Translate

Posts mit dem Label E-Mails werden angezeigt. Alle Posts anzeigen
Posts mit dem Label E-Mails werden angezeigt. Alle Posts anzeigen

1/31/2014

adrfish.com
PHISHING, SCAM, SPAM SITE:
"Recevez de l'argent pour repondre a des email"
("Receive Money for answering E-Mails") (COSTA RICA)

J'ai decouvert un concept tellement incroyable que
vous n'allez pas en revenir tellement il est simple de
faire de l'argent depuis le confort de son domicile.

Description de votre journee de travail:

-Vous verifiez vos mails depuis votre ordinateur.
-Vous recevez automatiquement 49,90EUR par mail.
-Vous faites suivre les informations contenues dans le Pack

Et c'est Tout!

Rendez-vous maintenant sur cette page
http://adrfish.com/link.php

Gros revenus possible si travailleur.
Screenshot Phishing Mail


MALICIOUS PHISHING, SCAM, SPAM DOMAIN:
adrfish.com
  • https://www.virustotal.com/de/url/1ba30caae863c2e2161a960bc415e1e24f396d623337aa2e295a650ea604333f/analysis/1391182156/
LISTED AT SPAMHAUS:
  • http://www.spamhaus.org/query/domain/adrfish.com
LISTED AT SURBL:
  • http://www.surbl.org/surbl-analysis
SEE ALSO:
  • https://www.mywot.com/en/scorecard/adrfish.com
  • http://www.urlvoid.com/scan/adrfish.com/
IP:
181.174.168.10
  • https://www.virustotal.com/de/url/2040501af8a661b329843b3c3791d3a622243dc219a5a5a906b8de52d4539968/analysis/1391184275/
IP LISTED AT SPAMHAUS:
  • http://www.spamhaus.org/query/bl?ip=181.174.168.10





1/30/2014

Category MALICIOUS IP: 87.106.142.17
PHISHING & SPAM MAIL SERVER - GERMANY


EXAMPLE


MALICIOUS IP (MAIL SERVER): BEING USED FOR PHISHING
87.106.142.17
  • https://www.virustotal.com/de/url/f2897cfdf793e51f81e995aef1a48b3751546f698727e72da60f480f8c8d438a/analysis/1391096503/
HTML
  • https://www.virustotal.com/de/file/777d10257ab159c11dac1feac1a2e2b648af9361ef0da6267247be5e499c638d/analysis/1391096602/
--------------------------------

MAIL EXAMPLES SENT FROM THIS IP:
  • From: "Barclays Bank Plc."<secure@barclays.co.uk>
  • Subject: Multiple login errors on your Barclays Online acco
  • From: "Barclays Bank PLC."<secure@barclays.co.uk>
  • Subject: Barclays important notification!
  • From: "FedEx.com Online Services"<onlineservice@fedex.co
  • Subject: Your fedex.com profile needs to be updated.
  • From: "HSBC Bank Plc."<secure@hsbc.co.uk>
  • Subject: Important security notification!
REFERENCE: https://www.projecthoneypot.org/ip_87.106.142.17

-----------------------------------------
Email Reputation: Poor
  • http://www.senderbase.org/lookup/?search_string=87.106.142.17
 HOSTNAME:
http://s15271957.onlinehome-server.info
  • https://www.virustotal.com/de/url/250c273763076212b3ea9f7ade08d2a2db600797633a6c9acf9180e8494ef6f3/analysis/1391097072/

1/20/2014

Category MALICIOUS DOMAIN & IP:
newquickonline.com & 66.111.239.213
"Comment Devenir Riche ?" (How getting Rich ?)
PHISHING, SCAM, SPAM


Salut, ce secret me rend malade
et je ne peux plus le garder pour
moi uniquement. J'ai donc decidé
de le partager avec vous, vous
allez découvrir comment des
centaines de personnes sont devenu
riche avec...

Ce système est très simple et un
enfant de 10 ans pourrait l'appliquer
sans aucune connaissance.

Allez je ne vous fait pas plus
attendre et je vous donne les
explications maintenant

Cliquez ici pour accèder au site>>>


Tenez-moi informe svp et si
besoin revenez vers moi.

