Saturday, December 26, 2009

The Koobface Gang Wishes the Industry "Happy Holidays"



Oops, they did it again - the Koobface gang, which is now officially self-describing itself as Ali Baba and the 40 Thieves LLC, has not only included a Koobface-themed -- notice the worm in the name -- background on Koobface-infected hosts, but it has also included a "Wish Koobface Happy Holidays" script -- last time I checked there were 10,000 people who clicked it -- followed by the most extensive message ever left by the gang, which is amusingly attempting to legitimize the activities of the gang.



In short, the message with clear elements of PSYOPS, attempts to position the Koobface worm as a software, where the new features are requested by users, and that by continuing its development, the authors are actually improving Facebook's security systems. For the record, the Koobface botnet itself is only the tip of the iceberg for the malicious activities the group itself is involved in. Consider going through the related Koobface research posts featured at the bottom of the post, in order to grasp the importance of how widespread and high-profile the activities of this group are. The exact message, screenshot of which is attached reads:

Our team, so often called "Koobface Gang", expresses high gratitude for the help in bug fixing, researches and documentation for our software to:
  • Kaspersky Lab for the name of Koobface and 25 millionth malicious program award;
  • Dancho Danchev (http://ddanchev.blogspot.com) who worked hard every day especially on our First Software & Architecture version, writing lots of e-mails to different hosting companies and structures to take down our Command-and-Control (C&C) servers, and of course analyzing software under VM Ware;
  • Trend Micro (http://trendmicro.com), especially personal thanks to Jonell Baltazar, Joey Costoya, and Ryan Flores who had released a very cool document (with three parts!) describing all our mistakes we've ever made;
  • Cisco for their 3rd place to our software in their annual "working groups awards";
  • Soren Siebert with his great article; 
  • Hundreds of users who send us logs, crash reports, and wish-lists.
In fact, it was a really hard year. We've made many efforts to improve our software. Thanks to Facebook's security team - the guys made us move ahead. And we've moved. And will move. Improving their security system.

By the way, we did not have a cent using Twitter's traffic. But many security issues tell the world we did. They are wrong. As many people know, "virus" is something awful, which crashes computers, steals credential information as good as all passwords and credit cards. Our software did not ever steal credit card or online bank information, passwords or any other confidential data. And WILL NOT EVER. As for the crashes... We are really sorry. We work on it :) Wish you a good luck in new year and... Merry Christmas to you!

Always yours, "Koobface Gang
".

For the record, in case you were living on the other side of the universe, and weren't interested in the raw details taking place within the underground ecosystem, in July, 2009, I was the only individual ever mentioned by the Koobface gang, which back then included the following message within the command and control infrastructure for 9 days:
  • "We express our high gratitude to Dancho Danchev (http://ddanchev.blogspot.com) for the help in bug fixing, researches and documentation for our software."
Next to the folks at TrendMicro, the DHS also featured the event in DHS Daily Open Source Infrastructure Report for 3 September 2009 at page 18:
  • "This individual is an independent security consultant who plays an active role in tracking and shutting down botnets and other illegal operations."
It got ever more personal when the Koobface gang redirected Facebook's entire IP space to my blog in October, 2009, resulting in thousands of Facebook visits every time their crawlers were visiting a Koobface-infected host. Thankfully, Facebook's Security Incident Response Team quickly took care of the issue.

In the spirit of Christmas, I'd also like to wish the Koobface gang happy holidays, and promise them that the cherry on the top of the research pie will see daylight anytime soon. First of all, I'd like to wish them happy holidays with Frank Sinatra - "I've got you under my skin". They'll get the point.



And now comes my Christmas present, systematic take-down, blacklisting, and domain suspension of Koobface scareware operations.


Sample detection rates by Koobface binaries - go.exe; fb.79.exe; fblanding.exe; v2captcha.exe; v2webserver.exe; pack_312s3.exe (the scareware). The currently active artificial2010 .com/?pid=312s02&sid=4db12f - Email: Josefinat@yahoo.com - 193.104.22.200 - AS34305; EUROACCESS Global Autonomous System acts as a redirector to the scareware domain portfolio.

Currently active portfolio of scareware domains pushed by the Koobface botnet, parked at 193.104.22.200/91.212.226.95:
2010scannera1 .com - Email: NathanHSchafer@yahoo.com
artificial2010 .com - Email: Josefinat@yahoo.com
bestdiscounts2010 .com - Email: FrancesHAustin@yahoo.com
bestparty2009 .com - Email: FrancesHAustin@yahoo.com
bestparty2010 .com - Email: FrancesHAustin@yahoo.com
bestpffers2010 .com - Email: FrancesHAustin@yahoo.com
best-wishes-design .com - Email: FrancesHAustin@yahoo.com
bestyearparty .com - Email: FrancesHAustin@yahoo.com
celebrate2009year .com - Email: FrancesHAustin@yahoo.com
celebrate-designs .com - Email: FrancesHAustin@yahoo.com
happy-newyear2010 .com - Email: JerryHWallace@yahoo.com
internetproscanm .com - Email: JacquelynMRyan@yahoo.com
internetproscanq .com - Email: JacquelynMRyan@yahoo.com
internetproscanr .com - Email: JacquelynMRyan@yahoo.com
internetproscanw .com - Email: JacquelynMRyan@yahoo.com
internetproscany .com - Email: JacquelynMRyan@yahoo.com
megascannera .com - Email: MichaelDFranklin@yahoo.com
megasecurityl .com - Email: MichaelDFranklin@yahoo.com
megasecurityp .com - Email: MichaelDFranklin@yahoo.com
megasecurityq .com - Email: MichaelDFranklin@yahoo.com
newholidaydesigns .com - Email: FrancesHAustin@yahoo.com
newyearandsanta .com - Email: JerryHWallace@yahoo.com
newyeardesgings .com - Email: FrancesHAustin@yahoo.com
onlinesecurityn1 .com - Email: LucyGBrown@yahoo.com
onlinesecurityn2 .com - Email: LucyGBrown@yahoo.com
onlinesecurityn3 .com - Email: LucyGBrown@yahoo.com
onlinesecurityn4 .com - Email: LucyGBrown@yahoo.com
onlinesecurityn5 .com - Email: LucyGBrown@yahoo.com
online-securtiyv1 .com - Email: LucyGBrown@yahoo.com
online-securtiyv4 .com - Email: LucyGBrown@yahoo.com
online-securtiyv5 .com - Email: LucyGBrown@yahoo.com
onlineviruskilla0 .com - Email: JacquelynMRyan@yahoo.com
onlineviruskilla2 .com - Email: JacquelynMRyan@yahoo.com
onlineviruskilla4 .com - Email: JacquelynMRyan@yahoo.com
onlineviruskilla6 .com - Email: JacquelynMRyan@yahoo.com
onlineviruskilla8 .com - Email: JacquelynMRyan@yahoo.com
santa-christmas2010 .com - Email: JerryHWallace@yahoo.com
snowandchristmas .com - Email: JerryHWallace@yahoo.com
thebestantispys .com - Email: ThomasLRoy@yahoo.com

Christmas-themed scareware serving domains:
happy-newyear2010 .com
celebrate2009year .com
newyearandsanta .com
newyeardesgings .com
santa-christmas2010 .com
snowandchristmas .com


Speaking of AS34305; EUROACCESS Global Autonomous System, they're also hosting scareware campaigns at another IP - 193.104.22.50 in particular:
pcprotect2010 .com - Email: admin@pcprotect2010.com
bestantispysoft2010 .com - Email: admin@bestantispysoft2010.com
worldantispyware1 .com - Email: admin@worldantispyware1.com
antispyware24x7 .com - Email: admin@antispyware24x7.com
spydetector2009 .com - Email: admin@spydetector2009.com
myprivatesoft2009 .com - Email: admin@myprivatesoft2009.com
itsafetyonline .com - Email: admin@itsafetyonline.com
antispycenterprof .com - Email: admin@antispycenterprof.com
webspydetectunlim .com - Email: admin@webspydetectunlim.com
pcsafetyplatinum .com - Email: admin@webspydetectunlim.com
spywaredetect24pro .com - Email: admin@spywaredetect24pro.com
eliminater2009pro .com - Email: admin@eliminater2009pro.com
pcsafety2009pro .com - Email: admin@pcsafety2009pro.com
securityztop .com - Email: admin@securityztop.com
antisspywarescenter .com - Email: admin@antisspywarescenter.com
viridentifycenter .com - Email: molda444vimo@safe-mail.net
antispywarets .com - Email: admin@antispywarets.com
winvantivirus .com - Email: admin@winvantivirus.com
antispywaresnet .com - Email: admin@antispywaresnet.com
securityprosoft .com - Email: admin@securityprosoft.com
onlineantispysoft .com - Email: admin@onlineantispysoft.com
worldsantispysoft .com - Email: admin@worldsantispysoft.com
antispyworldwideint .com - Email: admin@antispyworldwideint.com
ivirusidentify .com - Email: admin@ivirusidentify.com

