Monday, November 30, 2009

Summarizing Zero Day's Posts for November

The following is a brief summary of all of my posts at ZDNet's Zero Day for November.

You can also go through previous summaries, as well as subscribe to my personal RSS feed, Zero Day's main feed, or follow all of ZDNet's blogs on Twitter.

Notable articles include: Windows 7's default UAC bypassed by 8 out of 10 malware samples and Man-in-the-middle attacks demoed on 4 smartphones.

01. iHacked: jailbroken iPhones compromised, $5 ransom demanded
02. Which antivirus is best at removing malware?
03. Windows 7's default UAC bypassed by 8 out of 10 malware samples
04. Source code for ikee iPhone worm in the wild
05. Commercial spying app for Android devices released
06. Man-in-the-middle attacks demoed on 4 smartphones
07. Thousands of web sites compromised, redirect to scareware -- the latest virtual smoking gun of the Koobface gang

This post has been reproduced from Dancho Danchev's blog.

Wednesday, November 25, 2009

Koobface Botnet Starts Serving Client-Side Exploits


UPDATED, Wednesday, December 02, 2009: The systematic rotation of new redirectors and scareware domains remains ongoing, with no signs of resuming the use of client-side exploits.

Some of the latest ones include inviteerverwhere .cn - Email: box@cethcuples.com -> scanner-infoa .com - Email: inout@celestia.com, scareware detection rate; 1economyguide .cn - Email: contact@berussa.de -> superdefenceaj .com - Email: inout@celestia.com, scareware detection rate; slip-stream .cn - Email: info@mercedess.de -> getsafeantivirusa .com - Email: morrison2g@yahoo.com, scareware detection rate.

The complete list of redirectors introduced over the past week is as follows: 1economyguide .cn; 1monocline .cn; 1nonsensical .cn; 1onlinestarter .cn; 1political-news .cn; argentinastyle .cn; australiagold .cn; austriamoney .cn; beatupmean2 .cn; belgiumnation .cn; brazilcountry .cn; firefoxfowner .cn; inviteerverwhere .cn; iraqcontacts .cn; makenodifference2 .cn; manualgreese .cn; overmerit3 .cn; powerhelms2 .cn; secretalltrue2 .cn; separator2009 .cn; slip-stream .cn; solidresistance .cn; wallgreensmart .cn; windowsclone .cn; womenregrets .cn; womenregrets2 .cn

UPDATED, Saturday, November 28, 2009: Following yesterday's experiment with bit.ly redirectors, relying on a "visual social engineering element" by adding descriptive domains after the original link -- bit.ly/588dmE?YOUTUBE.COM/ea05981d43, which works with any generated bit.ly link, the gang is now spamvertising links using Google News redirection to automatically registered Blogspot accounts, whose CAPTCHA challenge has been solved by the already infected with Koobface victims, a feature that is now mainstream, compared to the gang's previous use of commercial CAPTCHA solving services, where the price for a thousand solved CAPTCHAs varies between $1 and $2:

- news.google.com/news/url?url=http://pierrickcastoe .blogspot.com/
- news.google.com/news/url?url=http://biilybiilybangert .blogspot.com/
- news.google.com/news/url?url=http://majdimajdinoordijk .blogspot.com/
- news.google.com/news/url?url=http://vassellpelovska .blogspot.com/
- news.google.com/news/url?url=http://troitroiweinbrenner .blogspot.com/
- news.google.com/news/url?url=http://keyserefrain .blogspot.com/


New redirectors introduced include:
overmerit3 .cn - Email: admin@cryzisday.com
belgiumnation .cn - Email: vesta@greaselive.au
iraqcontacts .cn - Email: admin@resemm.de
womenregrets .cn - Email: admin@resemm.de
wallgreensmart .cn - Email: admin@cryzisday.com
brazilcountry .cn - Email: vesta@greaselive.au
womenregrets2 .cn - Email: in@groovezone.com

News scareware domains introduced include:
internetdefencesystem .com - Email: admin@wyverny.com
royalsecure-a1 .com - Email: in@groovezone.com
royaldefencescan1 .com - Email: in@groovezone.com
royaldefensescan1 .com - Email: in@groovezone.com
royaldefencescan .com - Email: contacts@esseys.au
royaldefensescan .com - Email: contacts@esseys.au
royalprotectionscan .com - Email: contacts@esseys.au

Sampled copy phones back to a new domain (austin2reed .com/?b=1s1; austin2reed .com/?b=1) using the same IP (92.48.119.36) as the previous phone-back domain.

UPDATED, Thursday, November 26, 2009: The gang has currently suspended the use of client-side exploits, let's see if it's only for the time being or indefinitely. Scareware is whatsoever, introduced with periodically registered new domains - argentinastyle .cn - Email: vesta@greaselive.au and australiagold .cn - Email: vesta@greaselive.au, redirect to bestscan066 .com - Email: fransysles2@yahoo.com and to bestscan044 .com - Email: fransysles2@yahoo.com - detection rate.

The exploit serving domains (el3x .cn; kiano-180809 .com and ttt20091124 .info) remain active.

The Koobface botnet, a case study on propagation relying exclusively on social engineering tactics and systematic abuse of legitimate Web 2.0 services, has introduced a second "game-changer" next to the migration to distributed command and control infrastructure once its centralized operations got shut down.

Next to the embedded and automatically rotating scareware redirects placed on each and every infected host part of the Koobface botnet, the gang behind it has now started officially using client-side exploits (VBS/Psyme.BM; Exploit.Pidief.EX; Exploit.Win32.IMG-WMF etc.) by embedding two iFrames on all the Koobface-infected hosts (Underground Molotov - function molot (m)), which connect to a well known (average) web malware exploitation kit's interface. Not only would a user that clicks on the Koobface URL be exposed to the Koobface binary itself, now pushed through client-side exploits, but also, to the periodically changed scareware domains.

Let's dissect the campaign, expose the entire domains portfolio involved or introduced since the beginning of the week, and once again establish a connection between the Koobface gang and money mule recruitment scams followed by scareware domains (Inst_312s2.exe; Inst_312s2.exe from today, both of them phone back to angle-meter .com/?b=1), all registered using the same emails.