How will i get rich...

Screenshot from newquick.blablabla SPAM-Mail
MALICIOUS DOMAIN: PHISHING, SCAM, SPAM
newquickonline.com
  • https://www.virustotal.com/de/url/8dc180690322fb938db7d494d01be61b662bd29f4bdf29833ba7ad15d15aeedb/analysis/1390244230/
HTML:
  • https://www.virustotal.com/de/file/faf4a27477bc73e59cb23ca28c0a2f7e8c0e687b380a14bf587118be749b52e0/analysis/1390244772/
  • http://jsunpack.jeek.org/?report=ec57c2558a8d13640f7875169e82616b25fab79e
newquickonline.com/unsubscribe.php
  • https://www.virustotal.com/de/url/995fa55fb73aa1d432a8a14dc9f517d0c8cb1ada8f5697b785f118f9fffce323/analysis/1390245841/
  • http://zulu.zscaler.com/submission/show/f38f148811a55cb99c4cc61af4b3b92c-1390244259
  • https://www.mywot.com/en/scorecard/newquickonline.com
  • http://www.urlvoid.com/scan/newquickonline.com/
LISTED AT SPAMHAUS:
  • http://www.spamhaus.org/query/domain/newquickonline.com
LISTED AT SURBL:
  • http://www.surbl.org/surbl-analysis
-----------------------------------------------------------------------------------------------------------------------------------

IP: 66.111.239.213
  • https://www.virustotal.com/de/url/7ea04d745a797e563f76710b1962e6d1c712eebead72ce2e17d17669a9cf1ebf/analysis/1390246347/
LISTED AT SPAMHAUS (SBL):
  • http://www.spamhaus.org/query/ip/66.111.239.213

Email Reputation: POOR
WEB Reputation: POOR

  • http://www.senderbase.org/lookup/?search_string=66.111.239.213


1/19/2014

Category MALICIOUS IP: 87.106.63.20
SPAM MAIL SERVER - GERMANY







MALICIOUS IP: SPAM MAIL SERVER - GERMANY

87.106.63.20
  • https://www.virustotal.com/de/url/8dd6dacfed6ef9746f7419084b198ef72dd8743110b9e8d302b8d377848f991f/analysis/1390119928/

Email Reputation: POOR
Spam Level: CRITICAL

  • http://www.senderbase.org/lookup/?search_string=87.106.63.20
  • http://psbl.org/listing?ip=87.106.63.20
  • http://www.ipvoid.com/scan/87.106.63.20

1/12/2014

Category MALICIOUS DOMAIN: goo.gl
Ipage Special Introductory Offer 77% Off
(PHISHING, MALWARE DOWNLOADS & SPAM)


MALICIOUS PHISHING DOMAIN: PHISHING & MALWARE DOWNLOADS & SPAM




DOMAIN:
goo.gl
  • https://www.virustotal.com/de/url/21f8b60c2acbeb555e302df332fcccf6047eec8882ed892e0dacab9fe70c996a/analysis/1389537127/
SPECIFIC LINK:
goo.gl/huXdr
  • https://www.virustotal.com/de/url/26ed503d5a14eb9016a4a074ec573a2aef371abd922776a9324f9950e93cbace/analysis/1389537187/
AS WELL FOR EXAMPLE(s):
goo.gl/tuPlJs
  • https://www.virustotal.com/de/url/0a26e8f2babde9fc6b2e88738320a4bfdd8d3577ad8c9267676b206b5f3c217b/analysis/1389537368/
goo.gl/J0nDkL
  • https://www.virustotal.com/de/url/a5b506685be72df37d6cf9662aacfde805c5b68de069d08e0d74f59e6102d444/analysis/
INFECTED WITH:
not-a-virus:Downloader.NSIS.OutBrowse.b
  • https://www.virustotal.com/de/file/33482d6ac241712c21f2831400c2a5a62827ae8f754e8e608ce2a01b583b12b1/analysis/
OTHER RATINGS:
  • http://www.phishtank.com/phish_detail.php?phish_id=2104074
  • http://sitecheck.sucuri.net/results/goo.gl
  • http://www.urlvoid.com/scan/goo.gl/
ADDITIONAL LINKS INCLUDED IN THE MAIL: Spammed websites hitting traps JSS list

