Translate

4/30/2014

Officer Down Memorial Post (10-00):
Christopher A. Upton (37)
killed on March 5th 2010
@ the Oconee National Forest, Georgia, United States

A USDA Forest Service Law Enforcement officer was fatally killed on, March 5th 2010 at the Ocmulgee Bluff Equestrian Recreation Area on the Oconee Ranger District of the Chattahoochee-Oconee National Forest in Jasper County, Georgia.

Christopher Upton
Christopher Arby Upton, 37, of Monroe, Georgia, was on a routine patrol in the area about 11 p.m., where 2 hunters were hunting coyotes with a high-powered rifle equipped with night vision and apparently mistook the officer for game. After the shooting, the hunters dialed 911 and reported a hunting incident.


“This is a tragic incident where the loss of a federal officer’s life could have been avoided,” said Steven Ruppert, Special Agent-in-Charge for the Southern Region of the Forest Service.

“The standard procedure for a hunter is to identify your target and then shoot,” said Homer Bryson, Law Enforcement Colonel for Georgia Department of Natural Resources (DNR) Wildlife Resources Division (WRD). “The hunter failed to do this, and mistook the officer for game. He then shot and instantly killed the officer.”

The shooter, Norman Clinton Hale, 40, McDonough, Ga., and an observer, Clifford Allen McGouirk, 41, of Jackson, Georgia, were hunting coyotes.

While hunting illegally, Hale discharged his rifle, striking Upton in the face. At the sentencing hearing, the government offered expert evidence that had Mr. Hale taken appropriate action, such as calling for emergency services and applying pressure to Officer Upton’s wound, Officer Upton could have survived.

Oconee National Forest
Instead, Mr. Hale waited one hour and 32 minutes before calling 911 and offered no aid to Officer Upton. Mr. Hale asked the other persons present to just leave and not report the incident. When they refused to do so, Mr. Hale then suggested they get four wheelers and drive them to where Officer Upton was and tell the police that they found Officer Upton’s body in this condition. Hale was sentenced on March 22nd 2012 before the Judge Marc T. Treadwell to to 60 months’ imprisonment.

Upton, a four-year veteran of the Forest Service, had previously worked as a game warden for the Department of Defense, U.S. Marine Corps, at Beaufort, South Carolina, and as a conservation officer, game warden and pilot with the Florida Fish and Wildlife Commission. He is survived by his wife, Jessica, and a 4-year-old daughter, Annabelle.

SOURCE(s): http://www.woodsnwater.net/ & http://www.odmp.org/officer/20315-officer-christopher-a-upton

down.360safe.com with Win32/Trojan.Genome:
MALICIOUS DOMAIN FROM CHINA
IP: 180.153.229.17 Shanghai & IP: 220.181.150.209 Beijing




CHINESE (Shanghai & Beijing)
MALWARE DOMAIN: & SUSPICIOUS FILE
DOMAIN + SUBDOMAIN: BLACKLISTED @ MalwareDomainList

http://360safe.com/
  • https://www.virustotal.com/de/url/b3e16d689af0dd0c1c7f91b3bb7d3b1945f8a38b0f944713c0f87244ee2baee0/analysis/
SUBDOMAIN:
http://down.360safe.com/
  • https://www.virustotal.com/de/url/a0ded28ef8f22d505636819bb2b8bba88412c8157ca3ac4723a5a34fe994cb73/analysis/1398878350/
SUSPICIOUS FILE LINK:
http://down.360safe.com/setup.exe
  • https://www.virustotal.com/de/url/659adefa8017920149ed69bc009b0bc8be1ba53a02a589346392cec09cf144f6/analysis/1398878498/
SUSPICIOUS FILE:
  • https://www.virustotal.com/de/file/1f99e9e6e5bb5444a6010219b44837c89aab951c177da702d771e91dcbfc97d2/analysis/
IP(s):
http://180.153.229.17/
  • https://www.virustotal.com/de/url/67118050119382d41608cd53e67db70664b09dcd75fe9ad47994be1228b77e9b/analysis/1398878751/
  • https://www.virustotal.com/de/ip-address/180.153.229.17/information/
http://220.181.150.209/
  • https://www.virustotal.com/de/url/d4968e75e9802ef631320da4bb1c4c5c5766b28fedb5a90160a18ca79f70b2cf/analysis/1398878962/
  • https://www.virustotal.com/de/ip-address/220.181.150.209/information/
SEE ALSO:
  • http://urlquery.net/report.php?id=1398876496772
  • http://quttera.com/detailed_report/down.360safe.com

4/29/2014

aspiderm2m.net
POTENTIALLY MALICIOUS DOMAIN
PUA.PHISHING.BANK or Malware.HTML.Iframe (Paranoid Heuristics)
IP: 66.155.9.238

San Francisco, UNITED STATES



POTENTIALLY MALICIOUS DOMAIN:



PUA.PHISHING.BANK 
OR
Malware.HTML.Iframe (Paranoid Heuristics)
http://www.aspiderm2m.net/
  • https://www.virustotal.com/de/url/1cd0a5ab886c9f5c8c5f77487ab7b3d3de4195c916c27be624ca0d9d8988321b/analysis/1398796394/
---> REDIRECTS TO:
http://aspiderm2m.net/
  • https://www.virustotal.com/de/url/f8a2831d9c9f5f88e68f3f8ab67e88fbf8f8073e928d407561b9134f946652fd/analysis/1398796533/
PUA.PHISHING.BANK OR Malware.HTML.Iframe (Paranoid Heuristics)
  • https://www.virustotal.com/de/file/3f247ec48488c107deed757f8e4ea3c7bf5f7d2d0e48567a75745a69b2e3234e/analysis/1398796207/
  • http://virusscan.jotti.org/de/scanresult/7bd9d4594300b12e875d0bf9bffb8be09d384363

IP:
http://66.155.9.238/
  • https://www.virustotal.com/de/url/1a20d9bd80e3f59756f980204479ead147fa25471de76a18df69cea22ecd66d3/analysis/1398797120/
  • https://www.virustotal.com/de/ip-address/66.155.9.238/information/
BHA: 1
  • https://www.projecthoneypot.org/ip_66.155.9.238
Fwd/Rev DNS Match: NO
  • http://www.senderbase.org/lookup/?search_string=66.155.9.238

Florida ONLINE CHILD PREDATORS 2011:

Joshua Jay Williamson (24) from Jacksonville
sentenced to 5 ½ years in federal prison for
extorting dozens of women on Facebook
and possession child porn


24-year-old Joshua Jay Williamson received the sentence on the 29th of November, 2012, in Jacksonville. Court documents say Williamson "hacked" in to the email and social networking site on FB of dozens of women between February 2011 and June 2011. Using the personal information he gathered, along with suggestive photos he would find online, and would then further demand the women to send him full nude and sexually explicit photos. He told them that if they did not comply, he would send provocative pictures to their email and Facebook contacts.