Scareware redirectors seen during the past couple of the days, parked at 91.213.126.250:
solidresistance .cn - Email: admin@cryzisday.com
separator2009 .cn - Email: admin@cryzisday.com
zapotec2 .cn - Email: admin@cryzisday.com
befree2 .cn - Email: gmk2000@yahoo.com
entombing2009 .cn - Email: info@grindsteal.fr
economyguide .cn - Email: info@plaguegr.de
smile-life .cn - Email: gmk2000@yahoo.com
everlastmovie .cn - Email: gmk2000@yahoo.com
monocline .cn - Email: info@plaguegr.de
mozzillaclone .cn - Email: sanbeans6@yahoo.com
monkey-greese .cn - Email: sanbeans6@yahoo.com
surgingnurse .cn - Email: info@grindsteal.fr
mailboxinvite .cn - Email: sanbeans6@yahoo.com
flatletkick .cn - Email: info@plaguegr.de
nonsensical .cn - Email: info@grindsteal.fr
moralisefilm .cn - Email: info@grindsteal.fr
firefoxavatar .cn - Email: sanbeans6@yahoo.com
onlinestarter .cn - Email: info@plaguegr.de
clowncirus .cn - Email: sanbeans6@yahoo.com
political-news .cn - Email: info@plaguegr.de
harry-pott .cn - Email: gmk2000@yahoo.com
repeatability .cn - Email: info@grindsteal.fr

New scareware domains portfolio parked at 95.143.192.51; 83.133.119.84; 91.213.126.103:
valuewebscana .com - Email: lynd.stafford@yahoo.com
valuescana .com - Email: lynd.stafford@yahoo.com
cyber-scan-1 .com - Email: admin@dedicatezoom.com
yourantispy-1 .com - Email: shah_indigo@googlemail.com
cyber-scan011 .com - Email: admin@dedicatezoom.com
cyber-scan-2 .com - Email: admin@dedicatezoom.com
antimalware-3 .com - Email: shah_indigo@googlemail.com
yourmalwarescan3 .com - Email: shah_indigo@googlemail.com
antimalwarescana4 .com - Email: j.wirth@smsdetective.com
today-scan4 .com - Email: millercall413@yahoo.com
antispy-scan5 .com - Email: shah_indigo@googlemail.com
yourantivira7 .com - Email: j.wirth@smsdetective.com
yourmalwarescan7 .com - Email: info@bellyn.com
yourantispy-8 .com - Email: info@bellyn.com
cyber-scan08 .com - Email: admin@dedicatezoom.com
cyber-scan09 .com - Email: admin@dedicatezoom.com
beprotected9 .com - Email: essi@calinsella.eu
spyware-scan9 .com - Email: info@bellyn.com
yourantispy-a .com - Email: shah_indigo@googlemail.com
checkforspywarea .com - Email: sanbeans6@yahoo.com
checkfilesherea .com - Email: sanbeans6@yahoo.com
scanfilesherea .com - Email: sanbeans6@yahoo.com
findprotectiona .com - Email: admin@wyverny.com
checkfilesnowa .com - Email: sanbeans6@yahoo.com
web-scanm .com - Email: essi@calinsella.eu
today-scann .com - Email: essi@calinsella.eu
4eay-protection .com - Email: millercall413@yahoo.com

The client-side exploit redirection takes place through three separate domains, all involved in previous Zeus crimeware campaigns, parked on the same IP in a cybercrime-friendly ASN. For instance, el3x.cn/test13/index.php - 210.51.166.119 - Email: Exmanoize@qip.ru redirects to el3x.cn/test13/x.x -> el3x.cn/test13/pdf.php -> el3x.cn/test13/load.php?spl=javad -> el3x.cn/test13/soc.php using VBS/Psyme.BM; Exploit.Pidief.EX; Exploit.Win32.IMG-WMF etc. pushing load.exe, which phones back to a well known "leftover" from Koobface botnet's centralized infrastructure - xtsd20090815 .com/adm/index.php.

Now it gets even more interesting, with the Koobface gang clearly rubbing shoulders with authors of actual web malware exploitation kits, who diversify their cybercrime operations by participating in money mule recruitment scams, zeus crimeware serving campaigns, and scareware.

Parked on 210.51.166.119 where the first iFrame is hosted, are also the following domains participating in related campaigns:
amer0test0 .cn - Email: abusehostserver@gmail.com -> money mule recruitment
antivirusfreec0 .cn - Email: abusehostserver@gmail.com -> money mule recruitment 
arendanomer2 .cn - Email: Exmanoize@qip.ru
dom0cn .cn - Email: Exmanoize@qip.ru
dom1cn .cn - Email: Exmanoize@qip.ru
dom2cn .cn - Email: Exmanoize@qip.ru
domx0 .cn - Email: Exmanoize@qip.ru
domx1 .cn - Email: Exmanoize@qip.ru
domx2 .cn - Email: Exmanoize@qip.ru
dox0 .cn - Email: Exmanoize@qip.ru
dox1 .cn - Email: Exmanoize@qip.ru
dox2 .cn - Email: Exmanoize@qip.ru
dox3 .cn - Email: Exmanoize@qip.ru
edit2china .cn - Email: Exmanoize@qip.ru
edit3china .cn - Email: Exmanoize@qip.ru
el1x .cn - Email: Exmanoize@qip.ru
el2x .cn - Email: Exmanoize@qip.ru
el3x .cn - Email: Exmanoize@qip.ru
gym0replace .cn - Email: chen.poon1732646@yahoo.com -> scareware domain registration
herosima1yet .cn - Email: Exmanoize@qip.ru
herosima1yet00g .cn - Email: abusehostserver@gmail.com
otherchina .cn - Email: Exmanoize@qip.ru
parliament .tk - Email: royalddos@gmail.com
privet1 .cn - Email: Exmanoize@qip.ru
privet2 .cn - Email: Exmanoize@qip.ru
privet3 .cn - Email: Exmanoize@qip.ru
sport-lab .cn - Email: abuseemaildhcp@gmail.com -> money mule recruitment domain registrations
trafdomins .cn - Email: Exmanoize@qip.ru

The second iFrame domain parked at 61.235.117.83 redirects in the following way - kiano-180809 .com/oko/help.html - 61.235.117.83 - Email: bigvillyxxx@gmail.com leads to kiano-180809 .com/oko/dyna_soc.html -> kiano-180809 .com/oko/tomato_guy_13.html -> kiano-180809 .com/oko/update.vbe -> kiano-180809 .com/oko/dyna_wm.wmf.

The same exploitation structure is valid for the third iFrame domain - ttt20091124 .info/oko/help.html which is again, parked at 61.235.117.83 and was embedded at Koobface-infected hosts over the past 24 hours.

What prompted this shift on behalf of the Koobface gang? Declining infection rates -- I'm personally not seeing a decline in the click-through rate, with over 500 clicks on a spamvertised Kooobface URL over a period of 24 hours -- or their obsession with traffic optimization? In terms of social engineering, the periodic introduction of new templates proved highly successful for the gang, but the newly introduced outdated client-side exploits can in fact generate more noise than they originally anticipated, if they were to continue relying on social engineering vectors only.