Within the same ASN, we can also find the following Zeus crimeware serving domains, courtesy of the Zeus Tracker:
print-design .cn - Email: alexsundren@gmail.com
backup2009 .com - Email: tahli@yahoo.com - association with money mule recruitment domain registration
1211news .com - Email: tahli@yahoo.com
tuttakto .com - Email: tahli@yahoo.com
filatok .com - Email: tahli@yahoo.com
wwwldr .com - Email: tahli@yahoo.com
bbbboom .com - Email: tahli@yahoo.com
fant1k .com - Email: tahli@yahoo.com
hoooools .com - Email: tahli@yahoo.com
ianndex .com - Email: tahli@yahoo.com
vklom .com - Email: tahli@yahoo.com
wwwbypost .com - Email: tahli@yahoo.com
wwwudacha .com - Email: tahli@yahoo.com

Sampled scareware phones back to:
ardeana-couture .com/?b=1s1 - 204.12.252.99, parked there is also windowssp3download .com - Email: contact@subarutechs.com
winrescueupdate .com/download/winlogo.bmp - 89.248.162.147

Historically, 89.248.162.147 (AS29073-ECATEL-AS, Ecatel Network) used to host the following scareware domains:
attention-scanner .com - Email: khouri@atomtech.cc
be-secured2 .com - Email: info@scholarnyc.com
best-scanner-f .com - Email: LouisALeavitt@yahoo.com
get-secure2 .com - Email: info@scholarnyc.com
installprotection2 .com - Email: info@scholarnyc.com
online-defense7 .com - Email: contacts@manipadni.com.br
scan-spyware2 .com - Email: info@paristours.fr
topscan2 .com - Email: LouisALeavitt@yahoo.com
topscan3 .com - Email: LouisALeavitt@yahoo.com
virus-pcscan .com - Email: admin@rewards.de
win-scan05 .com - Email: katia@salsat.eu
win-scan07 .com - Email: katia@salsat.eu
win-scan09 .com - Email: katia@salsat.eu
winrescueupdate .com
winscanner01 .com - Email: contacts@crunchiesb.com
winscanner18 .com - Email: contacts@crunchiesb.com
your-protection8 .com - Email: admin@Relocation.it

Happy Holidays, too!

Related Koobface research published in 2009:
Koobface-Friendly Riccom LTD - AS29550 - (Finally) Taken Offline
Koobface Botnet Starts Serving Client-Side Exploits
Massive Scareware Serving Blackhat SEO, the Koobface Gang Style
Koobface Botnet's Scareware Business Model - Part Two
Koobface Botnet's Scareware Business Model - Part One
Koobface Botnet Redirects Facebook's IP Space to my Blog
New Koobface campaign spoofs Adobe's Flash updater
Social engineering tactics of the Koobface botnet
Koobface Botnet Dissected in a TrendMicro Report
Movement on the Koobface Front - Part Two
Movement on the Koobface Front
Koobface - Come Out, Come Out, Wherever You Are
Dissecting Koobface Worm's Twitter Campaign

This post has been reproduced from Dancho Danchev's blog. 

Tuesday, December 22, 2009

Koobface-Friendly Riccom LTD - AS29550 - (Finally) Taken Offline



Last week, Josh Kirkwood, Network Engineer at Blue Square Data Group Services Limited, with whom I've been keeping in touch regarding the blackhat SEO activity courtesy of the Koobface gang, and actual Koobface botnet activity that's been taking place there for months, pinged me with an interesting email - "Riccom are now gone" (AS29550). He also pinged the folks at hpHosts in response to their posts once again emphasizing on the malicious activity taking place there.

Since I've been analyzing Riccom LTD activity in the context of "in-the-wild" blackhat SEO campaigns launched by the Koobface gang, followed by establishing direct Koobace botnet connections, as well as sharing data with Josh, Riccom LTD clearly deserves a brief  retrospective of the malicious activity that took place there.

Malicious activity I've been analyzing since August, 2009:
Clearly, in terms of cybercrime, especially one that's monetizing an asset with high liquidity such as scareware, "better late than never" doesn't seem to sound very appropriate.

Image courtesy of TrendMicro's The Heart of Koobface - C&C and Social Network Propagation report.

Related Koobface research published in 2009:
Koobface Botnet Starts Serving Client-Side Exploits
Massive Scareware Serving Blackhat SEO, the Koobface Gang Style
Koobface Botnet's Scareware Business Model - Part Two
Koobface Botnet's Scareware Business Model - Part One
Koobface Botnet Redirects Facebook's IP Space to my Blog
New Koobface campaign spoofs Adobe's Flash updater
Social engineering tactics of the Koobface botnet
Koobface Botnet Dissected in a TrendMicro Report
Movement on the Koobface Front - Part Two
Movement on the Koobface Front
Koobface - Come Out, Come Out, Wherever You Are
Dissecting Koobface Worm's Twitter Campaign

This post has been reproduced from Dancho Danchev's blog.

Wednesday, November 25, 2009

Koobface Botnet Starts Serving Client-Side Exploits


UPDATED, Wednesday, December 02, 2009: The systematic rotation of new redirectors and scareware domains remains ongoing, with no signs of resuming the use of client-side exploits.

Some of the latest ones include inviteerverwhere .cn - Email: box@cethcuples.com -> scanner-infoa .com - Email: inout@celestia.com, scareware detection rate; 1economyguide .cn - Email: contact@berussa.de -> superdefenceaj .com - Email: inout@celestia.com, scareware detection rate; slip-stream .cn - Email: info@mercedess.de -> getsafeantivirusa .com - Email: morrison2g@yahoo.com, scareware detection rate.

The complete list of redirectors introduced over the past week is as follows: 1economyguide .cn; 1monocline .cn; 1nonsensical .cn; 1onlinestarter .cn; 1political-news .cn; argentinastyle .cn; australiagold .cn; austriamoney .cn; beatupmean2 .cn; belgiumnation .cn; brazilcountry .cn; firefoxfowner .cn; inviteerverwhere .cn; iraqcontacts .cn; makenodifference2 .cn; manualgreese .cn; overmerit3 .cn; powerhelms2 .cn; secretalltrue2 .cn; separator2009 .cn; slip-stream .cn; solidresistance .cn; wallgreensmart .cn; windowsclone .cn; womenregrets .cn; womenregrets2 .cn

UPDATED, Saturday, November 28, 2009: Following yesterday's experiment with bit.ly redirectors, relying on a "visual social engineering element" by adding descriptive domains after the original link -- bit.ly/588dmE?YOUTUBE.COM/ea05981d43, which works with any generated bit.ly link, the gang is now spamvertising links using Google News redirection to automatically registered Blogspot accounts, whose CAPTCHA challenge has been solved by the already infected with Koobface victims, a feature that is now mainstream, compared to the gang's previous use of commercial CAPTCHA solving services, where the price for a thousand solved CAPTCHAs varies between $1 and $2:

- news.google.com/news/url?url=http://pierrickcastoe .blogspot.com/
- news.google.com/news/url?url=http://biilybiilybangert .blogspot.com/
- news.google.com/news/url?url=http://majdimajdinoordijk .blogspot.com/
- news.google.com/news/url?url=http://vassellpelovska .blogspot.com/
- news.google.com/news/url?url=http://troitroiweinbrenner .blogspot.com/
- news.google.com/news/url?url=http://keyserefrain .blogspot.com/


New redirectors introduced include:
overmerit3 .cn - Email: admin@cryzisday.com
belgiumnation .cn - Email: vesta@greaselive.au
iraqcontacts .cn - Email: admin@resemm.de
womenregrets .cn - Email: admin@resemm.de
wallgreensmart .cn - Email: admin@cryzisday.com
brazilcountry .cn - Email: vesta@greaselive.au
womenregrets2 .cn - Email: in@groovezone.com

News scareware domains introduced include:
internetdefencesystem .com - Email: admin@wyverny.com
royalsecure-a1 .com - Email: in@groovezone.com
royaldefencescan1 .com - Email: in@groovezone.com
royaldefensescan1 .com - Email: in@groovezone.com
royaldefencescan .com - Email: contacts@esseys.au
royaldefensescan .com - Email: contacts@esseys.au
royalprotectionscan .com - Email: contacts@esseys.au

Sampled copy phones back to a new domain (austin2reed .com/?b=1s1; austin2reed .com/?b=1) using the same IP (92.48.119.36) as the previous phone-back domain.

UPDATED, Thursday, November 26, 2009: The gang has currently suspended the use of client-side exploits, let's see if it's only for the time being or indefinitely. Scareware is whatsoever, introduced with periodically registered new domains - argentinastyle .cn - Email: vesta@greaselive.au and australiagold .cn - Email: vesta@greaselive.au, redirect to bestscan066 .com - Email: fransysles2@yahoo.com and to bestscan044 .com - Email: fransysles2@yahoo.com - detection rate.

The exploit serving domains (el3x .cn; kiano-180809 .com and ttt20091124 .info) remain active.

The Koobface botnet, a case study on propagation relying exclusively on social engineering tactics and systematic abuse of legitimate Web 2.0 services, has introduced a second "game-changer" next to the migration to distributed command and control infrastructure once its centralized operations got shut down.