On May 19th, 2011 alone Williamson sent extortionate emails to about 75 women.

He attempted to hide his ID by using several IP Adresses and an anonymizer tool (like i.ex. Ghostsurf) but the Smartass should have known that he can be tracked down by authorities anyway.

Files with photos of personal information for more than 150 women were found on Williamson’s computer; 23 images and 31 videos of child pornography were also uncovered.

Williamson will spend 66 months in federal prison and further will serve 10 years of supervised release. He also has been registered as a sex offender and his CPU-Hardware were forfeited as well.

Many agencies, including the FBI, the FDLE (Florida Department of Law Enforcement) and the JSO (Jacksonville Sheriff's Office) were involved in the investigation.

SOURCE: http://www.wokv.com/

4/28/2014

CVE-2014-1776:

Microsoft Internet Explorer Use-After-Free Vulnerability
Being Actively Exploited
Vulnerability Note VU#222929

US-CERT is aware of active exploitation of a use-after-free vulnerability in Microsoft Internet Explorer. This vulnerability affects IE versions 6 through 11 and could lead to the complete compromise of an affected system.


US-CERT recommends that users and administrators enable Microsoft EMET where possible and consider employing an alternative web browser until an official update is available.

For more details, please see:

http://www.kb.cert.org/vuls/id/222929

https://www.us-cert.gov/ncas/current-activity/2014/04/28/Microsoft-Internet-Explorer-Use-After-Free-Vulnerability-Being

PUA.JS.Obfus-7 @ pro-hackerz.blogspot.com
recently detected as a Potentially Malicious Blogspot
with a likely damaging Heap Spray Attempt



MALICIOUS & MALWARE BLOG:
http://pro-hackerz.blogspot.com/

  • https://www.virustotal.com/de/url/df11cd4c7eb26602db65645887663070ac8f682a8206ff185e76347e3f82917d/analysis/1398709316/

PUA.JS.Obfus-7

  • https://www.virustotal.com/de/file/60956bff3cc0bdb608beb77417d96c1a46ec531e9537504de4d27cc30e98c707/analysis/1398709404/
Likely Malicious Heap Spray Attempt
  • https://urlquery.net/report.php?id=1398709408204
  • https://urlquery.net/report.php?id=1398709393557
  • https://urlquery.net/report.php?id=1398709407940

SEE ALSO:
  • http://quttera.com/detailed_report/pro-hackerz.blogspot.com
SOME CODE :

186.94.81.128
Category MALICIOUS IP
Palos Grandes, VENEZUELA
Spamhaus listed (PBL)



IP:
http://186.94.81.128/
  • https://www.virustotal.com/de/url/347ec8b05932a64cc5e39ad8df105c962ea48fa2bb24660cff0570b815c3b04b/analysis/1398683475/
LISTED AT SPAMHAUS (PBL 915113):
  • http://www.spamhaus.org/query/bl?ip=186.94.81.128
  • http://www.spamhaus.org/pbl/query/PBL915113
LISTED AT TONEVALL:
  • http://dnsbl.tornevall.org  
See as well:
  • http://www.stopforumspam.com/ipcheck/186.94.81.128
E-MAIL REP: POOR
  • http://www.senderbase.org/lookup/?search_string=186.94.81.128 


4/27/2014

SPAM - SCAM - PHISHING MAIL from:
www.redcappi.com & b-unitd.com
LANSING, MICHIGAN, United States

"Re: Ihre Bestellung"
rechtsanwalt.maiers@gmail.com



First take a look at this post, also from redcappi.com

http://stayaway2.blogspot.com/2014/04/zdf-eiltachtungschockierende-meldung.html

Latest Redcappi Mail Screenshot

ACHTUNG! Sondernewsletter!

Sie haben keine Bestellung bei uns getätigt, werden es aber wie 97,2% unserer Leser nach dieser Mail tun!



Rührende Geschichte bringt Moderatorin von "Raus aus den Schulden" zu weinen!



Arbeitslos und mit über 130.000 Euro verschuldet

Dieser Mann änderte sein Leben und verdient mit diesem System bis zu 263,69 Euro am Tag!

Bald von hohen Schulden zum Reichtum? RTL2 testete Live im TV



Die Moderatoren waren verblüfft! Sie können es auch! Uns zwar absolut KOSTENLOS!

Doch es gibt einen Haken! Dieses Patent wird ist leider stark begrenzt.

Denn der Patentbesitzer hat dieses System an eine US Bank verkauft!



Nur Diejenigen, die sich noch rechtzeitig registrieren, dürfen das System lebenslänglichkostenfrei nutzen!



Schauen Sie sich schnell das Video an, das Ihr Leben verändern wird!


HIER GEHT ES ZUM VIDEO 

Sollte der Link nicht funktionieren, dann kopieren Sie bitte die Domain in den Browser:
http://b-unitd.com/9uw 
----------------------------------------------------------------------------------------------------------------------------------------------
http://www.redcappi.com/
  • https://www.virustotal.com/de/url/67dc853cd6c065dae93edf295021f261c0c3a2b181cdd28f6780119554a3cfca/analysis/1398617170/

http://b-unitd.com/9uw
  • https://www.virustotal.com/de/url/3ac985b1b94ecb91cfe388eea0255b6e5f053b72f4648f5f990c9806fbcd9fc2/analysis/

URL after redirects
http://www.projekt95pro.com/?campaign=6739&ft=1&p=jsbfaeyJhIjoiMTAwODg4IiwiYyI6IjEzOTg2MTczMjU0OTgzNzE1MzUiLCJ4IjoicmVkY2FwcGkzMS4wMy4xNC1BZHJlc3NidXRsZXIifQ==
  • https://www.virustotal.com/de/url/6982efa0dcb5cb5914627017685691708d026cca3f3f4430ddf00e8d8a38d5fc/analysis/


OTHER PARTICULAR LINKS in THE EMAIL HEADER:

  • http://www.redcappi.com/c/38111/MxgRyfrW5uDADAONCsv15qiM89vMbzudmiJWDSKFgW

  • http://www.redcappi.com/newsletter/unsubscribe_mail/unsubscribe/338111/MxgRyfrW5uDADAONCsv15qiM89vMbzudmiJWDSKFgW

  • http://www.redcappi.com/newsletter/clickrate/create/38111/MxgRyfrW5uDADAONCsv15qiM89vMbzudmiJWDSKFgW/1

  • http://www.redcappi.com/newsletter/clickrate/create/38111/MxgRyfrW5uDADAONCsv15qiM89vMbzudmiJWDSKFgW/2