One thing's certain - the Koobface gang is now on the offensive, and it would be interesting to see whether they'd introduce a new exploits set, or continue relying on the one offered by the web exploitation kit.

Related posts:
Secunia: Average insecure program per PC rate remains high
Research: 80% of Web users running unpatched versions of Flash/Acrobat
Fake Security Software Domains Serving Exploits
Massive Scareware Serving Blackhat SEO, the Koobface Gang Style
Koobface Botnet's Scareware Business Model - Part Two
Koobface Botnet's Scareware Business Model - Part One
Koobface Botnet Redirects Facebook's IP Space to my Blog
New Koobface campaign spoofs Adobe's Flash updater
Social engineering tactics of the Koobface botnet
Koobface Botnet Dissected in a TrendMicro Report
Koobface Botnet's Scareware Business Model
Movement on the Koobface Front - Part Two
Movement on the Koobface Front
Koobface - Come Out, Come Out, Wherever You Are
Dissecting Koobface Worm's Twitter Campaign
Dissecting the Koobface Worm's December Campaign
Dissecting the Latest Koobface Facebook Campaign 
The Koobface Gang Mixing Social Engineering Vectors

This post has been reproduced from Dancho Danchev's blog.

Koobface Botnet Starts Serving Client-Side Exploits

UPDATED, Wednesday, December 02, 2009: The systematic rotation of new redirectors and scareware domains remains ongoing, with no signs of resuming the use of client-side exploits.

Some of the latest ones include inviteerverwhere .cn - Email: box@cethcuples.com -> scanner-infoa .com - Email: inout@celestia.com, scareware detection rate; 1economyguide .cn - Email: contact@berussa.de -> superdefenceaj .com - Email: inout@celestia.com, scareware detection rate; slip-stream .cn - Email: info@mercedess.de -> getsafeantivirusa .com - Email: morrison2g@yahoo.com, scareware detection rate.

The complete list of redirectors introduced over the past week is as follows: 1economyguide .cn; 1monocline .cn; 1nonsensical .cn; 1onlinestarter .cn; 1political-news .cn; argentinastyle .cn; australiagold .cn; austriamoney .cn; beatupmean2 .cn; belgiumnation .cn; brazilcountry .cn; firefoxfowner .cn; inviteerverwhere .cn; iraqcontacts .cn; makenodifference2 .cn; manualgreese .cn; overmerit3 .cn; powerhelms2 .cn; secretalltrue2 .cn; separator2009 .cn; slip-stream .cn; solidresistance .cn; wallgreensmart .cn; windowsclone .cn; womenregrets .cn; womenregrets2 .cn

UPDATED, Saturday, November 28, 2009: Following yesterday's experiment with bit.ly redirectors, relying on a "visual social engineering element" by adding descriptive domains after the original link -- bit.ly/588dmE?YOUTUBE.COM/ea05981d43, which works with any generated bit.ly link, the gang is now spamvertising links using Google News redirection to automatically registered Blogspot accounts, whose CAPTCHA challenge has been solved by the already infected with Koobface victims, a feature that is now mainstream, compared to the gang's previous use of commercial CAPTCHA solving services, where the price for a thousand solved CAPTCHAs varies between $1 and $2:

- news.google.com/news/url?url=http://pierrickcastoe .blogspot.com/
- news.google.com/news/url?url=http://biilybiilybangert .blogspot.com/
- news.google.com/news/url?url=http://majdimajdinoordijk .blogspot.com/
- news.google.com/news/url?url=http://vassellpelovska .blogspot.com/
- news.google.com/news/url?url=http://troitroiweinbrenner .blogspot.com/
- news.google.com/news/url?url=http://keyserefrain .blogspot.com/


New redirectors introduced include:
overmerit3 .cn - Email: admin@cryzisday.com
belgiumnation .cn - Email: vesta@greaselive.au
iraqcontacts .cn - Email: admin@resemm.de
womenregrets .cn - Email: admin@resemm.de
wallgreensmart .cn - Email: admin@cryzisday.com
brazilcountry .cn - Email: vesta@greaselive.au
womenregrets2 .cn - Email: in@groovezone.com

News scareware domains introduced include:
internetdefencesystem .com - Email: admin@wyverny.com
royalsecure-a1 .com - Email: in@groovezone.com
royaldefencescan1 .com - Email: in@groovezone.com
royaldefensescan1 .com - Email: in@groovezone.com
royaldefencescan .com - Email: contacts@esseys.au
royaldefensescan .com - Email: contacts@esseys.au
royalprotectionscan .com - Email: contacts@esseys.au

Sampled copy phones back to a new domain (austin2reed .com/?b=1s1; austin2reed .com/?b=1) using the same IP (92.48.119.36) as the previous phone-back domain.

UPDATED, Thursday, November 26, 2009: The gang has currently suspended the use of client-side exploits, let's see if it's only for the time being or indefinitely. Scareware is whatsoever, introduced with periodically registered new domains - argentinastyle .cn - Email: vesta@greaselive.au and australiagold .cn - Email: vesta@greaselive.au, redirect to bestscan066 .com - Email: fransysles2@yahoo.com and to bestscan044 .com - Email: fransysles2@yahoo.com - detection rate.

The exploit serving domains (el3x .cn; kiano-180809 .com and ttt20091124 .info) remain active.

The Koobface botnet, a case study on propagation relying exclusively on social engineering tactics and systematic abuse of legitimate Web 2.0 services, has introduced a second "game-changer" next to the migration to distributed command and control infrastructure once its centralized operations got shut down.

Next to the embedded and automatically rotating scareware redirects placed on each and every infected host part of the Koobface botnet, the gang behind it has now started officially using client-side exploits (VBS/Psyme.BM; Exploit.Pidief.EX; Exploit.Win32.IMG-WMF etc.) by embedding two iFrames on all the Koobface-infected hosts (Underground Molotov - function molot (m)), which connect to a well known (average) web malware exploitation kit's interface. Not only would a user that clicks on the Koobface URL be exposed to the Koobface binary itself, now pushed through client-side exploits, but also, to the periodically changed scareware domains.

Let's dissect the campaign, expose the entire domains portfolio involved or introduced since the beginning of the week, and once again establish a connection between the Koobface gang and money mule recruitment scams followed by scareware domains (Inst_312s2.exe; Inst_312s2.exe from today, both of them phone back to angle-meter .com/?b=1), all registered using the same emails.