Next to the embedded and automatically rotating scareware redirects placed on each and every infected host part of the Koobface botnet, the gang behind it has now started officially using client-side exploits (VBS/Psyme.BM; Exploit.Pidief.EX; Exploit.Win32.IMG-WMF etc.) by embedding two iFrames on all the Koobface-infected hosts (Underground Molotov - function molot (m)), which connect to a well known (average) web malware exploitation kit's interface. Not only would a user that clicks on the Koobface URL be exposed to the Koobface binary itself, now pushed through client-side exploits, but also, to the periodically changed scareware domains.

Let's dissect the campaign, expose the entire domains portfolio involved or introduced since the beginning of the week, and once again establish a connection between the Koobface gang and money mule recruitment scams followed by scareware domains (Inst_312s2.exe; Inst_312s2.exe from today, both of them phone back to angle-meter .com/?b=1), all registered using the same emails.

Scareware redirectors seen during the past couple of the days, parked at 91.213.126.250:
solidresistance .cn - Email: admin@cryzisday.com
separator2009 .cn - Email: admin@cryzisday.com
zapotec2 .cn - Email: admin@cryzisday.com
befree2 .cn - Email: gmk2000@yahoo.com
entombing2009 .cn - Email: info@grindsteal.fr
economyguide .cn - Email: info@plaguegr.de
smile-life .cn - Email: gmk2000@yahoo.com
everlastmovie .cn - Email: gmk2000@yahoo.com
monocline .cn - Email: info@plaguegr.de
mozzillaclone .cn - Email: sanbeans6@yahoo.com
monkey-greese .cn - Email: sanbeans6@yahoo.com
surgingnurse .cn - Email: info@grindsteal.fr
mailboxinvite .cn - Email: sanbeans6@yahoo.com
flatletkick .cn - Email: info@plaguegr.de
nonsensical .cn - Email: info@grindsteal.fr
moralisefilm .cn - Email: info@grindsteal.fr
firefoxavatar .cn - Email: sanbeans6@yahoo.com
onlinestarter .cn - Email: info@plaguegr.de
clowncirus .cn - Email: sanbeans6@yahoo.com
political-news .cn - Email: info@plaguegr.de
harry-pott .cn - Email: gmk2000@yahoo.com
repeatability .cn - Email: info@grindsteal.fr

New scareware domains portfolio parked at 95.143.192.51; 83.133.119.84; 91.213.126.103:
valuewebscana .com - Email: lynd.stafford@yahoo.com
valuescana .com - Email: lynd.stafford@yahoo.com
cyber-scan-1 .com - Email: admin@dedicatezoom.com
yourantispy-1 .com - Email: shah_indigo@googlemail.com
cyber-scan011 .com - Email: admin@dedicatezoom.com
cyber-scan-2 .com - Email: admin@dedicatezoom.com
antimalware-3 .com - Email: shah_indigo@googlemail.com
yourmalwarescan3 .com - Email: shah_indigo@googlemail.com
antimalwarescana4 .com - Email: j.wirth@smsdetective.com
today-scan4 .com - Email: millercall413@yahoo.com
antispy-scan5 .com - Email: shah_indigo@googlemail.com
yourantivira7 .com - Email: j.wirth@smsdetective.com
yourmalwarescan7 .com - Email: info@bellyn.com
yourantispy-8 .com - Email: info@bellyn.com
cyber-scan08 .com - Email: admin@dedicatezoom.com
cyber-scan09 .com - Email: admin@dedicatezoom.com
beprotected9 .com - Email: essi@calinsella.eu
spyware-scan9 .com - Email: info@bellyn.com
yourantispy-a .com - Email: shah_indigo@googlemail.com
checkforspywarea .com - Email: sanbeans6@yahoo.com
checkfilesherea .com - Email: sanbeans6@yahoo.com
scanfilesherea .com - Email: sanbeans6@yahoo.com
findprotectiona .com - Email: admin@wyverny.com
checkfilesnowa .com - Email: sanbeans6@yahoo.com
web-scanm .com - Email: essi@calinsella.eu
today-scann .com - Email: essi@calinsella.eu
4eay-protection .com - Email: millercall413@yahoo.com

The client-side exploit redirection takes place through three separate domains, all involved in previous Zeus crimeware campaigns, parked on the same IP in a cybercrime-friendly ASN. For instance, el3x.cn/test13/index.php - 210.51.166.119 - Email: Exmanoize@qip.ru redirects to el3x.cn/test13/x.x -> el3x.cn/test13/pdf.php -> el3x.cn/test13/load.php?spl=javad -> el3x.cn/test13/soc.php using VBS/Psyme.BM; Exploit.Pidief.EX; Exploit.Win32.IMG-WMF etc. pushing load.exe, which phones back to a well known "leftover" from Koobface botnet's centralized infrastructure - xtsd20090815 .com/adm/index.php.

Now it gets even more interesting, with the Koobface gang clearly rubbing shoulders with authors of actual web malware exploitation kits, who diversify their cybercrime operations by participating in money mule recruitment scams, zeus crimeware serving campaigns, and scareware.

Parked on 210.51.166.119 where the first iFrame is hosted, are also the following domains participating in related campaigns:
amer0test0 .cn - Email: abusehostserver@gmail.com -> money mule recruitment
antivirusfreec0 .cn - Email: abusehostserver@gmail.com -> money mule recruitment 
arendanomer2 .cn - Email: Exmanoize@qip.ru
dom0cn .cn - Email: Exmanoize@qip.ru
dom1cn .cn - Email: Exmanoize@qip.ru
dom2cn .cn - Email: Exmanoize@qip.ru
domx0 .cn - Email: Exmanoize@qip.ru
domx1 .cn - Email: Exmanoize@qip.ru
domx2 .cn - Email: Exmanoize@qip.ru
dox0 .cn - Email: Exmanoize@qip.ru
dox1 .cn - Email: Exmanoize@qip.ru
dox2 .cn - Email: Exmanoize@qip.ru
dox3 .cn - Email: Exmanoize@qip.ru
edit2china .cn - Email: Exmanoize@qip.ru
edit3china .cn - Email: Exmanoize@qip.ru
el1x .cn - Email: Exmanoize@qip.ru
el2x .cn - Email: Exmanoize@qip.ru
el3x .cn - Email: Exmanoize@qip.ru
gym0replace .cn - Email: chen.poon1732646@yahoo.com -> scareware domain registration
herosima1yet .cn - Email: Exmanoize@qip.ru
herosima1yet00g .cn - Email: abusehostserver@gmail.com
otherchina .cn - Email: Exmanoize@qip.ru
parliament .tk - Email: royalddos@gmail.com
privet1 .cn - Email: Exmanoize@qip.ru
privet2 .cn - Email: Exmanoize@qip.ru
privet3 .cn - Email: Exmanoize@qip.ru
sport-lab .cn - Email: abuseemaildhcp@gmail.com -> money mule recruitment domain registrations
trafdomins .cn - Email: Exmanoize@qip.ru

The second iFrame domain parked at 61.235.117.83 redirects in the following way - kiano-180809 .com/oko/help.html - 61.235.117.83 - Email: bigvillyxxx@gmail.com leads to kiano-180809 .com/oko/dyna_soc.html -> kiano-180809 .com/oko/tomato_guy_13.html -> kiano-180809 .com/oko/update.vbe -> kiano-180809 .com/oko/dyna_wm.wmf.

The same exploitation structure is valid for the third iFrame domain - ttt20091124 .info/oko/help.html which is again, parked at 61.235.117.83 and was embedded at Koobface-infected hosts over the past 24 hours.

What prompted this shift on behalf of the Koobface gang? Declining infection rates -- I'm personally not seeing a decline in the click-through rate, with over 500 clicks on a spamvertised Kooobface URL over a period of 24 hours -- or their obsession with traffic optimization? In terms of social engineering, the periodic introduction of new templates proved highly successful for the gang, but the newly introduced outdated client-side exploits can in fact generate more noise than they originally anticipated, if they were to continue relying on social engineering vectors only.

One thing's certain - the Koobface gang is now on the offensive, and it would be interesting to see whether they'd introduce a new exploits set, or continue relying on the one offered by the web exploitation kit.

Related posts:
Secunia: Average insecure program per PC rate remains high
Research: 80% of Web users running unpatched versions of Flash/Acrobat
Fake Security Software Domains Serving Exploits
Massive Scareware Serving Blackhat SEO, the Koobface Gang Style
Koobface Botnet's Scareware Business Model - Part Two
Koobface Botnet's Scareware Business Model - Part One
Koobface Botnet Redirects Facebook's IP Space to my Blog
New Koobface campaign spoofs Adobe's Flash updater
Social engineering tactics of the Koobface botnet
Koobface Botnet Dissected in a TrendMicro Report
Koobface Botnet's Scareware Business Model
Movement on the Koobface Front - Part Two
Movement on the Koobface Front
Koobface - Come Out, Come Out, Wherever You Are
Dissecting Koobface Worm's Twitter Campaign
Dissecting the Koobface Worm's December Campaign
Dissecting the Latest Koobface Facebook Campaign 
The Koobface Gang Mixing Social Engineering Vectors

This post has been reproduced from Dancho Danchev's blog.

Tuesday, November 17, 2009

Massive Scareware Serving Blackhat SEO, the Koobface Gang Style


Ali Baba and the 40 thieves LLC are once again multi-tasking, this time compromising hundreds of thousands of web sites, and redirecting Google visitors -- through the standard http referrer check -- to scareware serving domains.