www.emailsnewsletters.com
  • https://www.virustotal.com/de/url/dc2f79c70ef61e77d6bcc0924056cac0938740ed27fcd0209ef4c5b3693f63fd/analysis/1389538025/
---> REDIRECTS TO:
mailchimp.com/emails/open.php
  • https://www.virustotal.com/de/url/e6b68d4d4e373df4282dba9183b2ac4d9f8b90cb70f4123e9baad5e5cb7a7fd0/analysis/

  • https://urlquery.net/report.php?id=8789854
------------------------------------------
www.emailsnewsletters.com/emails/open.php
  • https://www.virustotal.com/de/url/9840098ef584dfd947519c27f540a38efb506d356ad5cdd829c2f2b99c62bc1e/analysis/1389537917/
www.emailsnewsletters.com/coupon/ipage12/ipage.jpg
  • https://www.virustotal.com/de/url/326fb152c755ec283af4cef47b005635b592cc510441786b06fa2a3247ed9794/analysis/1389538129/
  •  https://www.mywot.com/en/scorecard/emailsnewsletters.com
------------------------------------------
www.ipage.com
  • https://www.virustotal.com/de/url/5aaefa4db218579656feb47d6ba6629e76424fa2f6857f1b2299077ae0afd63f/analysis/
www.ipage.com/images/templates/ipage/ipg-hero-extras-USD3a.gif
  • https://www.virustotal.com/de/url/145b274103ce50a5f0ed756bf5ae231bfed1c709e8b6d08a8d4848a3a8b7ab79/analysis/1389541040/
 
EMAIL Spam

12/06/2013

Scams from GHANA (VIDEO)

Cybercriminals in Ghana show us how they use internet scams to STEAL thousands of dollars from unsuspecting victims all over the globe.


While Nigeria's 401 (419) Scammers looks like thaey have written the book on West African internet fraud, their "Nigerias Show" looks like Compuserve compared to what's going on in Ghana.

Unsatisfied with the meager winnings from emailing thousands of random (wealthy) Westerners in hopes of convincing one poor sap they're the treasurer of the Ivory Coast, Ghana's scammers decided to stack the odds in their favor the old-fashioned way, with witchcraft (VooDoo).

Taking a page from cyberpunk, traditional West African Ubuntu priests adapted their services to the needs of the information age and started leading down-on-their-luck internet scammers through strange and costly rituals, designed to increase their powers of persuasion and make their emails irresistible to greedy Americans. And so "Sakawa" was born (a practice in Ghana which combines modern internet-based fraud practice with traditional Akan religious rituals).

Now not only is Sakawa Ghana's most popular youth activity and one of its biggest underground economies, it's a full-blown national phenomenon. Sakawa has its own tunes, clothing brands, Sakawasploitation flicks, and even a metastatic backlash from Christian preachers and the press. When we were in Accra over the summer it was impossible to walk more than 10 feet without seeing the word Sakawa in blood-red Misfits letters on a poster or tabloid, often accompanied by bone-chilling horrors of the photoshopped variety.

The government is freaked out because Sakawa is threatening Ghana's business reputation, the Christians are freaked out because they're losing money to the Juju priests, the press is freaked out because being freaked out is what sells papers, and the public is freaked out because their government, preacher, and media are all telling them they should be. All the while the Sakawa boys are living the high life and racking up debts to the spirit world, just waiting for the axe to fall.


12/01/2013

The Cryptolocker



The Cryptolocker Ransomware (as well known as Crilock) intrusions are becoming Polycephaly, and so far there is a Antivirusvendor (AVV) counting more than 12.000 infections in the United States alone.


The Nasty piece of Malware, which encrypts your files (mainly .DOC files, pictures as well as AutoCAD-Files) when infected, requires thereafter a Ransom for decryption, up to 300 USD (in bitcoins) and more. Time available you have left to pay: up to between 3 days and 100 hours. Some may say that the genuine thoughts (targets) of those developers of Cryptolocker were, or, could have been the clientele of the ongoing Expansion of World-Wide-Web-Communities of Pedophiles, in fearness of getting "outed" !