Scareware redirectors seen during the past couple of the days, parked at 91.213.126.250:
solidresistance .cn - Email: admin@cryzisday.com
separator2009 .cn - Email: admin@cryzisday.com
zapotec2 .cn - Email: admin@cryzisday.com
befree2 .cn - Email: gmk2000@yahoo.com
entombing2009 .cn - Email: info@grindsteal.fr
economyguide .cn - Email: info@plaguegr.de
smile-life .cn - Email: gmk2000@yahoo.com
everlastmovie .cn - Email: gmk2000@yahoo.com
monocline .cn - Email: info@plaguegr.de
mozzillaclone .cn - Email: sanbeans6@yahoo.com
monkey-greese .cn - Email: sanbeans6@yahoo.com
surgingnurse .cn - Email: info@grindsteal.fr
mailboxinvite .cn - Email: sanbeans6@yahoo.com
flatletkick .cn - Email: info@plaguegr.de
nonsensical .cn - Email: info@grindsteal.fr
moralisefilm .cn - Email: info@grindsteal.fr
firefoxavatar .cn - Email: sanbeans6@yahoo.com
onlinestarter .cn - Email: info@plaguegr.de
clowncirus .cn - Email: sanbeans6@yahoo.com
political-news .cn - Email: info@plaguegr.de
harry-pott .cn - Email: gmk2000@yahoo.com
repeatability .cn - Email: info@grindsteal.fr

New scareware domains portfolio parked at 95.143.192.51; 83.133.119.84; 91.213.126.103:
valuewebscana .com - Email: lynd.stafford@yahoo.com
valuescana .com - Email: lynd.stafford@yahoo.com
cyber-scan-1 .com - Email: admin@dedicatezoom.com
yourantispy-1 .com - Email: shah_indigo@googlemail.com
cyber-scan011 .com - Email: admin@dedicatezoom.com
cyber-scan-2 .com - Email: admin@dedicatezoom.com
antimalware-3 .com - Email: shah_indigo@googlemail.com
yourmalwarescan3 .com - Email: shah_indigo@googlemail.com
antimalwarescana4 .com - Email: j.wirth@smsdetective.com
today-scan4 .com - Email: millercall413@yahoo.com
antispy-scan5 .com - Email: shah_indigo@googlemail.com
yourantivira7 .com - Email: j.wirth@smsdetective.com
yourmalwarescan7 .com - Email: info@bellyn.com
yourantispy-8 .com - Email: info@bellyn.com
cyber-scan08 .com - Email: admin@dedicatezoom.com
cyber-scan09 .com - Email: admin@dedicatezoom.com
beprotected9 .com - Email: essi@calinsella.eu
spyware-scan9 .com - Email: info@bellyn.com
yourantispy-a .com - Email: shah_indigo@googlemail.com
checkforspywarea .com - Email: sanbeans6@yahoo.com
checkfilesherea .com - Email: sanbeans6@yahoo.com
scanfilesherea .com - Email: sanbeans6@yahoo.com
findprotectiona .com - Email: admin@wyverny.com
checkfilesnowa .com - Email: sanbeans6@yahoo.com
web-scanm .com - Email: essi@calinsella.eu
today-scann .com - Email: essi@calinsella.eu
4eay-protection .com - Email: millercall413@yahoo.com

The client-side exploit redirection takes place through three separate domains, all involved in previous Zeus crimeware campaigns, parked on the same IP in a cybercrime-friendly ASN. For instance, el3x.cn/test13/index.php - 210.51.166.119 - Email: Exmanoize@qip.ru redirects to el3x.cn/test13/x.x -> el3x.cn/test13/pdf.php -> el3x.cn/test13/load.php?spl=javad -> el3x.cn/test13/soc.php using VBS/Psyme.BM; Exploit.Pidief.EX; Exploit.Win32.IMG-WMF etc. pushing load.exe, which phones back to a well known "leftover" from Koobface botnet's centralized infrastructure - xtsd20090815 .com/adm/index.php.

Now it gets even more interesting, with the Koobface gang clearly rubbing shoulders with authors of actual web malware exploitation kits, who diversify their cybercrime operations by participating in money mule recruitment scams, zeus crimeware serving campaigns, and scareware.

Parked on 210.51.166.119 where the first iFrame is hosted, are also the following domains participating in related campaigns:
amer0test0 .cn - Email: abusehostserver@gmail.com -> money mule recruitment
antivirusfreec0 .cn - Email: abusehostserver@gmail.com -> money mule recruitment 
arendanomer2 .cn - Email: Exmanoize@qip.ru
dom0cn .cn - Email: Exmanoize@qip.ru
dom1cn .cn - Email: Exmanoize@qip.ru
dom2cn .cn - Email: Exmanoize@qip.ru
domx0 .cn - Email: Exmanoize@qip.ru
domx1 .cn - Email: Exmanoize@qip.ru
domx2 .cn - Email: Exmanoize@qip.ru
dox0 .cn - Email: Exmanoize@qip.ru
dox1 .cn - Email: Exmanoize@qip.ru
dox2 .cn - Email: Exmanoize@qip.ru
dox3 .cn - Email: Exmanoize@qip.ru
edit2china .cn - Email: Exmanoize@qip.ru
edit3china .cn - Email: Exmanoize@qip.ru
el1x .cn - Email: Exmanoize@qip.ru
el2x .cn - Email: Exmanoize@qip.ru
el3x .cn - Email: Exmanoize@qip.ru
gym0replace .cn - Email: chen.poon1732646@yahoo.com -> scareware domain registration
herosima1yet .cn - Email: Exmanoize@qip.ru
herosima1yet00g .cn - Email: abusehostserver@gmail.com
otherchina .cn - Email: Exmanoize@qip.ru
parliament .tk - Email: royalddos@gmail.com
privet1 .cn - Email: Exmanoize@qip.ru
privet2 .cn - Email: Exmanoize@qip.ru
privet3 .cn - Email: Exmanoize@qip.ru
sport-lab .cn - Email: abuseemaildhcp@gmail.com -> money mule recruitment domain registrations
trafdomins .cn - Email: Exmanoize@qip.ru

The second iFrame domain parked at 61.235.117.83 redirects in the following way - kiano-180809 .com/oko/help.html - 61.235.117.83 - Email: bigvillyxxx@gmail.com leads to kiano-180809 .com/oko/dyna_soc.html -> kiano-180809 .com/oko/tomato_guy_13.html -> kiano-180809 .com/oko/update.vbe -> kiano-180809 .com/oko/dyna_wm.wmf.

The same exploitation structure is valid for the third iFrame domain - ttt20091124 .info/oko/help.html which is again, parked at 61.235.117.83 and was embedded at Koobface-infected hosts over the past 24 hours.