What's so special about the domains mentioned in Cyveillance's post, as well as the ones currently active on this campaign? It's the Koobface connection.

For instance, the ionisationtools .cn or moored2009 .cn redirectors, as well as the scareware serving premium-protection6 .com; file-antivirus3.com; checkalldata .com; foryoumalwarecheck4 .com; antispy-scan1 .com mentioned in post, are the same scareware redirectors and domains analyzed in part two of the Koobface Botnet's Scareware Business Model series. The identical structure on a sampled Koobface infected host and a sampled compromised site can be seen in the attached screenshots.


The redirection "magic" takes place through a what looks like a static css.js (Trojan-Downloader.JS.FraudLoad) uploaded on all of the affected sites. The very latest blackhat SEO once again puts the Koobface gang in the spotlight of the ongoing underground multi-tasking that the majority of cybercriminals engage in these days.

Related posts:
Koobface Botnet's Scareware Business Model - Part Two
Koobface Botnet's Scareware Business Model - Part One
Koobface Botnet Redirects Facebook's IP Space to my Blog
New Koobface campaign spoofs Adobe's Flash updater
Social engineering tactics of the Koobface botnet
Koobface Botnet Dissected in a TrendMicro Report
Koobface Botnet's Scareware Business Model
Movement on the Koobface Front - Part Two
Movement on the Koobface Front
Koobface - Come Out, Come Out, Wherever You Are
Dissecting Koobface Worm's Twitter Campaign
Dissecting the Koobface Worm's December Campaign
Dissecting the Latest Koobface Facebook Campaign 
The Koobface Gang Mixing Social Engineering Vectors

This post has been reproduced from Dancho Danchev's blog.

Wednesday, November 11, 2009

Koobface Botnet's Scareware Business Model - Part Two

UPDATED - Wednesday, November 18, 2009: A new update is pushed to the hundreds of thousands infected hosts, which is now performing the redirection using dynamically generated .swf files, with every page using the same title "Wonderful Video". The redirection is also a relatively static process.

For instance, if the original koobface redirector is koobface.infected.host/301, followed by the .swf redirection it will output koobface.infected.host/301/?go.

New redirectors and scareware domains pushed within the past few hours include - everlastmovie .cn - Email: gmk2000@yahoo.com; smile-life .cn - Email: gmk2000@yahoo.com ; harry-pott .cn - Email: gmk2000@yahoo.com, beprotected9 .com - Email: essi@calinsella.eu and antivir3 .com - Email: essi@calinsella.eu.

UPDATED - Tuesday, November 17, 2009: Koobface is resuming scareware (Inst_312s2.exe) operations at 91.212.107.103 which was taken offline for a short period of time. ISP has been notified again, action should be taken shortly. The current domain portfolio including new ones parked there: 

ereuqba .cn - Email: spscript@hotmail.com
eqoxyda .cn - Email: spscript@hotmail.com
evouga .cn - Email: spscript@hotmail.com
edivuka .cn - Email: spscript@hotmail.com
ebeama .cn - Email: spscript@hotmail.com
kebugac .cn - Email: spscript@hotmail.com
eqoabce .cn - Email: spscript@hotmail.com
kixyhce .cn - Email: spscript@hotmail.com
cecyde .cn - Email: spscript@hotmail.com
evybine .cn - Email: spscript@hotmail.com
eqaone .cn - Email: spscript@hotmail.com
dyqunre .cn - Email: spscript@hotmail.com
byzivte .cn - Email: spscript@hotmail.com
dovzyag .cn - Email: spscript@hotmail.com
ebeozag .cn - Email: spscript@hotmail.com
cafgouh .cn - Email: spscript@hotmail.com
kebfoki .cn - Email: spscript@hotmail.com
ebogumi .cn - Email: spscript@hotmail.com
dyzani .cn - Email: spscript@hotmail.com
dybapi .cn - Email: spscript@hotmail.com
dusyti .cn - Email: spscript@hotmail.com
dutsyvi .cn - Email: spscript@hotmail.com
dutfij .cn - Email: spscript@hotmail.com
bysivak .cn - Email: spscript@hotmail.com
eqiovak .cn - Email: spscript@hotmail.com

cecxoyk .cn - Email: spscript@hotmail.com
dyqkuam .cn - Email: spscript@hotmail.com
edamym .cn - Email: spscript@hotmail.com
eqibuym .cn - Email: spscript@hotmail.com
ducyqan .cn - Email: spscript@hotmail.com
duzebyn .cn - Email: spscript@hotmail.com
etyawjo .cn - Email: spscript@hotmail.com
cerdiko .cn - Email: spscript@hotmail.com
erauso .cn - Email: spscript@hotmail.com
etuacwo .cn - Email: spscript@hotmail.com
etuexyp .cn - Email: spscript@hotmail.com
etywuq .cn - Email: spscript@hotmail.com
ebejar .cn - Email: spscript@hotmail.com
ebiuhas .cn - Email: spscript@hotmail.com
dozabes .cn - Email: spscript@hotmail.com
eqoybu .cn - Email: spscript@hotmail.com
eviyzru .cn - Email: spscript@hotmail.com
evaopsu .cn - Email: spscript@hotmail.com
ebaetu .cn - Email: spscript@hotmail.com
dytrevu .cn - Email: spscript@hotmail.com
eboezu .cn - Email: spscript@hotmail.com
eruqav .cn - Email: spscript@hotmail.com
eqoumiv .cn - Email: spscript@hotmail.com
epuneyv .cn - Email: spscript@hotmail.com
etykauw .cn - Email: spscript@hotmail.com
ebeoxuw .cn - Email: spscript@hotmail.com
eqidax .cn - Email: spscript@hotmail.com
evaolux .cn - Email: spscript@hotmail.com
cafropy .cn - Email: spscript@hotmail.com
etyupy .cn - Email: spscript@hotmail.com
kebquty .cn - Email: spscript@hotmail.com
cakevy .cn - Email: spscript@hotmail.com
eqouwy .cn - Email: spscript@hotmail.com
epuvyiz .cn - Email: spscript@hotmail.com 

UPDATED - Monday, November 16, 2009: The Koobface gang is pushing a new update, followed by a new portfolio of scareware redirectors and actual scareware serving domains.

New portfolio of redirectors parked at 91.213.126.250:
befree2 .cn - Email: gmk2000@yahoo.com
scandinavianmall .cn - Email: admin@calen.be 
densityoze .cn - Email: admin@calen.be
moored2009 .cn - Email: cael@newstile.it
pica-pica .cn - Email: cael@newstile.it
stroboscopicmovie .cn - Email: cael@newstile.it
comedienne .cn - Email: admin@calen.be
densityoze .cn - Email: admin@calen.be
furorcorner .cn - Email: cael@newstile.it
ionisationtools .cn - Email: guzimi@brendymail.de
wax-max .cn - Email: cael@newstile.it
plate-tracery .cn - Email: guzimi@brendymail.de
little-bitty .cn - Email: admin@calen.be
night-whale .cn - Email: admin@calen.be
scary-scary .cn - Email: gmk2000@yahoo.com

Second redirectors portfolio at 91.213.126.102:
disorganization000 .cn - Email: guzimi@brendymail.de
rainbowlike .cn - Email: HuiYingTsui@airways.au
skewercall .cn - Email: HuiYingTsui@airways.au
wegenerinfo .cn - Email: guzimi@brendymail.de
kangaroocar .cn - Email: HuiYingTsui@airways.au
pericallis .cn - Email: HuiYingTsui@airways.au
treasure-planet .cn - Email: guzimi@brendymail.de
genusbiz .cn - Email: HuiYingTsui@airways.au

Currently pushing scareware from primescan1 .com - 83.133.124.149; 91.213.126.103; 83.133.119.84; 85.12.24.13. Sampled scareware phones back to windowsupdate8 .com/download/timesroman.tif - 88.198.105.145 and angle-meter .com/?b=1 (safewebnetwork .com) - 92.48.119.36.

More scareware domains are parked on the same IPs:
yourantivira7 .com - Email: j.wirth@smsdetective.com - detection rate
web-scanm .com - Email: essi@calinsella.eu - detection rate
yourantivira3 .com (wwwsecurescana1 .com) - Email: j.wirth@smsdetective.com
primescan8 .com
online-check-v11 .com
antivir-scan1 .com - Email: contact@armadastate.us
antispy-scan1 .com - Email: contact@armadastate.us
primescan1 .com
checkforspyware2 .com - Email: admin@calen.be
pc-antispyware3 .com - Email: contact@spaintours.com
premium-protection6 .com - Email: contact@spaintours.com
antivir7 .com - Email: admin@maternitycloth.eu
online-check-v7 .com
beprotected8 .com - Email: admin@maternitycloth.eu
pc-antispyware9 .com - Email: contact@spaintours.com
online-check-v9 .com
checkfileshere .com - Email: admin@calen.be
scanfileshere .com - Email: admin@calen.be
antivir-scano .com - Email: contact@armadastate.us
check-files-now .com - Email: admin@calen.be
antivir-scanz .com - Email: contact@armadastate.us
antispy-scanz .com - Email: contact@armadastate.us

ISP's contributing the the monetization of Koobface have been notified.

