subject:      We have sent you a bank transfer.

<tr =="" valign="top">
<table =="" border="0" cellpadding="0" cellspacing="0" width="100%">

We are sending funds from Paypal to your bank account.

Total amount transferred     $ 123.59
Bank account     CITYBANK
Transaction ID     55273357044211327

<div style="text-align: center;" class="footerLinks" 5px="" 0;="" padding:="">Help Center Resolution Center Security Center

Please don't reply to this email. It'll just confuse the computer that sent it and you won't get a response.

Copyright 2012 PayPal, Inc. All rights reserved. PayPal is located at 2211 N. First St., San Jose, CA 95131.

==========


Date:      Tue, 24 Jul 2012 19:15:46 +0530
From:      "service@paypal.com" <service@paypal.com>
Subject:      Paypal transfer to your bank account initiated.

<tr =="" valign="top">
<table =="" border="0" cellpadding="0" cellspacing="0" width="100%">

We are moving funds from Paypal to your bank account.

Total amount transferred     $ 425.21
Bank account     BANK OF NORTH CAROLINA
Transaction ID     17744199446279262

<div style="text-align: center;" class="footerLinks" 5px="" 0;="" padding:="">Help Center Resolution Center Security Center

Please don't reply to this email. It'll just confuse the computer that sent it and you won't get a response.

Copyright 2012 PayPal, Inc. All rights reserved. PayPal is located at 2211 N. First St., San Jose, CA 95131.

==========


Date:      Tue, 24 Jul 2012 09:45:45 -0400
From:      "service@paypal.com" <service@paypal.com>
Subject:      Paypal has sent you a bank transfer.

<tr =="" valign="top">
<table =="" border="0" cellpadding="0" cellspacing="0" width="100%">

We are moving funds from Your Paypal account to your bank account.

Total amount transferred     $ 191.22
Bank account     CITYBANK
Transaction ID     64722827521858421

<div style="text-align: center;" class="footerLinks" 5px="" 0;="" padding:="">Help Center Resolution Center Security Center

Please don't reply to this email. It'll just confuse the computer that sent it and you won't get a response.

Copyright 2012 PayPal, Inc. All rights reserved. PayPal is located at 2211 N. First St., San Jose, CA 95131.


The malicious payload is at [donotclick]teloexpressions.org/main.php?page=9aca5bbc34d3ebd6 (report here) hosted on 221.131.129.200 which we have seen before and is definitely worth blocking.

Monday, 23 July 2012

"Hi, we think you may be entitled to compensation.." SMS spam

The PPI claim spammers are back again, this time using the throwaway number of +447969662555

Hi, we think you may be entitled to compensation of up to £3500 from missold PPI on a credit card or loan.
Reply PPI for more info
Reply STOP to opt out
Obviously they think nothing of the sort and are just randomly spamming, even to mobile phone numbers registered with TPS. Given that their pitch is based on a lie, it's likely that the whole outfit it some sort of scam in any case.

If you get one of these, you should forward the spam and the sender's number to your carrier. In the came of T-Mobile, O2 and Orange the number to report to is 7726 ("SPAM"). Vodafone customers should use 87726 ("VSPAM") and Three customers should use 37726 ("3SPAM"). Hopefully the carriers will act if there are enough complaints.

Friday, 20 July 2012

Wire Transfer spam / porschedesignrussia.ru

This fake wire transfer spam leads to malware on porschedesignrussia.ru:

Date:      Fri, 20 Jul 2012 04:10:52 +0100
Subject:      RE: Your Wire Transfer N02526593

Good morning,

Wire debit transfer was canceled by the other financial institution.



Canceled transfer:

FED REFERENCE NUMBER: ISL9653367088ODP06829K

Transfer Report: View



Federal Reserve Wire Network

The malicious payload is at [donotclick]porschedesignrussia.ru:8080/forum/showthread.php?page=5fa58bce769e5c2c (report here) hosted on the following IPs:
78.83.233.242
203.80.16.81
213.17.171.186

These are the same IP addresses as used in this attack from yesterday. Blocking them would probably be prudent.

Thursday, 19 July 2012

AICPA spam / jeffknitwear.org

I haven't seen this fake AICPA spam for a while, but here it is.. this time leading to a malicious payload on the domain jeffknitwear.org:

Date:      Thu, 19 Jul 2012 17:03:06 +0300
From:      "Lakisha Rush" [support@aicpa.org]
Subject:      Termination of your accountant license.

You're receiving this notification as a Certified Public Accountant and a member of AICPA.
Having trouble reading this email? View it in your browser.