What prompted this shift on behalf of the Koobface gang? Declining infection rates -- I'm personally not seeing a decline in the click-through rate, with over 500 clicks on a spamvertised Kooobface URL over a period of 24 hours -- or their obsession with traffic optimization? In terms of social engineering, the periodic introduction of new templates proved highly successful for the gang, but the newly introduced outdated client-side exploits can in fact generate more noise than they originally anticipated, if they were to continue relying on social engineering vectors only.

One thing's certain - the Koobface gang is now on the offensive, and it would be interesting to see whether they'd introduce a new exploits set, or continue relying on the one offered by the web exploitation kit.

Related posts:
Secunia: Average insecure program per PC rate remains high
Research: 80% of Web users running unpatched versions of Flash/Acrobat
Fake Security Software Domains Serving Exploits
Massive Scareware Serving Blackhat SEO, the Koobface Gang Style
Koobface Botnet's Scareware Business Model - Part Two
Koobface Botnet's Scareware Business Model - Part One
Koobface Botnet Redirects Facebook's IP Space to my Blog
New Koobface campaign spoofs Adobe's Flash updater
Social engineering tactics of the Koobface botnet
Koobface Botnet Dissected in a TrendMicro Report
Koobface Botnet's Scareware Business Model
Movement on the Koobface Front - Part Two
Movement on the Koobface Front
Koobface - Come Out, Come Out, Wherever You Are
Dissecting Koobface Worm's Twitter Campaign
Dissecting the Koobface Worm's December Campaign
Dissecting the Latest Koobface Facebook Campaign 
The Koobface Gang Mixing Social Engineering Vectors

This post has been reproduced from Dancho Danchev's blog.

Wednesday, November 18, 2009

Scareware Campaign Using Google Sponsored Links


A scareware campaign is currently using Google sponsored ads, and by hijacking a decent number of well positioned keywords, is attempting to trick visitors into installing scareware featuring several new templates. This is, of course, not the first and definitely not the last time scareware campaigners are using highly targeted legitimate networks in order to reach potential audience by making an investment into the traffic acquisition practice.

However, compared to the "long tail centered" blackhat SEO, the use of legitimate ad networks would never reach a positive ROI, like the one achieved by dynamic syndication of legitimate content and monetizing it through scareware.

Scareware domains seen in circulation: 
adwarealert .com - 75.125.200.226
adware-pro-2009 .com - 209.216.193.113
adwareprosite .com - 188.121.46.1 - Email: pedrocanas75@gmail.com 
adwarepro-site .com - 209.216.193.101 - Email: pedrocanas75@gmail.com 
antimalwarenow .com - 173.201.0.128
anti-malware-pro .org - 209.216.193.103 - Email: pedrocanas75@gmail.com

antimalware-software .com - 209.216.193.11
antimalware-software .org - 209.216.193.106 - Email: pedrocanas75@gmail.com
get-spyware-destroyer .com - 63.243.188.37 - Email: admin@upclick.com
macrovirus .com - 75.125.152.58
malwareprofessional .com - 74.205.8.6


theantimalware .com - 173.201.0.12
adware-pro-live .com - 209.216.193.9
antivirus-live-pro .com - 209.216.193.9
antivirus-live-pro .org
antivirus-live-software .com
antivirus-pro-live .com
antiviruspro-live .com

Sample detection rates: anti-malware-application.exe; malware_professional.exe; macro_virus.exe; antimalware_pro.exe; spyware_destroyer.exe; AdwarePro_Setup.exe; AdwarePro_Setup06.exe; AdwarePro_Setup2305.exe.

Consider going through the The Ultimate Guide to Scareware Protection detailing alternative traffic acquisition approaches used by scareware campaigners, as well as the related posts dissecting recent blackhat SEO campaigns.

Related posts:
Massive Scareware Serving Blackhat SEO, the Koobface Gang Style
Dissecting the Ongoing U.S Federal Forms Themed Blackhat SEO Campaign
U.S Federal Forms Blackhat SEO Themed Scareware Campaign Expanding
Blackhat SEO Campaign Hijacks U.S Federal Form Keywords, Serves Scareware
A Peek Inside the Managed Blackhat SEO Ecosystem 
Dissecting a Swine Flu Black SEO Campaign
Massive Blackhat SEO Campaign Serving Scareware
From Ukrainian Blackhat SEO Gang With Love
From Ukrainian Blackhat SEO Gang With Love - Part Two
From Ukraine with Scareware Serving Tweets, Bogus LinkedIn/Scribd Accounts, and Blackhat SEO Farms
Fake Web Hosting Provider - Front-end to Scareware Blackhat SEO Campaign at Blogspot

This post has been reproduced from Dancho Danchev's blog.

Tuesday, November 17, 2009

"Your mailbox has been deactivated" Spam Campaign Serving Crimeware

An ongoing "Your mailbox has been deactivated" themed spam campaign is pushing crimeware as an attached utility.zip archive.

Subject: your mailbox has been deactivated
Message: "We are contacting you in regards to an unusual activity that was identified in your mailbox. As a result, your mailbox has been deactivated. To restore your mailbox, you are required to extract and run the attached mailbox utility. Best regards, hush.com technical support."
Different signatures used: "From Webmail Help Desk; From hush.com technical support; From msmvps.com technical support; From ahnlab.com technical support; From symantec.com technical support"

Sampled obtained phones back to 193.104.27 .91/limpopo/bb.php?id=636608811&v=200&tm=2&b=4316315581; 193.104.27 .91/limpopo/bb.php?id=554275088&v=200&tm=8&b=4316315581&tid=11&r=1, from where it downloads promed-net .com/css/abs.exe (97.74.144.118; Email: ninemed@ninemedical.com ) which phones back to 231307d91138.bauhath.com/get.php?c=QPTUDBSV&d=, downloading 91.213.72 .51/ldr7.exe which phones back to 193.104.27 .42/lcc/ip2.gif which is TrojWare.Win32.TrojanSpy.Zbot.Gen

All of these IPs are not surprisingly known Zeus crimeware hosts.