UPDATE: 91.212.107.103 has been taken offline courtesy of Blue Square Data Group Services Limited -- previous cooperation took place within a 3 hour period -- with the Koobface gang migrating scareware operations to 93.174.95.191 (AS29073 ECATEL-AS , Ecatel Network) and 188.40.52.181; 188.40.52.180 - (AS24940, HETZNER-AS Hetzner Online AG RZ) - ISPs have been notified.

The .info scareware domain portfolio will be suspended within the next 24 hours.

Ali Baba and the 40 thieves LLC a.k.a my Ukrainian "fan club", the one with the Bahama botnet connection, the recent malvertising attacks connection, and the current market leader of black hat search engine optimization campaigns, has been keeping themselves busy over the past couple of weeks, continuing to add additional layers of legitimacy into their campaigns (bit.ly redirectors to blogspot.com accounts leading to compromised hosts), proving that if a cybercrime enterprise wants to, it can run its malicious operations on the shoulders of legitimate service providers using them as "virtual human shield" in order to continue its operations without fear of retribution.
Over the past two weeks, the Koobface gang once again indicated that it reads my blog, "appreciates" the ways I undermine the monetization element of their campaigns, and next to redirecting Facebook's entire IP space to my blog, they've also, for the first time ever, moved from using my name in their redirectors, to typosquatting it.

For instance, the -- now suspended -- Koobface domain pancho-2807 .com is registered to Pancho Panchev, pancho.panchev@gmail.com, followed by rdr20090924 .info registered to Vancho Vanchev, vanchovanchev@mail.ru. As always, I'm totally flattered, and I'm still in a "stay tuned" mode for my very own branded scareware release - the Advanced Pro-Danchev Premium Live Mega Professional Anti-Spyware Online Cleaning Cyber Protection Scanner 2010.

It's time to summarize some of the Koobface gang's recent activities, establish a direct connection with the Bahama botnet, the Ukrainian dating scam agency Confidential Connections whose botnet operations were linked to money-mule recruitment scams, with active domains part of their affiliate network parked at a Koobface-connected scareware serving domains, followed by the fact that they're all responding to an IP involved in the ongoing U.S Federal Forms themed blackhat SEO campaign. It couldn't get any uglier.

As of recently the gang has migrated to a triple-layer of legitimate infrastructure, consisting of bit.ly redirectors, leading to automatically registered Blogspot account which redirect to Koobface infected hosts serving the Koobface binary and the redirecting to a periodically updated scareware domain. Here are some of the domains involved.

Ongoing campaing dynamically generating bit.ly URLs redirecting to automatically registered Blogspot accounts, using the following URLs:
bit.ly /VumFK -> drbryanferazzoli .blogspot.com
bit.ly /lJcK3 -> toyetoyebalnaja .blogspot.com
bit.ly /3mFyzs -> raimeishelkowitz .blogspot.com
bit.ly /2wuSPj -> kelakelamccovery .blogspot.com
bit.ly /2Pnn8l -> pattyedevero .blogspot.com
bit.ly /2wuSPj -> kelakelamccovery .blogspot.com
bit.ly /1HDmbm -> malinegainey-green. blogspot.com
bit.ly /2xf5vB -> advaadvarukuni .blogspot.com
bit.ly /3mFyzs -> raimeishelkowitz .blogspot.com
bit.ly /2xf5vB -> advaadvarukuni .blogspot.com
bit.ly /46pcCI -> paulangelogaetano .blogspot.com
bit.ly /1HDmbm -> malinegainey-green .blogspot.com
bit.ly /3JZsDD -> derieuwsdarrius .blogspot.com
bit.ly /lJcK3 -> toyetoyebalnaja .blogspot.com
bit.ly /2h7XRU -> shunnarahamandla .blogspot.com
bit.ly /3JZsDD -> derieuwsdarrius .blogspot.com
bit.ly /3Zj98G -> schubachmarquis .blogspot.com
bit.ly /1sXgRH -> nicnicmiralles .blogspot.com
bit.ly /3eijza -> froneksaxxon .blogspot.com
bit.ly /1I3rr7 -> attreechappy .blogspot.com
bit.ly /2m3wP4 -> bilsboroughkebrom .blogspot.com
bit.ly /30wcJn -> raheelanucci .blogspot.com
bit.ly /2U7jYM -> orvelorvelblues .blogspot.com
bit.ly /1CWOlZ -> kondrackinehemias .blogspot.com
bit.ly /2m3wP4 -> bilsboroughkebrom .blogspot.com
bit.ly /1qbXsi -> lizzamottymotty .blogspot.com
bit.ly /79ONz -> rayvongonsalves .blogspot.com
bit.ly /22Jyex -> klaartjebjorgvinsson .blogspot.com
bit.ly /p07jC -> humphriesteelateela .blogspot.com
bit.ly /2lpZXx -> kalandraaleisha .blogspot.com

The Blogspot accounts consist of a single post of automatically syndicated news item, which compared to previous campaign which relied on 25+ Koobface infected IPs directly embedded at Blogspot itself, this time relies on a single URL which attempts to connect to any of the Koobface infected IPs embedded on it. The currently active campaign redirects to rainbowlike cn/?pid=312s02&sid=4db12f, which then redirects to the scareware domain secure-your-files .com, with the sample phoning back to forbes-2009 .com/?b=1s1 - 113.105.152.230, with another domain parked there activate-antivirus .com - Email: support@personal-solutions.com.

Time to expose the entire portfolio of scareware domains pushed by the gang, and offer some historical OSINT data on their activities which were not publicly released until enough connections between multiple campaigns were established.Which ISPs are currently offering hosting services for the scareware domains portfolio pushed by the Koobface gang? The current portfolio is parked at 206.217.201.245 (AS36351 SOFTLAYER Technologies Inc. surprise, surprise!); 212.117.174.19 (AS44042 ROOT eSolutions surprise, surprise part two) and at 91.212.226.155 (AS44042 ROOT eSolutions).

Scareware redirectors parked at 91.213.126.102:
rainbowlike .cn - Email: HuiYingTsui@airways.au
authorized-payments .com - Email: degrysemario@googlemail.com
poltergeist2000 .cn - Email: nfrank@flamcon.com.cn
sestiad2 .cn - Email: PietroToscani@celli.it
uninformed2 .cn - Email: PietroToscani@celli.it
retrocession2 .cn - Email: PietroToscani@celli.it
unimpressible3 .cn - Email: PietroToscani@celli.it
uncrown3 .cn - Email: PietroToscani@celli.it
sneak-peak .cn - Email: info@Milwaukee911.com
cellostuck .cn - Email: info@Milwaukee911.com
stinkingthink .cn - Email: nfrank@flamcon.com.cn
skewercall .cn - Email: HuiYingTsui@airways.au
be-spoken .cn - Email: info@Milwaukee911.com
transmitteron .cn - Email: nfrank@flamcon.com.cn
kangaroocar .cn - Email: HuiYingTsui@airways.au
pericallis .cn - Email: HuiYingTsui@airways.au
exponentials .cn - Email: info@Milwaukee911.com
triforms .cn - Email: info@Milwaukee911.com
outperformoly .cn - Email: nfrank@flamcon.com.cn
genusbiz .cn - Email: HuiYingTsui@airways.au

Scareware domains parked at 206.217.201.245; 212.117.174.19 and 91.212.226.155:
anti-malware-scan-for-you .com - Email: information@brunter.sw
available-scanner .com - Email: m.smith@Recruiters.com
bewareofspyware .com - Email: m.smith@Recruiters.com
defender-scan-for-you .com - Email: information@brunter.sw
defender-scan-for-you3 .com - Email: informatio@belize.ca
foryoumalwarecheck .com - Email: information@brunter.sw
friends-protection .com - Email: m.smith@Recruiters.com
further-scan .com - Email: m.smith@Recruiters.com
goodonlineprotection .com - Email: info@time.co.uk
good-scans .com - Email: m.smith@Recruiters.com
guidetosecurity3 .com - Email: info@time.co.uk
howtocleanpc2 .com - Email: admin@gnar-star.com
howtoprotectpc3 .com - Email: admin@gnar-star.com
howtosecure2 .com - Email: admin@gnar-star.com
howtosecurea .com - Email: admin@gnar-star.com
how-to-secure-pc2 .com - Email: admin@gnar-star.com
protection-secrets .com - Email: info@time.co.uk
scan-for-you .com - Email: information@brunter.sw
scannerantimalware2 .com
scannerantimalware4 .com
scannerantimalware6 .com
secure-your-data0 .com - Email: spradlin@carrental.com
secure-your-files .com - Email: spradlin@carrental.com
security-guide5 .com - Email: JohnnySMcmillan@yahoo.com
security-info1 .com - Email: JohnnySMcmillan@yahoo.com
security-tips3 .com - Email: info@time.co.uk
security-tools4 .com - Email: JohnnySMcmillan@yahoo.com
webviruscheck1 .com
webviruscheck-4 .com
webviruscheck5 .com

Let us further expand the portfolio by listing the newly introduced scareware domains at 91.212.107.103, which was first mentioned in part one of the Koobface Botnet's Scareware Business Model as a centralized hosting location for the gang's portfolio.