  • http://www.redcappi.com/newsletter/clickrate/create/38111/MxgRyfrW5uDADAONCsv15qiM89vMbzudmiJWDSKFgW/3

  • http://www.redcappi.com/newsletter/powered_by_redcappi/index/38111/MxgRyfrW5uDADAONCsv15qiM89vMbzudmiJWDSKFgW

  • http://www.redcappi.com/webappassets/images-front/thanks-logo.png

  • http://www.redcappi.com/newsletter/unsubscribe_mail/unsubscribe/38111/MxgRyfrW5uDADAONCsv15qiM89vMbzudmiJWDSKFgW

  • http://www.redcappi.com/newsletter/forward_to_friend/index/38111/MxgRyfrW5uDADAONCsv15qiM89vMbzudmiJWDSKFgW

  • http://www.redcappi.com/newsletter/unsubscribe_mail/read/38111/MxgRyfrW5uDADAONCsv15qiM89vMbzudmiJWDSKFgW

ORIGINATING IP(s):
http://14.3.31.13/ (JAPAN)
  • https://www.virustotal.com/de/url/666d6c71daa4949cdf56903f33548099340d2ca4d3ba2cb056a4328820b498c4/analysis/1398618595/
http://50.28.15.48/ (Lansing, MICHIGAN)
  • https://www.virustotal.com/de/url/9608502cf9ac7e4340127003a8b89f7570d61229ce1b67f641f5ff893bba974b/analysis/1398618787/
SPAM MAILSERVER FROM MICHIGAN:

MAILS SENT FROM IP: 144
  • https://www.projecthoneypot.org/ip_50.28.15.48

What is Snowshoe Spamming ?

Snowshoe spamming is a spamming procedure in which the spammer (mostly a Spambot) uses a wide range of IP addresses in order to spread out the prepared spam load. The large spread of IP addresses makes it difficult to identify and trap the spam from where its originating from, allowing at least some of it to reach email inboxes. For companies which specialize in trapping spam, Snowshoe Spamming is particularly harmful, because it is difficult to trap it with traditional spam filters.


Like a snowshoe spreads the load of a traveler across a wide area of snow, snowshoe spamming is a technique used by spammers to spread spam output across many IPs and domains, in order to reduce reputation metrics and evade filters. Snowshoes are designed to spread a large weight across a wide area so that the wearer does not break through crusts of snow and ice, as snowshoe spam distributes a broad load of spam across a varied array of IP addresses in much the same way.

IP addresses in the United States were responsible for almost 27% of snowshoe campaigns

Like all spammers, snowshoe spammers anticipate that some of their unwanted emails will be trapped by spam filters. Snowshoe spamming gives more email a chance at getting through to an inbox, where it can reach a computer user.

Setting up a snowshoe spamming operation requires some resources and knowledge, as the spammer must have access to an array of IP addresses. Snowshoe spammers typically use an assortment of domains, which may be linked to different servers and providers to further spread the spam load. In a sampling of emails sent by a snowshoe spammer, repeating IP addresses are fairly rare, which means that filters must focus on the content, rather than the sender, to trap spam.

Legitimate providers of email services use a very narrow range of IP addresses for sending email. This is generally viewed as a mark of integrity, as is the use of clear disclosure about who owns the originating domain. By contrast, snowshoe spamming often involves domains which are hidden behind layers of anonymity, making it difficult to track down the owner and report abuse. Especially in nations with anti-spam legislation, tracking down the parties responsible for spam, spyware, and other malicious activities can be extremely difficult, because perpetrators are good at covering their tracks.

Several anti-spam attempts have focused on targeting specific domain registrars and hosts. Certain registrars are infamous for harboring spammers, and by identifying large numbers of spam sites in their client lists, anti-spam advocates hope to take down those sites or humiliate the registrar into tightening its terms of service. Snowshoe spamming sometimes exposes a systemic problem with a particular host, as anti-spam advocates realize that large amounts of spam originates from domains managed by the same company.

Snowshoe spam accounted for all but about 5% of spam from the U.S. top 10
Snowshoers use many fictitious business names (DBA - Doing Business As), fake names and identities, and frequently changing postal dropboxes and voicemail drops. Conversely, legitimate mailers try hard to build brand reputation based on a real business address, a known domain and a small, permanent, well-identified range of sending IPs. Snowshoers often use anonymized or unidentifiable whois records, whereas legitimate senders are proud to provide their bona fide identity.

Some showshoers use tunneled connections from their back-end spam cannon to the spam egress IP. The back-end IP address is not in the spam headers. ISPs, you are in a position to detect those back-end spam cannons by checking where traffic flows are coming from. Remember, the tunneled connection is not necessarily on port 25. Spamhaus always appreciates such information.

http://www.spamhaus.org/faq/section/Glossary#233

Marylands ONLINE CHILD PREDATORS 2011/2012:
Roger Allen Repp, III, age 45,
Sentenced to 25 Years in Prison for Sexually Exploiting a Minor
to Produce Child Pornography

U.S. District Judge Catherine C. Blake sentenced Roger Allen Repp, III, age 45, formerly of Hagerstown, Maryland, on September 6th, 2012, to 25 years in prison, followed by supervised release for life, for sexually exploiting a minor to produce child pornography. Judge Blake also ordered that upon Repp’s release from prison he must register as a sex offender in the place where he resides, where he is an employee, and where he is a student, under the Sex Offender Registration and Notification Act (SORNA).

Roger Allen Repp
The sentence was announced by United States Attorney for the District of Maryland Rod J. Rosenstein; Acting Special Agent in Charge Timothy P. Groh of the Federal Bureau of Investigation; Colonel Marcus L. Brown, Superintendent of the Maryland State Police; and Washington County State’s Attorney Charles P. Strong, Jr.

According to Repp’s plea agreement, Repp produced sexually explicit and lascivious photographs of a teenage girl under the age of 16 via a pinhole camera he set up in the girl’s bedroom and bathroom, without her knowledge. Repp admitted that he distributed those images to other pedophiles via a file sharing program over the Internet, in return for other child pornography being sent to him. Repp’s conduct was discovered during an undercover investigation of file sharing activities on the Internet, when on March 11th and March 16th, 2011, respectively, two separate undercover investigators downloaded images and videos of child pornography from Repp’s collection via a file sharing program.

Judge Blake
As a result of the undercover investigation, a search warrant was executed at Repp’s residence on April 22nd, 2011, by members of the Maryland State Police Computer Crimes Unit. Law enforcement seized two laptop computers, an external hard drive, and digital media. A subsequent forensic examination of the external hard drive revealed numerous files of child pornography, including 125 video files depicting the victim that were surreptitiously filmed by Repp. There were also several chat logs between Repp and others where he offered to share files of the victim and chats where Repp is looking for other individuals to share files with him.