Related phone-back locations parked on the same IP - 94.75.221.76:
koralda .com - Email: owner@koralda.com
antiona .com - Email: owner@antiona.com
lambrie .com - Email: owner@lambrie.com
bauhath .com - Email: owner@bauhath.com
agulhal .com - Email: owner@agulhal.com
lantzel .com - Email: owner@lantzel.com
bourgum .com - Email: owner@bourgum.com

101607d91120.koralda .com
141607d91121.koralda .com
121607d91122.koralda .com
161607d91123.koralda .com
141607d91124.koralda .com
181607d91125.koralda .com
011607d91106.koralda .com
171507d91116.koralda .com
161607d91126.koralda .com
231507d91107.koralda .com
201607d91127.koralda .com
031607d91108.koralda .com
191507d91118.koralda .com
011607d91109.koralda .com
171507d91119.koralda .com
221607d91129.koralda .com
201607d9112a.koralda .com
031607d9110b.koralda .com
191507d9111b.koralda .com
081607d9111b.koralda .com
221607d9112c.koralda .com
101607d9111d.koralda .com
081607d9111e.koralda .com
121607d9111f.koralda .com
211507d91131.antiona .com
231507d91133.antiona .com
081207d91134.antiona .com
121607d91115.antiona .com
001307d91106.antiona .com
201307d91108.antiona .com
121107d91128.antiona .com
021107d91129.antiona .com
221307d9110a.antiona .com

231107d9111a.antiona .com
230907d9111b.antiona .com
041107d9112b.antiona .com
011207d9111c.antiona .com
081307d9110d.antiona .com
061107d9112d.antiona .com
191407d9112d.antiona .com
171307d9111f.antiona .com
211407d9112f.antiona .com
042707d90914.agrigid .com
101607d91121.lambrie .com
121607d91122.lambrie .com
141607d91124.lambrie .com
161607d91126.lambrie .com
231507d91107.lambrie .com
181607d91128.lambrie .com
011607d91109.lambrie .com
171507d91119.lambrie .com
201607d9112a.lambrie .com
031607d9110b.lambrie .com
191507d9111b.lambrie .com
221607d9112c.lambrie .com
081607d9111e.lambrie .com
081607d91100.bauhath .com
071607d91130.bauhath .com
121607d91101.bauhath .com
201607d91111.bauhath .com
221307d91102.bauhath .com
051107d91122.bauhath .com
141607d91103.bauhath .com

151207d91113.bauhath .com
221607d91113.bauhath .com
221307d91104.bauhath .com
071107d91124.bauhath .com
171207d91115.bauhath .com
051007d91126.bauhath .com
091107d91126.bauhath .com
101607d91107.bauhath .com
191207d91117.bauhath .com
051207d91127.bauhath .com
071007d91128.bauhath .com
071207d91128.bauhath .com
121607d91109.bauhath .com
211207d91119.bauhath .com
091007d9112a.bauhath .com
131107d9112a.bauhath .com
091207d9112a.bauhath .com
051607d9113a.bauhath .com
231207d9111b.bauhath .com
091607d9113b.bauhath .com
141607d9110c.bauhath .com
111007d9112c.bauhath .com
111207d9112c.bauhath .com
161607d9110d.bauhath .com
071607d9112d.bauhath .com
181607d9110f.bauhath .com
181007d91132.edvehal .com
181007d91135.edvehal .com
181207d91110.agulhal .com
091007d91120.agulhal .com
211007d91130.agulhal .com
041307d91130.agulhal .com

111007d91122.agulhal .com
061307d91132.agulhal .com
131207d91123.agulhal .com
131007d91124.agulhal .com
151207d91125.agulhal .com
230907d91116.agulhal .com
151007d91126.agulhal .com
061207d91127.agulhal .com
011007d91118.agulhal .com
171007d91128.agulhal .com
031007d9111a.agulhal .com
021207d9111b.agulhal .com
121107d9113b.agulhal .com
051007d9111c.agulhal .com
011107d9110d.agulhal .com
041207d9111d.agulhal .com
191007d9112d.agulhal .com
161207d9110e.agulhal .com
071007d9111e.agulhal .com
141607d91100.lantzel .com
081607d91100.lantzel .com
221607d91110.lantzel .com
121607d91101.lantzel .com
171207d91111.lantzel .com
201607d91111.lantzel .com
071107d91121.lantzel .com
051107d91122.lantzel .com
141607d91103.lantzel .com
151207d91113.lantzel .com
191207d91113.lantzel .com
221607d91113.lantzel .com
051007d91123.lantzel .com

091107d91123.lantzel .com
051207d91123.lantzel .com
101607d91104.lantzel .com
071107d91124.lantzel .com
211207d91115.lantzel .com
171207d91115.lantzel .com
071007d91125.lantzel .com
111107d91125.lantzel .com
071207d91125.lantzel .com
121607d91106.lantzel .com
051007d91126.lantzel .com
091107d91126.lantzel .com
051207d91126.lantzel .com
101607d91107.lantzel .com
231207d91117.lantzel .com
191207d91117.lantzel .com
091007d91127.lantzel .com
131107d91127.lantzel .com
091207d91127.lantzel .com
051607d91137.lantzel .com
141607d91108.lantzel .com
071007d91128.lantzel .com
111107d91128.lantzel .com
071207d91128.lantzel .com
091607d91138.lantzel .com
121607d91109.lantzel .com
211207d91119.lantzel .com
111007d91129.lantzel .com
111207d91129.lantzel .com

071607d91139.lantzel .com
161607d9110a.lantzel .com
091007d9112a.lantzel .com
131107d9112a.lantzel .com
091207d9112a.lantzel .com
111607d9113a.lantzel .com
051607d9113a.lantzel .com
141607d9110b.lantzel .com
231207d9111b.lantzel .com
091607d9113b.lantzel .com
181607d9110c.lantzel .com
111007d9112c.lantzel .com
111207d9112c.lantzel .com
161607d9110d.lantzel .com
201607d9110e.lantzel .com
151207d9110f.lantzel .com
181607d9110f.lantzel .com
051107d9111f.lantzel .com
131507d91100.bourgum .com
231507d91130.bourgum .com
221207d91101.bourgum .com

211507d91131.bourgum .com
001307d91103.bourgum .com
231507d91133.bourgum .com
001107d91124.bourgum .com
081207d91134.bourgum .com
201307d91105.bourgum .com
121607d91115.bourgum .com
001307d91106.bourgum .com
021107d91126.bourgum .com
091207d91107.bourgum .com
221307d91107.bourgum .com
231107d91117.bourgum .com
201307d91108.bourgum .com
230907d91118.bourgum .com
121107d91128.bourgum .com
041107d91128.bourgum .com
211007d91138.bourgum .com
011207d91119.bourgum .com
021107d91129.bourgum .com

Naturally, the campaign isn't an isolated incident, with previous "Facebook updated account agreement" themed ones, using the same phone back locations as the currently ongoing one. 

Related posts:
Ongoing FDIC Spam Campaign Serves Zeus Crimeware
The Multitasking Fast-Flux Botnet that Wants to Bank With You

This post has been reproduced from Dancho Danchev's blog.