Scareware domains parked at 91.212.107.103:
g-antivirus .com - Email: mhbilate@gmail.com
generalantivirus com - Email: compalso@gmail.com
general-antivirus .com - Email: abuse@domaincp.net.cn
general-av .com - Email: mhbilate@gmail.com
generalavs .com - Email: mhbilate@gmail.com
gobackscan .com - Email: alcnafuch@gmail.com
gobarscan .com - Email: jowimpee@gmail.com
godeckscan .com - Email: quetotator@gmail.com
godirscan .com - Email: momorule@gmail.com
godoerscan .com - Email: geofishe@gmail.com
goeachscan .com - Email: momorule@gmail.com
goeasescan .com - Email: geofishe@gmail.com
gofatescan .com - Email: alcnafuch@gmail.com
gofowlscan .com - Email: stinfins@gmail.com
gohandscan .com - Email: quetotator@gmail.com
goherdscan .com - Email: jowimpee@gmail.com
goironscan. com - Email: aloxier@gmail.com
gojestscan. com - Email: jowimpee@gmail.com
golimpscan. com - Email: stinfins@gmail.com
golookscan. com - Email: stinfins@gmail.com
gomendscan. com - Email: gleyersth@gmail.com
gomutescan. com - Email: momorule@gmail.com
gonamescan. com - Email: geofishe@gmail.com

goneatscan .com - Email: momorule@gmail.com
gopickscan. com - Email: momorule@gmail.com
gorestscan. com - Email: quetotator@gmail.com
goroomscan. com - Email: gleyersth@gmail.com
gosakescan. com - Email: stinfins@gmail.com
goscanadd. com - Email: momorule@gmail.com
goscanback .com - Email: alcnafuch@gmail.com
goscanbar .com - Email: jowimpee@gmail.com
goscancode .com - Email: geofishe@gmail.com
goscandeck. com - Email: geofishe@gmail.com
goscandir. com - Email: crschuma@gmail.com
goscandoer .com - Email: crschuma@gmail.com
goscanease. com - Email: crschuma@gmail.com
goscanfowl. com - Email: stinfins@gmail.com
goscanhand. com - Email: quetotator@gmail.com
goscanherd. com - Email: jowimpee@gmail.com
goscanjest. com - Email: jowimpee@gmail.com
goscanlike. com - Email: geofishe@gmail.com
goscanlimp. com - Email: stinfins@gmail.com
goscanmend .com - Email: gleyersth@gmail.com
goscanname. com - Email: crschuma@gmail.com
goscanneat .com - Email: crschuma@gmail.com
goscanpick. com - Email: crschuma@gmail.com

goscanref. com - Email: quetotator@gmail.com
goscanrest .com - Email: quetotator@gmail.com
goscanroom .com - Email: gleyersth@gmail.com
goscansake. com - Email: stinfins@gmail.com
goscanslip. com - Email: jowimpee@gmail.com
goscansole .com - Email: crschuma@gmail.com

goscantoil. com - Email: jowimpee@gmail.com
goscantrio. com - Email: crschuma@gmail.com
goscanxtra. com - Email: crschuma@gmail.com
gosolescan. com - Email: geofishe@gmail.com
gotoilscan. com - Email: jowimpee@gmail.com
gotrioscan. com - Email: momorule@gmail.com
gowellscan. com - Email: stinfins@gmail.com
goxtrascan. com - Email: momorule@gmail.com
iantiviruspro .com - Email: broderma@gmail.com
iantivirus-pro .com - Email: feetecho@gmail.com
ia-pro .com - Email: abuse@domaincp.net.cn
iav-pro .com - Email: mcgettel@gmail.com
in5ch .com - Email: getoony@gmail.com
in5cs .com - Email: getoony@gmail.com
in5ct .com - Email: phounkey@gmail.com
in5id .com - Email: getoony@gmail.com
in5it .com - Email: phounkey@gmail.com
in5iv .com - Email: phounkey@gmail.com
in5st .com - Email: getoony@gmail.com
inavpro .com - Email: thdunnag@gmail.com
scanatom6 .com - Email: sckimbro@gmail.com
windoptimizer .com - Email: wousking@gmail.com
wopayment .com - Email: broderma@gmail.com
woptimizer .com - Email: broderma@gmail.com

cafropy .cn - Email: spscript@hotmail.com
cakevy .cn - Email: spscript@hotmail.com
dotqyuw .cn - Email: spscript@hotmail.com
dovnaji .cn - Email: spscript@hotmail.com
dovzyag .cn - Email: spscript@hotmail.com
dozabes .cn - Email: spscript@hotmail.com
ducyqan .cn - Email: spscript@hotmail.com
duvaba .cn - Email: spscript@hotmail.com
duvegy .cn - Email: spscript@hotmail.com
duwbiec .cn - Email: spscript@hotmail.com
duxsoez .cn - Email: spscript@hotmail.com
duzebyn .cn - Email: spscript@hotmail.com
dybapi .cn - Email: spscript@hotmail.com
dyqkuam .cn - Email: spscript@hotmail.com
dyqunre .cn - Email: spscript@hotmail.com
dytrevu .cn - Email: spscript@hotmail.com
dyzani .cn - Email: spscript@hotmail.com
ebaetu .cn - Email: spscript@hotmail.com
ebeoxuw .cn - Email: spscript@hotmail.com
ebeozag .cn - Email: spscript@hotmail.com
edoqeg .cn - Email: spscript@hotmail.com
epuneyv .cn - Email: spscript@hotmail.com
epuvyiz .cn - Email: spscript@hotmail.com

eqadozu .cn - Email: spscript@hotmail.com
eqaofed .cn - Email: spscript@hotmail.com
eqaone .cn - Email: spscript@hotmail.com
eqayweh .cn - Email: spscript@hotmail.com
eqibuym .cn - Email: spscript@hotmail.com
eqidax .cn - Email: spscript@hotmail.com
eqiovak .cn - Email: spscript@hotmail.com
eqoabce .cn - Email: spscript@hotmail.com
eqoumiv .cn - Email: spscript@hotmail.com
erauso .cn - Email: spscript@hotmail.com
ereuqba .cn - Email: spscript@hotmail.com
erujale .cn - Email: spscript@hotmail.com
eruqav .cn - Email: spscript@hotmail.com
esuteyb .cn - Email: spscript@hotmail.com
etuacwo .cn - Email: spscript@hotmail.com
etuexyp .cn - Email: spscript@hotmail.com
etyawjo .cn - Email: spscript@hotmail.com
etykauw .cn - Email: spscript@hotmail.com
evaolux .cn - Email: spscript@hotmail.com
evaopsu .cn - Email: spscript@hotmail.com
keturma .cn - Email: spscript@hotmail.com
kevsopi .cn - Email: spscript@hotmail.com
kijxayt .cn - Email: spscript@hotmail.com
kiluxso .cn - Email: spscript@hotmail.com
kipuxo .cn - Email: spscript@hotmail.com
kirdabe .cn - Email: spscript@hotmail.com
kiwraux .cn - Email: spscript@hotmail.com
kixyhce .cn - Email: spscript@hotmail.com

adjudg .info - Email: deciable@gmail.com
afront .info - Email: calexing@gmail.com
anprun .info - Email: deciable@gmail.com
apalet .info - Email: deciable@gmail.com
argier .info - Email: stthatch@gmail.com
asbro .info - Email: recuscon@gmail.com
atquit .info - Email: recuscon@gmail.com
atwain .info - Email: deciable@gmail.com
bagse .info - Email: calexing@gmail.com
bedaub .info - Email: jaohra@gmail.com
bedrid .info - Email: magoetzim@gmail.com
beeves .info - Email: piproux@gmail.com
besort .info - Email: jaohra@gmail.com
bettev .info - Email: recuscon@gmail.com
bettre .info - Email: phvandiv@gmail.com
birnam .info - Email: jaohra@gmail.com
botled .info - Email: deciable@gmail.com
brawns .info - Email: calexing@gmail.com
brisky .info - Email: recuscon@gmail.com
camlet .info - Email: enomman@gmail.com
caretz .info - Email: piproux@gmail.com
cheir .info - Email: jaohra@gmail.com
cuique .info - Email: calexing@gmail.com
daphni .info - Email: calexing@gmail.com

deble .info - Email: bebrashe@gmail.com
debuty .info - Email: stthatch@gmail.com
declin. info - Email: stthatch@gmail.com
devicel .info - Email:stthatch@gmail.com
dislik. info - Email: krharbou@gmail.com
dolchi. info - Email: stthatch@gmail.com
dolet. info - Email: magoetzim@gmail.com
dolet. info - Email: magoetzim@gmail.com
droope .info - Email: deciable@gmail.com
empery .info - Email: phvandiv@gmail.com
engirt .info - Email: jaohra@gmail.com
eratile .info - Email: magoetzim@gmail.com
erpeer .info - Email: deciable@gmail.com
evyns. info - Email: magoetzim@gmail.com
exampl .info - Email: krharbou@gmail.com
extrip .info - Email: piproux@gmail.com
fatted .info - Email: stthatch@gmail.com
fedar. info - Email: phvandiv@gmail.com
fifthz .info - Email: stthatch@gmail.com
figgle .info - Email: deciable@gmail.com
fliht .info - Email: krharbou@gmail.com
fosset .info - Email: deciable@gmail.com
freckl .info - Email: stthatch@gmail.com
freiny. info - Email: krharbou@gmail.com