SOURCE: http://www.examiner.com

4/26/2014

PHISHING: Re: Bestellbestätigung.
"ACHTUNG ! Sondernewsletter !"
FROM:
Snowshoe Spammer mawamalai.com (IPs: 79.124.56.67 - 79.124.56.70)
PUA.JS.Xored

BULGARIA



ACHTUNG! Sondernewsletter!

Sie haben keine Bestellung bei uns getätigt. Sie werden es aber wie 97.2% der Leser tun, wenn Sie diese Mail gelesen haben!
Rührende Geschichte bringt Moderatorin von "Raus aus den Schulden" zu weinen!

Arbeitslos und mit über 130.000 Euro verschuldet!
Dieser Mann änderte sein Leben und verdient mit diesem System bis zu 263,69 Euro am Tag!
Bald von hohen Schulden zum Reichtum? RTL2 testete Live im TV!

Die Moderatoren waren verblüfft! Sie können es auch! Uns zwar absolut KOSTENLOS!
Doch es gibt einen Haken! Dieses Patent wird ist leider stark begrenzt.
Denn der Patentbesitzer hat dieses System an eine US Bank verkauft!

Nur Diejenigen, die sich noch rechtzeitig registrieren, dürfen das System lebenslänglich kostenfrei nutzen!

Schauen Sie sich schnell das Video an, das Ihr Leben verändern wird!


HIER GEHT ES ZUM VIDEO

Sollte der Link nicht funktionieren, dann kopieren Sie bitte die Domain in den Browser: http://b-unitd.com/9uy

Click here to unsubscribe


Mail Screenshot

PHISHING SPAM-DOMAIN: 
FROM BULGARIA
http://mawamalai.com/
  • https://www.virustotal.com/de/url/6896cabd8597b88bada31b7daa824a29a707f6ab3078291cc0fc256bdbdbdf12/analysis/1398514506/
HTML:
  • https://www.virustotal.com/de/file/dbb6e6caba47b4688bd5a128e57eb8d26620942b13d5b07a0fa51d75fde63d2a/analysis/1398514432/

*********************************************************************************************************************

ANALYSIS IP: 79.124.56.67
http://79.124.56.67/
  • https://www.virustotal.com/de/url/ef621203c8c566900d8a693072d085991dd8111f907a5a97aa828560f19ede02/analysis/1398517859/
Invalid HTML data
  • https://www.virustotal.com/de/file/b7bd64ddcc323a81ffc9806c613c863132802289e9bc57f62affcce235d996e9/analysis/1398517950/
  • https://www.virustotal.com/de/ip-address/79.124.56.67/information/
HOSTNAME:
http://news1.bowntymailer.com/
  • https://www.virustotal.com/de/url/73c6ee9f15bc9c283a3281fa27d6dc857f8a92ee572d3733bc96ebe6247f05d6/analysis/1398521012/
REDIRECTS TO:
http://79.124.56.67/cgi-sys/defaultwebpage.cgi
  • https://www.virustotal.com/de/url/aec08d798876325028714570d7ccaedfe9ac44e8c7001c4b7734aaa322657d64/analysis/1398519269/
IP 79.124.56.67 IS BLACKLISTED AT:

1)
SPAMHAUS (SBL): SNOWSHOE SPAMMER
  • http://www.spamhaus.org/query/bl?ip=79.124.56.67
  • http://www.spamhaus.org/sbl/query/SBL213606
  • http://www.spamhaus.org/sbl/listings/telehouse.bg
http://telehouse.bg/
  • https://www.virustotal.com/de/url/4a0a98bd45413718c532b3128cfc59a15f8b8ba7bc5195fab8c9042cab9d827b/analysis/
2)
WOT:
  • https://www.mywot.com/en/scorecard/79.124.56.67
3)
spam.abuse.ch:
  • http://dnsbl.abuse.ch/?ipaddress=79.124.56.67
4)
WEB-REP: POOR
EMAIL-REP: POOR
  • http://www.senderbase.org/lookup/?search_string=79.124.56.67

*********************************************************************************************************************

Originating PHISHING-MAIL-IP Address: 79.124.56.70
http://79.124.56.70/
  • https://www.virustotal.com/de/url/94a3d7b252550f754c522cbee1ab45246f8c8ec7d5f69be7165d0f2289ffe12a/analysis/1398519845/
  • https://www.virustotal.com/de/ip-address/79.124.56.70/information/
Invalid HTML data
  • https://www.virustotal.com/de/file/b7bd64ddcc323a81ffc9806c613c863132802289e9bc57f62affcce235d996e9/analysis/1398517950/
  • https://www.virustotal.com/de/ip-address/79.124.56.70/information/
HOSTNAME:
http://news4.bowntymailer.com/
  • https://www.virustotal.com/de/url/07f76972f4be2bd08f85c65791eb977f9ae1eb70c410ca5a74dabe047c66ea2c/analysis/1398520764/
REDIRECTS TO:
http://79.124.56.70/cgi-sys/defaultwebpage.cgi
  • https://www.virustotal.com/de/url/1dff6d9729554c1422fd204c39c3c16d202a9ec6ac2822f2eeabfc6e921a7983/analysis/1398520085/
IP 79.124.56.70 IS BLACKLISTED AT:

1)
SPAMHAUS (SBL): SNOWSHOE SPAMMER
  • http://www.spamhaus.org/query/bl?ip=79.124.56.70
  • http://www.spamhaus.org/sbl/query/SBL213606
  • http://www.spamhaus.org/sbl/listings/telehouse.bg
http://telehouse.bg/
  • https://www.virustotal.com/de/url/4a0a98bd45413718c532b3128cfc59a15f8b8ba7bc5195fab8c9042cab9d827b/analysis/
2)
WOT:
  • https://www.mywot.com/en/scorecard/79.124.56.70
3)
spam.abuse.ch:
  • http://dnsbl.abuse.ch/?ipaddress=79.124.56.70
4)
WEB-REP: POOR
EMAIL-REP: POOR
  • http://www.senderbase.org/lookup/?search_string=79.124.56.70

*********************************************************************************************************************

OTHER LINKS CONNECTED TO THE PHISHING MAIL:

1.0
http://mawamalai.com/link.php
  • https://www.virustotal.com/de/url/7db23e02d8d6153c472dc14a24fb6a995875b1bb2fb271bf57cd42f78a7196ba/analysis/1398514872/
  • https://www.virustotal.com/de/file/23d32b79f3e71e41c2eb3d8811f58f72a2b6b5eb04c0981f16f61ab009945054/analysis/1398434545/
1.1
http://mawamalai.com/open.php
  • https://www.virustotal.com/de/url/dab2df490d9409a591b7b634045eb4699e62a0e15409a21de06efc1b305d456d/analysis/1398514992/
  • https://www.virustotal.com/de/file/dd5bdccb831d1b19c505bd3e67553f6049cea2e20dba7eb231a02ed0103e521f/analysis/1398169420/
1.2
http://mawamalai.com/unsubscribe.php
  • https://www.virustotal.com/de/url/e46fa0421bfd53d4679c0d1fd2005a9b877cce218e9773c9302d4bacaa09cb1b/analysis/1398515065/
  • https://www.virustotal.com/de/file/baefeec3f91b70b39b03c556d29dd1ad4eff87fe7bb0ba91fc3b774e70089281/analysis/1397141557/
2.0 (AS YOU CAN SEE IN THE MAIL-SCREENSHOT)
http://b-unitd.com/9uy
  • https://www.virustotal.com/de/url/5509e6b6e3a8aea57a3d1f566f2823d2cfea8dc636069e390ac91a7de7985732/analysis/1398515235/
REDIRECTS TO:
http://tracker.regaloptions.com/9uy
  • https://www.virustotal.com/de/url/f264470eb6d29a18bd40c6451cf1a21ae7341a3db08bf4a34352c799c9cc7c95/analysis/1398515582/
REDIRECTS TO:
http://www.projekt95pro.com/?campaign=6739&ft=1&p=jsbfaeyJhIjoiMTAwODg4IiwiYyI6IjEzOTg1MTUyNjg2NzU0ODY5MDMifQ==
  • https://www.virustotal.com/de/url/9f7dbb1fb3caa99f8b80908ee4e17c5be0c176938a8953b5f58d66fbaf4c56a7/analysis/


HTML:
  • https://www.virustotal.com/de/file/876dfcc859ab841d81c38c7ae8195570475b176540797ace7223e0b2af998976/analysis/1398515488/

(FROM 2.0) OR TO !:
http://tracker.cedarfinance.com/
  • https://www.virustotal.com/de/url/b74481dafb943ce7417addb8795ca57b616850f4cb3b93950c215203b14f95ca/analysis/1398515998/
REDIRECTS TO:
https://www.cedarfinance.com/?ft=1
  • https://www.virustotal.com/de/url/89eb4f88e14c1c1b12a1ecdba00c72c4b360d70235b10b0db0a18437b79766ad/analysis/1398517210/

OTHER SUSPICIOUS LINK FROM mawamalai:
http://mawamalai.com/admin/includes/js/javascript.js
  • https://www.virustotal.com/de/url/f1d7cbde38ced99e4fc12d0265eeca61a5bdba41fd3aa60a8f04c36dc57b5e6c/analysis/1398516567/
PUA.JS.Xored
  • https://www.virustotal.com/de/file/40ea889122eaed21758c286ac2eb832a1f7263abc47e60f538e8360511c009be/analysis/
  • http://virusscan.jotti.org/de/scanresult/b14d12cc39c2a0ee18b3df555067046fdaa75169

4/24/2014

HEARTBLEED: Firmware Update for Apple Air-Port Devices

Apple has released firmware update 7.7.3 for AirPort Extreme and AirPort Time Capsule base stations with 802.11ac. The update addresses the OpenSSL "Heartbleed" vulnerability where an attacker may obtain memory contents.


The United States Computer Emergency Readiness Team recommends that users and administrators review Apple Security Update HT6203 and apply the necessary update at:

http://support.apple.com/kb/HT6203

For more details and recommended actions regarding the OpenSSL "Heartbleed" vulnerability please see TA14-098A and Heartbleed OpenSSL Vulnerability.pdf

http://www.us-cert.gov/ncas/alerts/TA14-098A

http://www.us-cert.gov/sites/default/files/publications/Heartbleed%20OpenSSL%20Vulnerability_0.pdf

FRENCH CASINO PHISHING:

"Jeux sur Internet - Prenez Votre B0nus"

positionstatus.com (IP: 68.66.55.34)
Spamhaus Listed (Hamilton, CANADA)


Rien n’est comparable aux B0NUS offerts
par Euroking et en vous joignant a
ses membres vous en recevrez une
multitude.

Ces Primes vous permettront de vous
eclater dans un environnement
fantastique et sur des tables superbes
ainsi que d’en gagner les cagnottes qui
sont, de l’avis de tous, parmi les plus
genereuses du web.

Ne laissez pas passer cette
opportunite de gagner une fortune et
venez vite vous mettre au jeu.

Accédez au site en cliquant là >>>

A tout de suite...


SPAM & PHISHING DOMAIN:
http://positionstatus.com/
  • https://www.virustotal.com/de/url/ebc6a370b83be39f4d86787a6d757c76985d3be66809969090d2649e5c49bd32/analysis/1398322886/
LISTED AT SPAMHAUS:
  • http://www.spamhaus.org/query/domain/positionstatus.com
LISTED AT SURBL:
  • http://www.surbl.org/lists
  • https://www.mywot.com/en/scorecard/positionstatus.com
--------------------------
http://positionstatus.com/link.php
  • https://www.virustotal.com/de/url/f7fe5bafd2152c3bc8ec03a8c332ba4217f6a95796ad0f7607967928f0e9c8fc/analysis/1398322918/
http://positionstatus.com/unsubscribe.php
  • https://www.virustotal.com/de/url/9d19b31ca3fbcad91c6becab677c0ba46f6c94c8d70addba06875d96c4d3302d/analysis/1398322961/

ORIGINATING IP:
http://68.66.55.34/
  • https://www.virustotal.com/de/url/e5e675654f7df2e537064f8f11def3aa257d8ffc9fc59f67eb193890731531a2/analysis/1398322996/
LISTED AT SPAMHAUS (SBL):
  • http://www.spamhaus.org/query/bl?ip=68.66.55.34
EMAIL-REP: POOR
WEB-REP: POOR
  • http://www.senderbase.org/lookup/?search_string=68.66.55.34

4/23/2014

MALICIOUS BLOGVISITOR FROM Hangzhou, CHINA
PHISHING:
billingcheckout.com (IP: 70.39.189.232) &
js.realypay.com (IP: 122.225.38.53)