Massive Scareware Serving Blackhat SEO, the Koobface Gang Style


Ali Baba and the 40 thieves LLC are once again multi-tasking, this time compromising hundreds of thousands of web sites, and redirecting Google visitors -- through the standard http referrer check -- to scareware serving domains.

What's so special about the domains mentioned in Cyveillance's post, as well as the ones currently active on this campaign? It's the Koobface connection.

For instance, the ionisationtools .cn or moored2009 .cn redirectors, as well as the scareware serving premium-protection6 .com; file-antivirus3.com; checkalldata .com; foryoumalwarecheck4 .com; antispy-scan1 .com mentioned in post, are the same scareware redirectors and domains analyzed in part two of the Koobface Botnet's Scareware Business Model series. The identical structure on a sampled Koobface infected host and a sampled compromised site can be seen in the attached screenshots.


The redirection "magic" takes place through a what looks like a static css.js (Trojan-Downloader.JS.FraudLoad) uploaded on all of the affected sites. The very latest blackhat SEO once again puts the Koobface gang in the spotlight of the ongoing underground multi-tasking that the majority of cybercriminals engage in these days.

Related posts:
Koobface Botnet's Scareware Business Model - Part Two
Koobface Botnet's Scareware Business Model - Part One
Koobface Botnet Redirects Facebook's IP Space to my Blog
New Koobface campaign spoofs Adobe's Flash updater
Social engineering tactics of the Koobface botnet
Koobface Botnet Dissected in a TrendMicro Report
Koobface Botnet's Scareware Business Model
Movement on the Koobface Front - Part Two
Movement on the Koobface Front
Koobface - Come Out, Come Out, Wherever You Are
Dissecting Koobface Worm's Twitter Campaign
Dissecting the Koobface Worm's December Campaign
Dissecting the Latest Koobface Facebook Campaign 
The Koobface Gang Mixing Social Engineering Vectors

This post has been reproduced from Dancho Danchev's blog.

Massive Scareware Serving Blackhat SEO, the Koobface Gang Style


Ali Baba and the 40 thieves LLC are once again multi-tasking, this time compromising hundreds of thousands of web sites, and redirecting Google visitors -- through the standard http referrer check -- to scareware serving domains.

What's so special about the domains mentioned in Cyveillance's post, as well as the ones currently active on this campaign? It's the Koobface connection.

For instance, the ionisationtools .cn or moored2009 .cn redirectors, as well as the scareware serving premium-protection6 .com; file-antivirus3.com; checkalldata .com; foryoumalwarecheck4 .com; antispy-scan1 .com mentioned in post, are the same scareware redirectors and domains analyzed in part two of the Koobface Botnet's Scareware Business Model series. The identical structure on a sampled Koobface infected host and a sampled compromised site can be seen in the attached screenshots.


The redirection "magic" takes place through a what looks like a static css.js (Trojan-Downloader.JS.FraudLoad) uploaded on all of the affected sites. The very latest blackhat SEO once again puts the Koobface gang in the spotlight of the ongoing underground multi-tasking that the majority of cybercriminals engage in these days.

Related posts:
Koobface Botnet's Scareware Business Model - Part Two
Koobface Botnet's Scareware Business Model - Part One
Koobface Botnet Redirects Facebook's IP Space to my Blog
New Koobface campaign spoofs Adobe's Flash updater
Social engineering tactics of the Koobface botnet
Koobface Botnet Dissected in a TrendMicro Report
Koobface Botnet's Scareware Business Model
Movement on the Koobface Front - Part Two
Movement on the Koobface Front
Koobface - Come Out, Come Out, Wherever You Are
Dissecting Koobface Worm's Twitter Campaign
Dissecting the Koobface Worm's December Campaign
Dissecting the Latest Koobface Facebook Campaign 
The Koobface Gang Mixing Social Engineering Vectors

This post has been reproduced from Dancho Danchev's blog.

Monday, November 16, 2009

One Year Worth of Zeus Crimeware Development Through the Eyes of the Cybercriminal

Despite the fact that the Zeus crimeware kit is a victim of "


Managed Cybercrime-as-a-Services as a commodity



Related posts:

Keeping Money Mule Recruiters on a Short Leash


The money mule recruitment syndicate exposed in a previous post (Standardizing the Money Mule Recruitment Process), continues introducing new domains and re-branding the de-facto recruitment templates for a huge percentage of the currently active money mule recruitment scams.

Ironically, both the syndicate and its competition in the face of boutique money mule recruitment operations aiming to self-service the cybercriminal -- he doesn't want to share stolen revenue with a third-party service provider -- behind them, are using the copywriting and online brand management services courtesy of a single vendor.

It's time to expose the complete domains portfolio of one of their biggest customers, including both domains introduced since the middle of the summer, 2009, as well as the most recent ones, with all of them using/having used the services of AS:38356.

Parked at 222.35.137.234; 222.35.137.235; 222.35.137.236; 222.35.137.237; 222.35.137.238 as of Monday, November 18 are the following money mule recruitment domains:
affina-groupsvc .cc - Email: justin_dickerson@ymail.com
altgroupco .cn - Email: abuseemaildhcp@gmail.com
alt-groupco .net - Email: MarcusStraker909@gmail.com
annuity-groupnet .cc - Email: justin_dickerson@ymail.com
archway-groupinc .cn - Email: abuseemaildhcp@gmail.com
armor-groupco .cc - Email: defrankpo@gmail.com
ava-group .cc - Email: Gregory.Michell2009@yahoo.com
ava-group .cn - Email: Gregory.Michell2009@yahoo.com
ava-groupsvc .cc - Email: Gregory.Michell2009@yahoo.com
avagroupsvc .cn - Email: Gregory.Michell2009@yahoo.com
bfs-groupinc .cc - Email: defrankpo@gmail.com
braingroupmain .cn - Email: abuseemaildhcp@gmail.com
brain-groupsvc .cn - Email: abuseemaildhcp@gmail.com
ccn-groupco .cn - Email: Gregory.Michell2009@yahoo.com
cdi-groupmain .cn - Email: garry_honn@yahoo.com
cosco-groupmain .cn - Email: andrew_cc@yahoo.com
criscom-group .cc - Email: Gregory.Michell2009@yahoo.com
criscomgroupco .cn - Email: Gregory.Michell2009@yahoo.com
criscom-groupinc .cc - Email: Gregory.Michell2009@yahoo.com
cronos-group .net - Email: MarcusStraker909@gmail.com
cronos-groupinc .cn - Email: abuseemaildhcp@gmail.com
cronos-groupinc .com - Email: bias@co5.ru
cronosgroupsvc .cn - Email: abuseemaildhcp@gmail.com
dove-groupli .cn - Email: abuseemaildhcp@gmail.com
entrustgroup .cn - Email: moldavimo@safe-mail.net
extreme-groupinc .cn - Email: abuseemaildhcp@gmail.com
fairline-group .cn - Email: Gregory.Michell2009@yahoo.com
flatgroupfly .cc - Email: steven_lucas_2000@yahoo.com
full-controll .cc - Email: morgan.greg@yahoo.com