froday. info - Email: deciable@gmail.com
fulier. info - Email: deciable@gmail.com
gaudad .info - Email: enomman@gmail.com
gelded. info - Email: stthatch@gmail.com
gicke .info - Email: magoetzim@gmail.com
girded .info - Email: jaohra@gmail.com
goterm .info - Email: calexing@gmail.com
guiany. info - Email: krharbou@gmail.com
haere .info - Email: deciable@gmail.com
hilloa. info - Email: phvandiv@gmail.com
holdit. info - Email: stthatch@gmail.com
hownet .info - Email: stthatch@gmail.com
ignomy. info - Email: jaohra@gmail.com
implor. info - Email: jaohra@gmail.com
inclin. info - Email: grattab@gmail.com
inquir .info - Email: stthatch@gmail.com
jorgan .info - Email: bebrashe@gmail.com
kedder .info - Email: enomman@gmail.com
knivel .info - Email: deciable@gmail.com
krapen .info - Email: deciable@gmail.com
lavolt .info - Email: jaohra@gmail.com
lavyer .info - Email: bebrashe@gmail.com

lequel .info - Email: acjspain@gmail.com
lowatt .info - Email: krharbou@gmail.com
meanly.info - Email: krharbou@gmail.com
meyrie.info - Email: piproux@gmail.com
midid .info - Email: magoetzim@gmail.com
miloty .info - Email: stthatch@gmail.com
mobled .info - Email: magoetzim@gmail.com
monast. info - Email: phvandiv@gmail.com
moont. info - Email: magoetzim@gmail.com
narowz .info - Email: enomman@gmail.com
nevils .info - Email: stthatch@gmail.com
nnight .info - Email: piproux@gmail.com
nroof .info - Email: krharbou@gmail.com
numben .info - Email: deciable@gmail.com
obsque .info - Email: jaohra@gmail.com
octian .info - Email: jaohra@gmail.com
odest. info - Email: phvandiv@gmail.com
onclew .info - Email: phvandiv@gmail.com
orifex .info - Email: krharbou@gmail.com
orodes .info - Email: deciable@gmail.com
outliv .info - Email: stthatch@gmail.com

pante .info - Email: jaohra@gmail.com
pasio .info - Email: jaohra@gmail.com
pittie. info - Email: stthatch@gmail.com
plamet .info - Email: stthatch@gmail.com
plazec. info - Email: bebrashe@gmail.com
potinz. info - Email: stthatch@gmail.com
pplay. info - Email: jaohra@gmail.com
pretia .info - Email: krharbou@gmail.com
quoifs. info - Email: enomman@gmail.com
qward. info - Email: enomman@gmail.com
raught .info - Email: piproux@gmail.com
realfly .info - Email: phvandiv@gmail.com
reglet. info - Email: stthatch@gmail.com
rogero .info - Email: stthatch@gmail.com
sallut. info - Email: deciable@gmail.com
sawme .info - Email: stthatch@gmail.com
scarre .info - Email: enomman@gmail.com
scrowl. info - Email: enomman@gmail.com
sigeia. info - Email: krharbou@gmail.com
sighal. info - Email: stthatch@gmail.com
speen. info - Email: enomman@gmail.com
spelem .info - Email: bebrashe@gmail.com
spinge. info - Email: krharbou@gmail.com
squach. info - Email: krharbou@gmail.com

stampo. info - Email: enomman@gmail.com
steepy. info - Email: stthatch@gmail.com
strawy. info - Email: jaohra@gmail.com
suivez. info - Email: krharbou@gmail.com
sundery .info - Email: phvandiv@gmail.com
surnam. info - Email: krharbou@gmail.com
swoln. info - Email: acjspain@gmail.com
swoons .info - Email: enomman@gmail.com
taulus. info - Email: jaohra@gmail.com
tenshy. info - Email: stthatch@gmail.com
tented. info - Email: deciable@gmail.com
ticedu. info - Email: enomman@gmail.com
tithed. info - Email: bebrashe@gmail.com
topful. info - Email: jaohra@gmail.com
unclin. info - Email: stthatch@gmail.com
undeaf. info - Email: enomman@gmail.com
unowed. info - Email: enomman@gmail.com
unwept. info - Email: stthatch@gmail.com
usicam. info - Email: stthatch@gmail.com
vagrom. info - Email: bebrashe@gmail.com
veldun. info - Email: jaohra@gmail.com
vipren. info - Email: calexing@gmail.com
voided. info - Email: krharbou@gmail.com
volsce. info - Email: krharbou@gmail.com
washy. info - Email: phvandiv@gmail.com
wincot. info - Email: enomman@gmail.com
wiving. info - Email: enomman@gmail.com
wooer. info - Email: jaohra@gmail.com
xonker. info - Email: jaohra@gmail.com 

Historical OSINT of Koobface scareware activity over a period of two weeks
The following is a snapshot of Koobface scareware activity during the last two weeks, establishing a direct connection between the Koobface botnet, the ongoing blackhat SEO campaigns, the Bahama botnet with scareware samples modifying HOSTS files, and an Ukrainian dating scam agency where the gang appears to be part of an affiliate network.

Scareware samples pushed by Koobface, with associated detection rates:
mexcleaner .in - Email: niclas@i.ua
safetyscantool .com - 62.90.136.237 - Email: Suzanne.R.Muniz@trashymail.com
stabilitytoolsonline .com - Email: Brent.I.Purnell@pookmail.com
securitytestnetonline .com - 62.90.136.237 - Email: Dianne.T.Whitley@pookmail.com
securityprogramguide .com - Email: Kiyoko.T.Johnson@mailinator.com
cheapsecurityscan .com - Email: Kevin.L.Linkous@trashymail.com
securitycheckwest .com; webbiztest .com - Email: Ruthie.R.Wilcox@mailinator.com
securitycodereviews .com - 62.90.136.237 - Email: Darwin.L.Mcgowan@trashymail.com
netmedtest .com - 62.90.136.237 - Email: Irene.D.Snow@trashymail.com
toolsdirectnow .com - Email: Frank.J.Bullard@trashymail.com
(ratspywawe .in; wqdefender .in; pivocleaner .in; mexcleaner .in; sapesoft .in; alsoft .in; samosoft .in; jastaspy .in; lastspy .in; felupdate .info; inkoclear .info; drlcleaner .info; tiposoft .info; fkupd .eu; piremover .eu; igsoft .eu; sersoft .eu) - detection rate

Download locations of the actual scareware binary used over the past two weeks:
0ni9o1s3feu60 .cn - Email: robertsimonkroon@gmail.com
6j5aq93iu7yv4 .cn - Email: robertsimonkroon@gmail.com
mf6gy4lj79ny5 .cn - Email: robertsimonkroon@gmail.com
84u9wb2hsh4p6 .cn - Email: robertsimonkroon@gmail.com
6pj2h8rqkhfw7 .cn - Email: robertsimonkroon@gmail.com
7cib5fzf462g8 .cn - Email: robertsimonkroon@gmail.com
7bs5nfzfkp8q8 .cn - Email: robertsimonkroon@gmail.com
kt4lwumfhjb7a .cn - Email: robertsimonkroon@gmail.com
q2bf0fzvjb5ca .cn - Email: robertsimonkroon@gmail.com
rncocnspr44va .cn - Email: robertsimonkroon@gmail.com
t1eayoft9226b .cn - Email: robertsimonkroon@gmail.com
4go4i9n76ttwd .cn - Email: robertsimonkroon@gmail.com
kzvi4iiutr11e .cn - Email: robertsimonkroon@gmail.com
hxc7jitg7k57e .cn - Email: robertsimonkroon@gmail.com
mfbj6pquvjv8e .cn - Email: robertsimonkroon@gmail.com
mt3pvkfmpi7de .cn - Email: robertsimonkroon@gmail.com
fb7pxcqyb45oe .cn - Email: robertsimonkroon@gmail.com
fyivbrl3b0dyf .cn - Email: robertsimonkroon@gmail.com
z6ailnvi94jgg .cn - Email: robertsimonkroon@gmail.com
ue4x08f5myqdl .cn - Email: robertsimonkroon@gmail.com
p7keflvui9fkl .cn - Email: robertsimonkroon@gmail.com
gjpwsc5p7oe3m .cn - Email: robertsimonkroon@gmail.com
f1uq1dfi3qkcm .cn - Email: robertsimonkroon@gmail.com
7mx1z5jq0nt3o .cn - Email: robertsimonkroon@gmail.com
3uxyctrlmiqeo .cn - Email: robertsimonkroon@gmail.com
p0umob9k2g7mp .cn - Email: robertsimonkroon@gmail.com
od32qjx6meqos .cn - Email: robertsimonkroon@gmail.com
bnfdxhae1rgey .cn - Email: robertsimonkroon@gmail.com
7zju2l82i2zhz .cn - Email: robertsimonkroon@gmail.com

What's the deal with the historical OSINT and why wasn't this data communicated right away? Keep reading.