DOMAIN 1:
China Telecomcenter
http://www.billingcheckout.com/
  • https://www.virustotal.com/de/url/d094721c14cdcebbee68aa9f08211ac1db05bee594e63e48667aaa6ba5c4ebcc/analysis/1398259763/ 
VISITING URL (on this BLOG)
http://www.billingcheckout.com/risk/index.js
  • https://www.virustotal.com/de/url/832c73b107ea273b0c1f89f78554f82c19824a74af820c6b71be41315ecaa39c/analysis/  
  • https://www.virustotal.com/de/file/dd6dc666f505f2f2d7664f13539a8dcb4537231c7350e0a468784da4035d7f64/analysis/1397057907/
IP:
China Telecomcenter
http://70.39.189.232/
  • https://www.virustotal.com/de/url/56f02705ec3f5dcf32c0f5b4d2f8371a514f2c2fb5c7f262b370c120e1171654/analysis/1398260122/ 
  • https://www.virustotal.com/de/ip-address/70.39.189.232/information/

REDIRECTS TO: --------------->  
(Reference See: http://wepawet.iseclab.org/view.php?hash=18cf2248ff8c66c0e25f36c34fc849d7&t=1392066256&type=js)

DOMAIN 2:
China Telecom Zhejiang
http://js.realypay.com/
  • https://www.virustotal.com/de/url/fe243629b072a3fbc0a2441bcbe6f47c5485ca2c5308e1d30e1623f2dc30bf82/analysis/1398261500/ 
REDIRECT LINK:
http://js.realypay.com/index2.js?ref=&url=http%3A%2F%2Fwww.billingcheckout.com%2Frisk%2Findex.js&w=1024&h=768&lx=IE7.0&auth=f2d9Pqacl20tqeAAq2ALsY7pxonRQq9w8T6J01rfr%2FNt98aDqte65aV%2FexcKt9mKFUYD3undAMCB   
  • https://www.virustotal.com/de/url/e717239f9c1ed65c250f8d024290d0f4605ba37a744495925135c67e970f5c7e/analysis/1398261822/
  • https://www.virustotal.com/de/file/0d23d902baf9638276780afdb9df44a26b748f775a350e1606b9472febee964f/analysis/1398261736/ 
IP:
China Telecom Zhejiang
http://122.225.38.53/
  • https://www.virustotal.com/de/url/5510f55d0eb200ce7673e5d94310cd473316d970a7d098c9c0df2541890b6fd6/analysis/1398262349/
  • https://www.virustotal.com/de/file/282c12070ea3254e26761b3dc58a7f342ac7e9f4c3b1f1630cf4d5c96bfce7de/analysis/1398262288/
  • https://www.virustotal.com/de/ip-address/122.225.38.53/information/

Category MALICIOUS IP: 203.153.99.142 (cds-id.com , dart.co.id)

"This IP is infected with a spam or malware forwarding link.
In other words the site has been hacked."


SPAMBOT & DICTIONARY ATTACKER
3 "Hacked" entries
46 "SPAM" entries
(INDONESIA)



The IP Address 203.153.99.142 is listed in the CBL (Composite Blocking List). This web site (IP) has a redirect that takes the user's browser to a spam or malware site. It's mainly fake russian pills or pornography.

The web server's host name is "www.dart.co.id", and this link has an example of the redirect: "http://www.dart.co.id/stylish.html?dijupiho".
http://www.dart.co.id/
  • https://www.virustotal.com/de/url/032f38a47d19c6c6e68793600ee7bdc011a82459e1a416079b208381566a4133/analysis/1398254023/
http://www.dart.co.id/stylish.html?dijupiho
  • https://www.virustotal.com/de/url/6f6fe170ab65546d0ee38ba507e945373c52e12d9de1b4edde3858dae7455fdd/analysis/1398254023/
Infected servers are usually shared web hosting environments running Cpanel, Plesk, Joomla or Wordpress CMS software that have become compromised either through a vulnerability (meaning the CMS software is out of date and needs patching), or users account information (userids/passwords) have been compromised, and malicious software/files are being uploaded by ftp or ssl.

We believe that these specific infections are frequently done by altering web server access control mechanisms (example, ".htaccess" files on Apache web servers), and causing the redirect to occur on all "404 url not found" errors. We would appreciate it if you can give us copies of the modifications that this infection has made to your system.



It probable that the change was made via SSL or ftp login using userid/password stolen from the "owner" of the hostname/domain. They should run anti-virus tools on their computers, and the password they use to access the web site should be changed immediately.

If you do not recognize the hostname www.dart.co.id as belonging to you, it means that some other account on this shared hosting site has been compromised, and there is NOTHING you (or we) can do to fix the infection. Only the administrator of this machine or the owner of www.dart.co.id can fix it.

--------------------------------------------------------------------------------------------------------------------------------------------

MALICIOUS IP FROM INDONESIA:
SPAMBOT, DICTIONARY ATTACKER
http://203.153.99.142/
  • https://www.virustotal.com/de/url/3eed7d8163d563a7f2cee883ca1b0627e6af286dcf89a63831ee311b14cb0f2f/analysis/1398250732/
  • https://www.virustotal.com/de/ip-address/203.153.99.142/information/
DOMAIN & HOSTNAME (See Senderbase as Reference):
http://cds-id.com/
  • https://www.virustotal.com/de/url/d58f4bda3839bea826584e8f98e3b0b1ed3ebeb72508f400a53770f60c1238af/analysis/1398252129/
HTML (406 Not Acceptable)
  • https://www.virustotal.com/de/file/390814aae53b4fe7b317f869b6bb97b242131cad27c8cdfd86e8ba70a677653f/analysis/1398252281/
NUMBER OF SPAM-MAILS RECEIVED FROM THIS IP: 174
DICTIONARY ATTACKS FROM THIS IP: 21
  • https://www.projecthoneypot.org/ip_203.153.99.142
LISTED AT SPAMHAUS (CBL):
  • http://www.spamhaus.org/query/bl?ip=203.153.99.142
LISTED AT CBL:
  • http://cbl.abuseat.org/lookup.cgi?ip=222.165.193.218&.pubmit=Lookup
LISTED AT SPAMCOP:

In the past 78.1 days, it has been listed 19 times for a total of 18.9 days

Causes of listing:
System has sent mail to SpamCop spam traps in the past week (spam traps are secret, no reports or evidence are provided by SpamCop)
  • http://spamcop.net/w3m?action=checkblock&ip=203.153.99.142
LISTED AT SORBS:
Current Listings (active)

  • 3 "Hacked" entries (01:08:09 16 Apr 2013 GMT)
  • 46 "Spam" entries (20:13:30 30 May 2013 GMT)
 
Historical Listings (inactive)
  • 22 "Spamvertised" entries (21:37:31 22 Apr 2013 GMT)
http://www.au.sorbs.net/lookup.shtml
LISTED AT CISCO SENDERBASE:

Fwd/Rev DNS Match: NO
EMAIL REP.: POOR
  • http://www.senderbase.org/lookup/?search_string=203.153.99.142
SEE ALSO:
NETCRAFT: 7/10
  • http://toolbar.netcraft.com/site_report?url=203.153.99.142