Cancellation of Accountant status due to income tax fraud allegations

Dear AICPA member,

We have received a complaint about your possible participation in income tax refund fraudulent activity for one of your clients. According to AICPA Bylaw Paragraph 730 your Certified Public Accountant license can be withdrawn in case of the fact of filing of a misguided or fraudulent tax return for your client or employer.

Please be informed of the complaint below and respond to it within 7 days. The failure to respond within this term will result in cancellation of your CPA license.

Complaint.pdf

The American Institute of Certified Public Accountants.

Email: service@aicpa.org
Tel. 888.777.7077
Fax. 800.362.5066

==========

Date:      Thu, 19 Jul 2012 14:02:48 +0000
From:      "Jonathan Gallagher" [support@aicpa.org]
Subject:      Fraudulent tax return assistance accusations.

You're receiving this email as a Certified Public Accountant and a member of AICPA.
Having trouble reading this email? View it in your browser.

Cancellation of Accountant status due to income tax fraud allegations

Dear accountant officer,

We have been notified of your possible involvement in tax return fraudulent activity for one of your employees. According to AICPA Bylaw Paragraph 730 your Certified Public Accountant license can be cancelled in case of the occurrence of presenting of a misguided or fraudulent income tax return on the member's or a client's behalf.

Please familiarize yourself with the notification below and respond to it within 14 days. The failure to provide the clarifications within this time-frame will result in termination of your Accountant status.

Complaint.pdf

The American Institute of Certified Public Accountants.

Email: service@aicpa.org
Tel. 888.777.7077
Fax. 800.362.5066

The malicious payload is at [donotclick]jeffknitwear.org/main.php?page=8614d3f3a69b5162 (report here) hosted on 221.131.129.200 (China Mobile, China). The following domains are on the same server and you should either block the IP or these domains too:

checkingservices.net
historyalmostany.org
jeffknitwear.org
lefttorightproductservice.org
toeplunge.org
yourfirstwall.com
visorwordprocessor.org

"Fwd: Wire Transfer (9579GQ518) " spam / forumanarhist.ru

This fake wire transfer spam leads to malware at forumanarhist.ru:


Date:      Thu, 19 Jul 2012 02:56:36 -0400
From:      CABALLEROFANNYcRU@aol.com
Subject:      Fwd: Wire Transfer (9579GQ518)
Attachments:     Wire_AMBA01-Rejected.htm


Dear Operator,



WIRE N: FD-1059598546520289



STATUS: REJECTED



You can find details in the attached file.


The malicious attachment is named Wire_AMBA01-Rejected.htm and contains a redirector to [donotclick]forumanarhist.ru:8080/forum/showthread.php?page=5fa58bce769e5c2c (report here)

That site is multhomed at the following IPs:
78.83.233.242
203.80.16.81
213.17.171.186

There are some additional IPs and domains that can be found in this post that should also be blocked.

"Wire Transfer" spam / phpforkiddies.ru

This spam contains an attachment leading to malware on phpforkiddies.ru:


Date:      Wed, 18 Jul 2012 01:23:20 +0300
From:      "EUNA Wood" [AdamWnukowski@himsa.com.mx]
Subject:      Fwd: Wire Transfer (75073UQ608)
Attachments:     Wire_NFED_Rejected.htm

Dear Operator,



WIRE N: FED-9058663000926019



STATUS: REJECTED



You can find details in the attached file.
The attachment in this case is called Wire_NFED_Rejected.htm and contains a script that attempts to load malware from [donotclick]phpforkiddies.ru:8080/forum/showthread.php?page=5fa58bce769e5c2c (report here) which is multihomed on the following IPs:


The following IPs and domains are connected and should be blocked:
41.66.137.155
50.57.43.49
62.76.186.75
62.76.188.120
62.213.64.161
78.83.233.242
85.143.166.243
87.120.41.155
89.111.177.151
173.203.96.79
184.106.189.124
193.109.144.51
203.80.16.81
203.172.140.202
213.17.171.186

bmwforummsk.ru
forumenginesspb.ru
hamlovladivostok.ru
mazdaontours.ru
phpforkiddies.ru
porscheforumspb.ru

Tuesday, 17 July 2012

Fake Craigslist emails / visorwordprocessor.org

These fake Craigslist emails lead to malware on visorwordprocessor.org:


Date:      Tue, 17 Jul 2012 09:01:11 -0500
From:      "craigslist - automated message, do not reply" [robot@craigslist.org]
Subject:      Your Craiglist.org posting URL.