The United Kingdom alone was spammed with several millions of malicious e-mails. This went so far (as it looked like a Campaign), that the National Cyber Crime Unit (NCCU), a sub-organization of the
National Crime Agency (NCA) (sounds a bit like NSA), had to give out an Alert on
November 15th 2013.
"The NCA's National Cyber Crime Unit are aware of a mass email spamming event that is ongoing, where people are receiving emails that appear to be from banks and other financial institutions.
The emails may be sent out to tens of millions of UK customers, but appear to be targeting small and medium businesses in particular. This spamming event is assessed as a significant risk.
The emails carry an attachment that appears to be correspondence linked to the email message (for example, a voicemail, fax, details of a suspicious transaction or invoices for payment). This file is in fact a malware that can install Cryptolocker – which is a piece of ransomware
Cryptolocker works by encrypting the user’s files on the infected machine and the local network it is attached to.
Once encrypted, the computer will display a splash screen with a count down timer and a demand for the payment of 2 Bitcoins in ransom (Approx £536 as at 15/11/2013) for the decryption key.

The NCA would never endorse the payment of a ransom to criminals and there is no guarantee that they would honour the payments in any event.
Lee Miles, Deputy Head of the NCCU says "The NCA are actively pursuing organised crime groups committing this type of crime. We are working in cooperation with industry and international partners to identify and bring to justice those responsible and reduce the risk to the public."
An NCCU investigation is ongoing to identify the source of the email addresses used. Anyone who is infected with this malware should report it via Action Fraud
Sound advice can be found at GetSafeOnline
Advice: This is a case where prevention is better than cure.
  • The public should be aware not to click on any such attachment.
  • Antivirus software should be updated, as should operating systems.
  • User created files should be backed up routinely and preserved off the network.
  • Where a computer becomes infected it should be disconnected from the network, and professional assistance should be sought to clean the computer.
  • Various antivirus companies offer remedial software solutions (though they will not restore encrypted files)."

Researchers of Bitdefender Labs revealed that a bit more than 12.000 victims were affected during a one-week period at the end of October. “CryptoLocker servers are changed very often (it is seldom that a CnC-Botserver remains online for more than a week), however, once it has been Reverse engineered, Security Researchers can pre-analyse the relevant domains and count connection attempts.” according to a Bitdefender Post last November.

BitDefender used the DNS-Sinkholes and studied that the quantity of those connections could get traced back to IPs in the United States. Quote from that Post:

"In fact, judging by the distribution of infected hosts and the payment methods available, it would seem that only systems in the US are targeted, with the rest being collateral damage."

First appeared, Cryptolocker came into nature as a out of "the wild"-Trojan, spreading through fake emails. It penetrates then encrypted files on the user's CPU and any profiled network drive(s). Once you are padlocked, it demands you for a MoneyPak or Bitcoin payment within three days (or up to 100 hours). Further on, (if) you pay the Ransom, you will receive a key that unlocks your encrypted files.

In the very first period, the Unlock-key was destroyed 72 hours after infection, so you could forget your files for good, locking them permanently. After the Attackers found out, they may gain more money with a lucrative Scheme in giving you a "Last Chance", they rewrote CryptoLocker around beginning of November 2013, to allow the recovery of your files, beyond the designated time at a higher Ransom of Bitcoins.

According to Microsoft, Crilock affected about 34.000 machines between September and early November 2013. By today, the Malware changed to
CnC-Hosts in Countrys like Russia, Germany, Kazakhstan and Ukraine and the Ware is still spreading...
Map showing the first Rampage of Cryptolocker (Pict. by BitDefender)

Further interesting Articles about Cryptolocker:

"US-CERT is aware of a malware campaign that surfaced in 2013 and is associated with an increasing number of ransomware infections. CryptoLocker is a new variant of ransomware that restricts access to infected computers and demands the victim provide a payment to the attackers in order to decrypt and recover their files. As of this time, the primary means of infection appears to be phishing emails containing malicious attachments."