4/19/2014

RISKWARE: Win32/SecurityXploded.A from
securityxploded.com
(Windows Autorun Disable)


RISKWARE DETECTED:
Win32/SecurityXploded.A
http://securityxploded.com/download-file.php?id=1231
  • https://www.virustotal.com/de/url/3e6d1b6ccbf37664c71e92a76a4ccb23d6004d283541a19c51d50fa342b2a4a3/analysis/1397904253/
http://securityxploded.com/getfile_plus.php?id=1231
  • https://www.virustotal.com/de/url/34c9887456cdf35153f3a938a127e88fa06fb1c8c40f1ffe92a498d19ee58688/analysis/1397904283/
(WindowsAutorunDisable.zip) Win32/SecurityXploded.A
  • https://www.virustotal.com/de/file/45b799b53adf58fdd6ed78b9c2f59e4b3b9c929bf055becb5c83d9db57f2a609/analysis/1397904083/
(WindowsAutorunDisable.exe) Win32/SecurityXploded.A
  • https://www.virustotal.com/de/file/306da318050082d9e6b23120772f61aaaaac0fdcde0b10f3de6ab789c9c8ab94/analysis/1397904074/
  • http://zulu.zscaler.com/submission/show/a38523587f7f1912d01cea34d13e3782-1397904455
  • https://urlquery.net/report.php?id=1397904464200
IP:
http://64.150.191.172/
  • https://www.virustotal.com/de/url/774ec0fe019369938cf734a511ae4334b74f31e5c0202710934e0997df8a6e7f/analysis/

4/18/2014

Category MALICIOUS IP: 203.153.100.82

Infected with a spam sending trojan, proxy or some other form of botnet.
It HELOs as a bare IP address
(INDONESIA)

The IP Address 203.153.100.82 is listed in the CBL (Composite Blocking List). It appears to be infected with a spam sending trojan, proxy or some other form of botnet. It was last detected at 2014-04-18 18:00 GMT (+/- 30 minutes), approximately 1 hours ago.

It has been relisted following a previous removal at 2014-04-09 01:07 GMT (9 days, 17 hours, 55 minutes ago).

The listing of this IP is because it HELOs as a bare IP address (A bare ip address looks like: "54.33.33.5"). It is not HELO'ing as itself ("203.153.100.82"). Not only is this a violation of RFC2821/5321 section 4.1.1.1, it's even more frequently a sign of infection.




These listings are often a sign of a compromised SSH account. If you are running a SSH service (especially on Linux), please check your ssh server logs (often/var/log/auth.log) for logins from unusual IP addresses not normally associated with that login id. If you find any, secure the associated account. This usually means changing the password or disabling the account.

If it's a mail server, see naming problems for details on how to diagnose and fix the problem. If you are running Symantec Protection Center, this appeared to be a known issue in the past. See this Knowlege Base item. Their KB item was updated October 18, 2010 to indicate that they now understand the issue. The KB item indicates that the problem will be resolved in a "future build", but no ETA was provided. If you have SPC's email notification feature turned on, we recommend checking through the Knowledge Base item to see if your version has this issue fixed. If not we recommend turning SPC's notification feature off before delisting your IP address as a temporary workaround.

--------------------------------------------------------------------------------------------------------------------------------------------

MALICIOUS IP:




Heuristic.LooksLike.HTML.Suspicious-URL.K
SPAMBOTSERVER, COMMENT SPAMMER, DICTIONARY ATTACKER, MALWARE
http://203.153.100.82/
  • https://www.virustotal.com/de/url/4d0bf7e41c8dceaebbafa1bf0c70c8b1560a49ce397a92df5a1913a979f70f37/analysis/1397848027/
  • https://www.virustotal.com/de/ip-address/203.153.100.82/information/
Heuristic.LooksLike.HTML.Suspicious-URL.K
  • https://www.virustotal.com/de/file/8822bad3d62e9fbc8dc272644c42f81e4fec540ef7f05c9fd7bcaa26aee7a61b/analysis/
HOSTNAME:
http://ip-82-100-static.velo.net.id/
  • https://www.virustotal.com/de/url/85f9e6aa401e85da826c0d9590b8b671a24afac3000580f79754982b0f9ffadf/analysis/1397850756/

IP BLACKLISTED AT:
1) SPAMHAUS (CBL):
  • http://www.spamhaus.org/query/ip/203.153.100.82
2) COMPOSITE BLOCKING LIST:
  • http://cbl.abuseat.org/lookup.cgi?ip=203.153.100.82
3) SPAMCOP:
  • http://www.spamcop.net/w3m?action=checkblock&ip=203.153.100.82
4) CISCO SENDERBASE:
  • http://www.senderbase.org/lookup/?search_string=203.153.100.82
5) BLOCKLIST.DE:
  • http://www.blocklist.de/en/view.html?ip=203.153.100.82
6) PSBL.ORG:
  • http://psbl.org/listing?ip=203.153.100.82
7) WPBL.INFO:
  • http://www.wpbl.info/cgi-bin/detail.cgi?ip=203.153.100.82
8) PROJECT HONEYPOT:
  • https://www.projecthoneypot.org/ip_203.153.100.82
9) SORBS:
  • http://www.au.sorbs.net/lookup.shtml
10) NiX SPAM:
  • http://www.dnsbl.manitu.net/lookup.php?language=en&value=203.153.100.82
------------------------------------------

SEE ALSO:
  • https://urlquery.net/report.php?id=1397848399616
  • http://zulu.zscaler.com/submission/show/0d60892bc9e925ace8bf7a1c422b7358-1397848147
http://203.153.100.82/winbox/winbox.exe
  • https://www.virustotal.com/de/url/2e48031a59a5f99f23b91508988285232203405cb8640f3c8c40c24e1a702284/analysis/1397848218/
  • https://www.virustotal.com/de/file/eabfa1fd55a53367b901364486f5a5607b9ab04ad94403b7d0fc12509ad85321/analysis/

Obama.exe: Hoax.Win32.BadJoke.Agent.nlz
NEW MALWARE CODE found @ demonx.org

(IP: 70.32.97.245 - UNITED STATES)


MALICIOUS LINK:

http://demonx.org/Obama.exe
  • https://www.virustotal.com/de/url/32cdf34a986b807db7b0fddd2acb3214f4c4ee0a8b00e07802504fbcb083e27f/analysis/1397739518/
Hoax.Win32.BadJoke.Agent.nlz
  • https://www.virustotal.com/de/file/0be76fb84d1b6f4fae6b5f38d4d5f58fcfd313fe6b48e9a1a5c5f17f6dab280c/analysis/1397739348/