Posting ID # 27643127:

    "Double Stainless Steel Sink" (household items - by owner)

Should now be accessible at the following URL:

    http://craigslist.org/hsh/262383.html

Index pages and search results are updated every 15 minutes.

To edit or delete, please log in to your member area.

If you are having trouble finding your posting in the listings:

    http://www.craigslist.org/about/help/how_to_fi= nd_your_post_in_the_listings

For other questions or help:

    http://w= ww.craigslist.org/about/help/

Safety tips and avoiding scams:

    http://= www.craigslist.org/about/safety
    http://www.craigslist.o= rg/about/scams

Thanks for using craigslist!

==========


Date:      Tue, 17 Jul 2012 06:00:52 -0800
From:      "craigslist - automated message, do not reply" [robot@craigslist.org]
Subject:      Your Craiglist posting is successful.

Posting ID # 14717917:

    "Turbo 400 Tranny" (household items - by owner)

Should now be accessible at the following URL:

    http://craigslist.org/hsh/888725.html

New postings are updated every 15 minutes.

To edit or delete, please log in to your member area.

If you are having trouble finding your item in the listings:

    http://www.craigslist.org/about/help/how_to_fi= nd_your_post_in_the_listings

For other questions or help:

    http://w= ww.craigslist.org/about/help/

Safety tips and avoiding scams:

    http://= www.craigslist.org/about/safety
    http://www.craigslist.o= rg/about/scams

Thanks for using craigslist!

==========


Date:      Tue, 17 Jul 2012 15:13:26 +0200
From:      "craigslist - automated message, do not reply" [robot@craigslist.org]
Subject:      Your Craiglist posting is successful.

Posting ID # 49685217:

    "Generator" (household items - by owner)

Should now be viewable at the following URL:

    http://craigslist.org/hsh/887563.html

New postings are updated every 15 minutes.

To edit or delete, please log in to your account.

If you are experiencing problems finding your posting in the listings:

    http://www.craigslist.org/about/help/how_to_fi= nd_your_post_in_the_listings

For other questions or help:

    http://w= ww.craigslist.org/about/help/

Safety tips and avoiding scams:

    http://= www.craigslist.org/about/safety
    http://www.craigslist.o= rg/about/scams

Thanks for using craigslist!

==========


Date:      Tue, 17 Jul 2012 10:09:15 -0300
From:      "craigslist - automated message, do not reply" [robot@craigslist.org]
Subject:      You can access your Craiglist listing by the new location.

Posting ID # 35649793:

    "Screwdrivers kit" (household items - by owner)

Can now be viewable at the following location:

    http://craigslist.org/hsh/284761.html

Index pages and search results are updated every 15 minutes.

To edit or delete, please log in to your account.

If you are having trouble finding your item in the listings:

    http://www.craigslist.org/about/help/how_to_fi= nd_your_post_in_the_listings

For other questions or help:

    http://w= ww.craigslist.org/about/help/

Safety tips and avoiding scams:

    http://= www.craigslist.org/about/safety
    http://www.craigslist.o= rg/about/scams

Thanks for using craigslist!

The malicious payload is at [donotclick]visorwordprocessor.org/main.php?page=ed0a25d616022c57 (report here) hosted on 91.227.18.26 (Eximus LLC, Russia). The namesevers are at good-autosport.com which links this attack in with this one earlier today.

Intuit "Henderson LLC" payment spam / mailmergesfinger.org

This fake Intuit spam leads to malware on mailmergesfinger.org:


Date:      Mon, 16 Jul 2012 18:10:26 +0000
From:      "Intuit PaymentNetwork" [support@intuit.com]
Subject:      You have received a new payment through the Intuit network.




Payment received: You received $280.00 from Henderson LLC for invoice 91816

You can access the payment details here.

Funds will be deposited in your bank account.

You now have the possibility to get paid by Credit Card on your invoices. To find put more please sign in to your IPN account and click on the 'Profile' tab on the left.


The malicious payload is at [donotclick]mailmergesfinger.org/main.php?page=bfc8be54a0120bca (report here) hosted on 94.249.172.71 (GHOSTnet, Germany).

The following IPs and domains are connected and should be avoided or blocked:
13.65.99.23
46.20.33.131
62.109.26.35
78.129.132.14
80.77.87.185
94.249.172.71
108.76.72.229
109.164.221.176
164.15.250.148
195.54.32.91
198.144.189.51
200.184.213.131
211.157.105.160

afriget.net
cms-wideopendns.com
fonografs.net
good-autosport.com
mailmergesfinger.org
peace-computer.com
proamd-inc.com
thaidescribed.com