The Bahama Botnet Connection
During September, the folks at ClickForensics made an interesting observation regarding my Ukrainian "fan club" and the ad revenue stealing/click-fraud committing botnet Bahama - some of the scareware samples were modifying the HOSTS file and presenting the victim with "one of those cybecrime-friendly search engines" stealing revenue in the process.

Once the connection was also established by me at a later stage, data released in regard to the New York Times malvertising attack once again revealed a connection between all campaigns - the very same domains used to serve the scareware, were also used in a blackhat SEO campaign which I analyzed a week before the incident took place. Basically, the scareware pushed by the Koobface botnet, as well as the scareware pushed by the blackhat SEO campaigns maintained by the gangs is among the several propagation approaches used for the DNS records poisoning to take place:

"However, in the case of the Bahama Botnet, this DNS translation method gets corrupted.  The Bahama botnet malware causes the infected computer to mistranslate a domain name.  Instead of translating “Google.com” as 74.125.155.99, an infected computer will translate it as 64.86.17.56. That number doesn’t represent any computer owned by Google.  Instead, it represents a computer located in Canada.  When a user with an infected machine performs a search on what they think is google.com, the query actually goes to the Canadian computer, which pulls real search results directly from Google, fiddles with them a bit, and displays them to the searcher.  

Now the searcher is looking at a page that looks exactly like the Google search results page, but it’s not.  A click on the apparently “organic” results will redirect as a paid click through several ad networks or parked domains — some complicit, some not.  Regardless, cost per click (CPC) fees are generated, advertisers pay, and click fraud has occurred."

The 64.86.17.56 mentioned is actually AS30407 (Velcom), which has also been used in recent campaigns.

ISP and domain registrars have been notified, action should be taken shortly. What was particularly interesting to observe was scareware pushed by the Koobface botnet phoning back to its well known urodinam .net/8732489273.php domain, was also modifying the HOSTS file in the following way. Sample HOSTS modification of scareware (MD5: 0x0FBF1A9F8E6E305138151440DA58B4F1) pushed by Koobface:
89.149.210.109 www.google.com
89.149.210.109 www.google.de
89.149.210.109 www.google.fr
89.149.210.109 www.google.co.uk
89.149.210.109 www.google.com.br
89.149.210.109 www.google.it
89.149.210.109 www.google.es
89.149.210.109 www.google.co.jp
89.149.210.109 www.google.com.mx
89.149.210.109 www.google.ca
89.149.210.109 www.google.com.au
89.149.210.109 www.google.nl
89.149.210.109 www.google.co.za
89.149.210.109 www.google.be
89.149.210.109 www.google.gr
89.149.210.109 www.google.at
89.149.210.109 www.google.se
89.149.210.109 www.google.ch
89.149.210.109 www.google.pt
89.149.210.109 www.google.dk
89.149.210.109 www.google.fi
89.149.210.109 www.google.ie
89.149.210.109 www.google.no
89.149.210.109 search.yahoo.com
89.149.210.109 us.search.yahoo.com
89.149.210.109 uk.search.yahoo.com


Sample HOSTS modification of scareware (MD5: 0x0FBF1A9F8E6E305138151440DA58B4F1) pushed by blackhat SEO:
74.125.45.100 4-open-davinci.com
74.125.45.100 securitysoftwarepayments.com
74.125.45.100 privatesecuredpayments.com
74.125.45.100 secure.privatesecuredpayments.com
74.125.45.100 getantivirusplusnow.com
74.125.45.100 secure-plus-payments.com
74.125.45.100 www.getantivirusplusnow.com
74.125.45.100 www.secure-plus-payments.com
74.125.45.100 www.getavplusnow.com
74.125.45.100 www.securesoftwarebill.com
74.125.45.100 secure.paysecuresystem.com
74.125.45.100 paysoftbillsolution.com
64.86.16.97 google.ae
64.86.16.97 google.as
64.86.16.97 google.at
64.86.16.97 google.az
64.86.16.97 google.ba
64.86.16.97 google.be
64.86.16.97 google.bg
64.86.16.97 google.bs
64.86.16.97 google.ca
64.86.16.97 google.cd
64.86.16.97 google.com.gh
64.86.16.97 google.com.hk
64.86.16.97 google.com.jm
64.86.16.97 google.com.mx
64.86.16.97 google.com.my
64.86.16.97 google.com.na
64.86.16.97 google.com.nf
64.86.16.97 google.com.ng
64.86.16.97 google.ch
64.86.16.97 google.com.np
64.86.16.97 google.com.pr
64.86.16.97 google.com.qa
64.86.16.97 google.com.sg
64.86.16.97 google.com.tj
64.86.16.97 google.com.tw
64.86.16.97 google.dj
64.86.16.97 google.de
64.86.16.97 google.dk
64.86.16.97 google.dm
64.86.16.97 google.ee


64.86.16.97 google.fi
64.86.16.97 google.fm
64.86.16.97 google.fr
64.86.16.97 google.ge
64.86.16.97 google.gg
64.86.16.97 google.gm
64.86.16.97 google.gr
64.86.16.97 google.ht
64.86.16.97 google.ie
64.86.16.97 google.im
64.86.16.97 google.in
64.86.16.97 google.it
64.86.16.97 google.ki
64.86.16.97 google.la
64.86.16.97 google.li
64.86.16.97 google.lv
64.86.16.97 google.ma
64.86.16.97 google.ms
64.86.16.97 google.mu
64.86.16.97 google.mw
64.86.16.97 google.nl
64.86.16.97 google.no
64.86.16.97 google.nr
64.86.16.97 google.nu
64.86.16.97 google.pl
64.86.16.97 google.pn
64.86.16.97 google.pt
64.86.16.97 google.ro
64.86.16.97 google.ru


64.86.16.97 google.rw
64.86.16.97 google.sc
64.86.16.97 google.se
64.86.16.97 google.sh
64.86.16.97 google.si
64.86.16.97 google.sm
64.86.16.97 google.sn
64.86.16.97 google.st
64.86.16.97 google.tl
64.86.16.97 google.tm
64.86.16.97 google.tt
64.86.16.97 google.us
64.86.16.97 google.vu
64.86.16.97 google.ws
64.86.16.97 google.co.ck
64.86.16.97 google.co.id

64.86.16.97 google.co.il
64.86.16.97 google.co.in
64.86.16.97 google.co.jp

64.86.16.97 google.co.kr
64.86.16.97 google.co.ls
64.86.16.97 google.co.ma
64.86.16.97 google.co.nz
64.86.16.97 google.co.tz
64.86.16.97 google.co.ug
64.86.16.97 google.co.uk
64.86.16.97 google.co.za
64.86.16.97 google.co.zm
64.86.16.97 google.com


The historical OSINT paragraph mentioned that several of the scareware domains pushed during the past two weeks were responding to 62.90.136.237. This very same 62.90.136.207 IP was hosting domains part of an Ukrainian dating scam agency known as Confidential Connections earlier this year, whose spamming operations were linked to a botnet involved in money mule recruitment activities.

For the time being, the following dating scam domains are responding to the same IP:
healthe-lovesite .com - Email: potenciallio@safe-mail.net
love-isaclick .com - Email: potenciallio@safe-mail.net
love-is-special .com - Email: potenciallio@safe-mail.net
only-loveall .com - Email: potenciallio@safe-mail.net
and-i-loveyoutoo .com - Email: potenciallio@safe-mail.net
andiloveyoutoo .com - Email: menorst10@yahoo.com
romantic-love-forever .com - Email: potenciallio@safe-mail.net

love-youloves .com - Email: potenciallio@safe-mail.net
love-galaxys .com - Email: potenciallio@safe-mail.net
love-formeandyou .com - Email: potenciallio@safe-mail.net
ifound-thelove .net - Email: potenciallio@safe-mail.net
findloveon .net - Email: wersers@yahoo.com
love-isexcellent .net - Email: potenciallio@safe-mail.net

Could it get even more malicious and fraudulent than that? Appreciate my thetoric. The same email (potenciallio@safe-mail.net) that was used to register the dating scam domains was also used to register exploit serving domains at 195.88.190.247, participate in phishing campaigns, and register a money mule recruitment site for the non-existent Allied Insurance LLC. (Allied Group, Inc.).

Now that's a multi-tasking underground enterprise, isn't it? The ISPs have been notified, domains suspension is pending.

Related posts:
Koobface Botnet Redirects Facebook's IP Space to my Blog
New Koobface campaign spoofs Adobe's Flash updater
Social engineering tactics of the Koobface botnet
Koobface Botnet Dissected in a TrendMicro Report
Koobface Botnet's Scareware Business Model
Movement on the Koobface Front - Part Two
Movement on the Koobface Front
Koobface - Come Out, Come Out, Wherever You Are
Dissecting Koobface Worm's Twitter Campaign
Dissecting the Koobface Worm's December Campaign
Dissecting the Latest Koobface Facebook Campaign 
The Koobface Gang Mixing Social Engineering Vectors

This post has been reproduced from Dancho Danchev's blog.