4/17/2014

Comment SPAMMER: 37.59.88.251 = Malicious IP from Roubaix, France



MALICIOUS IP: COMMENT SPAMMER (FRANCE)
FOUND ON A CnC BOTSERVER ROUNDUP LIST

IP seen with 30 user-agents
21 web post submissions sent from this IP
  • https://www.projecthoneypot.org/ip_37.59.88.251
http://37.59.88.251/
  • https://www.virustotal.com/de/url/8054a21ddb8f63f903b056ccad3527d3ebc27bdb9799de478cb0b5cdf3aad5b4/analysis/1397725938/
  • https://www.virustotal.com/de/ip-address/37.59.88.251/information/
https://www.virustotal.com/de/file/f85e4b5b4089a91599c87da17d10eba5c1535fcc83fce58231b85cbf55bd376d/analysis/1397726108/

4/16/2014

Illegal gambling over the Internet 2011/2012:
William Lisle, 57, and Kenneth B. Lovett, 72 of Joplin, Missouri Sentenced

Was Dürer a Gambler...?

William Lisle, 57, of Joplin, MISSOURI, was sentenced on October 31st, 2012, by U.S. District Judge Richard E. Dorr to two years of probation (including six months of home detention) and ordered to pay a fine of 2.000 USD. As a condition of his probation, Lisle may not enter any gambling establishment or engage in any type of gambling, including off-shore or Internet gambling. Lisle must forfeit to the government almost 100.000 USD (98.263 USD) that was seized from his residence by law enforcement, which was the proceeds of gambling activity.

Judge Dorr
Co-defendant Kenneth B. Lovett, 72, also of Joplin, received the same sentence on October 18th, 2012.

Lisle and Lovett each pleaded guilty to using the Internet to transmit wagering information, including placing bets on sporting events, as part of their gambling business from January 1st, 2003, until to February 8th, 2011. Lovett, who was primarily engaged in wagering on National Football League events, took on Lisle as a partner in 2006. Lisle and Lovett shared income and expenses equally until 2010, when Lisle’s share of income and expenses increased to 60 percent.

Lisle and Lovett utilized two Internet websites, with servers located in Costa Rica, to administer the bookmaking operation. Their gambling operation flourished when they began using the off shore gambling Web sites in 2006. The number of their customers and the amounts they wagered increased. For example, according to the plea agreement, one gambler would wager as much as 35.000 USD on a single weekend during the American football season.

Lisle also pleaded guilty to money laundering. Lisle sent cashier’s checks, payable to a false name in an effort to conceal the transfer, to the Costa Rican company that operated the websites. Lisle’s plea agreement cites 15 instances in which he sent cashier’s checks (totaling 72.000 USD) to Costa Rica via Federal Express as part of his scheme to launder money obtained from the gambling enterprise.

SOURCE: http://www.highbeam.com/

PUA.Phishing.Bank @ www.sinaafra.com
PHISHING URLs FROM Sanayi, TURKEY
(IP: 212.68.50.31)

PHISHING LINKS: 
PUA (PHISHBANK)

DOMAIN:
http://www.sinaafra.com/
  • https://www.virustotal.com/de/url/918c5ec31a6f15e91d44cd1aa9cd40efa5b93e44dac77b212f4faf471d9f8894/analysis/1397667269/
PHISHING URLs:
1)
http://www.sinaafra.com/detroit-ve-istanbul-aslinda-birbirine-cok-yakin
  • https://www.virustotal.com/de/url/7ffa8b6b95e71ee3cac62063009b0d0f70c9f0f1770070208d9e8fa772895682/analysis/1397667413/
PUA.Phishing.Bank
  • https://www.virustotal.com/de/file/b0be1f8cf908f6ac5e508c4d1a0386c890193655bd419c4b88a74cfbda37f483/analysis/1397666858/
  • http://virusscan.jotti.org/de/scanresult/f439c8d1c4cdf2efb3ae8c6b4448ed0175c1f538

2)
http://www.sinaafra.com/sosyal-ticaretin-kirilma-noktasi-daha-ufukta-gozukmuyor
  • https://www.virustotal.com/de/url/e40dd9a4b165bd4a8e274017f30c18141289ca4d5aec039424874af6788a490d/analysis/1397667642/
PUA.Phishing.Bank
  • https://www.virustotal.com/de/file/d60d5d52ffbd6bf038b5dc5ba8b6ef004a4914a68dd6d2b9f7928f3880af1e09/analysis/1397667089/
  • http://virusscan.jotti.org/de/scanresult/1904fa37af41fe728a89a251a6097700ffc3e3d7
IP:
http://212.68.50.31/  (Sanayi, TURKEY)
  • https://www.virustotal.com/de/url/8741b7d59e97bedf742d7fe933fa278819d651ba8d295931f093146c3a8f5e6e/analysis/1397668079/
  • https://www.virustotal.com/de/ip-address/212.68.50.31/information/

UPDATES: Massive (Java) Oracle Critical Patch Update Advisory - April 2014

 

Description

A Critical Patch Update (CPU) is a collection of patches for multiple security vulnerabilities. Critical Patch Update patches are usually cumulative, but each advisory describes only the security fixes added since the previous Critical Patch Update advisory. Thus, prior Critical Patch Update advisories should be reviewed for information regarding earlier published security fixes. Please refer to:
Critical Patch Updates and Security Alerts for information about Oracle Security Advisories.
Due to the threat posed by a successful attack, Oracle strongly recommends that customers apply CPU fixes as soon as possible. This Critical Patch Update contains 104 new security fixes across the product families listed below.

Please note that a blog entry summarizing the content of this Critical Patch Update and other Oracle Software Security Assurance activities is located at https://blogs.oracle.com/security.
This Critical Patch Update advisory is also available in an XML format that conforms to the Common Vulnerability Reporting Format (CVRF) version 1.1. More information about Oracle's use of CVRF is available at: http://www.oracle.com/technetwork/topics/security/cpufaq-098434.html#CVRF.

Affected Products and Components

Security vulnerabilities addressed by this Critical Patch Update affect the products listed in the categories below.  The product area of the patches for the listed versions is shown in the Patch Availability column corresponding to the specified Products and Versions column.   Please click on the link in the Patch Availability column below or in the Patch Availability Table to access the documentation for those patches.

For further Information, go to:

The ingredients are:
2 for Oracle Database Server
20 for Oracle Fusion Middleware
  3 for Oracle Hyperion
10 for Oracle Supply Chain Products Suite
  8 for Oracle PeopleSoft Products
  1 for Oracle Siebel CRM
  1 for Oracle iLearning
37 for Oracle Java SE
  3 for Oracle and Sun Systems Products Suite
  5 for Oracle Virtualization
14 for Oracle MySQL