geniouspartner .cn - Email: morgan.greg@yahoo.com
holding-group .cn - Email: ronny.greg@yahoo.com
igt-groupco .cn - Email: abuseemaildhcp@gmail.com
igtgroupinc .cn - Email: abuseemaildhcp@gmail.com
igt-groupinc .com - Email: feet@freemailbox.ru
index-groupinc .cn - Email: abuseemaildhcp@gmail.com
index-groupinc .com - Email: taffy@blogbuddy.ru
indexgroupinc .net - Email: MarcusStraker909@gmail.com
index-groupmain .cn - Email: abuseemaildhcp@gmail.com
ing-groupsvc .cn - Email: admin@emerge-groupnet.cn
integrity-groupinc .cc - Email: justin_dickerson@ymail.com
invalda-groupli .cn - Email: rocco_invalda@yahoo.com
invalda-groupmain .cn - Email: rocco_invalda@yahoo.com
invalda-groupmain .com - Email: chum@cheapmail.ru
landgroupinc .cn - Email: abuseemaildhcp@gmail.com
landgroupinc .net - Email: MarcusStraker909@gmail.com
land-groupsvc .cn - Email: abuseemaildhcp@gmail.com
land-groupsvc .com - Email: bias@co5.ru
libertygroup .cc - Email: LindseyKimSI@gmail.com
lime-groupnet .cn - Email: abuseemaildhcp@gmail.com
lime-groupsvc .cn - Email: abuseemaildhcp@gmail.com
margin-groupco .cn - Email: Gregory.Michell2009@yahoo.com
margingroupinc .cn - Email: regory.Michell2009@yahoo.com
massivegroupsvc .cn - Email: abuseemaildhcp@gmail.com
mastergroupinc .cn - Email: abuseemaildhcp@gmail.com
master-groupinc .com - Email: taffy@blogbuddy.ru
master-groupsvc .cn - Email: taffy@blogbuddy.ru
mellis-group .cn - Email: abuseemaildhcp@gmail.com
mellis-groupmain .cn - Email: abuseemaildhcp@gmail.com

mena-groupsvc .cn - Email: abuseemaildhcp@gmail.com
nvidia-groupnet .cn - Email: Gregory.Michell2009@yahoo.com
nvidia-groupsvc .cn - Email: Gregory.Michell2009@yahoo.com
opm-groupli .com - Email: entrap@namebanana.net
phoenix-groupco .net - Email: MarcusStraker909@gmail.com
phoenix-groupmain .cn - Email: abuseemaildhcp@gmail.com
premier-groupinc .cn - Email: abuseemaildhcp@gmail.com
premier-groupinc .com - Email: gone@corporatemail.ru
premier-groupnet .cc - Email: justin_dickerson@ymail.com
prime-groupco .cn - Email: abuseemaildhcp@gmail.com
prime-groupinc .cn - Email: abuseemaildhcp@gmail.com
puritan-groupco .cc - Email: justin_dickerson@ymail.com
puritan-groupco .cn - Email: abuseemaildhcp@gmail.com
puritan-groupinc .cn - Email: abuseemaildhcp@gmail.com
puritan-groupinc .com - Email: gone@corporatemail.ru
realtek-groupnet .cn - Email: Gregory.Michell2009@yahoo.com
realtekgroupsvc .cn - Email: Gregory.Michell2009@yahoo.com
reddbutton .cn - Email: morgan.greg@yahoo.com
redeye-groupco .cn - Email: abuseemaildhcp@gmail.com
redeye-groupinc .cn - Email: abuseemaildhcp@gmail.com
regency-groupco .com - Email: gone@corporatemail.ru
regency-groupnet .cc - Email: justin_dickerson@ymail.com

regency-groupnet .cn - Email: abuseemaildhcp@gmail.com
safegroupsvc .cn - Email: Gregory.Michell2009@yahoo.com
saturn-groupsvc .cn - Email: darry_wisp@yahoo.com
scope-group .cn - Email: don.ram@yahoo.com
scope-groupmain .cc - Email: darry_wisp@yahoo.com
scope-groupmain .cn - Email: abuseemaildhcp@gmail.com
stargroupinc .cn - Email: abuseemaildhcp@gmail.com
star-groupinc .net - Email: MarcusStraker909@gmail.com
star-groupsvc .cn - Email: abuseemaildhcp@gmail.com
star-groupsvc .com - Email: taffy@blogbuddy.ru
summit-groupinc .cn - Email: Gregory.Michell2009@yahoo.com
theblackend .cn - Email: morgan.greg@yahoo.com
totallysmiled .cn - Email: morgan.greg@yahoo.com
vector-groupfine .cn - Email: justin_dickerson@ymail.com
vision-groupinc .cc - Email: vision-groupinc.cc
vision-groupsvc .com - Email: gone@corporatemail.ru
windcontrol .cc - Email: morgan.greg@yahoo.com

Nothing's isolated, everything's connected, and sadly orchestrated by a very distinct set of cybercrime enterprises, the market share leaders.

Related posts:
Standardizing the Money Mule Recruitment Process
Money Mule Recruiters use ASProx's Fast Fluxing Services
Money Mules Syndicate Actively Recruiting Since 2002
Inside a Money Laundering Group's Spamming Operations

This post has been reproduced from Dancho Danchev's blog.

Wednesday, November 11, 2009

Koobface Botnet's Scareware Business Model - Part Two

UPDATED - Wednesday, November 18, 2009: A new update is pushed to the hundreds of thousands infected hosts, which is now performing the redirection using dynamically generated .swf files, with every page using the same title "Wonderful Video". The redirection is also a relatively static process.

For instance, if the original koobface redirector is koobface.infected.host/301, followed by the .swf redirection it will output koobface.infected.host/301/?go.

New redirectors and scareware domains pushed within the past few hours include - everlastmovie .cn - Email: gmk2000@yahoo.com; smile-life .cn - Email: gmk2000@yahoo.com ; harry-pott .cn - Email: gmk2000@yahoo.com, beprotected9 .com - Email: essi@calinsella.eu and antivir3 .com - Email: essi@calinsella.eu.

UPDATED - Tuesday, November 17, 2009: Koobface is resuming scareware (Inst_312s2.exe) operations at 91.212.107.103 which was taken offline for a short period of time. ISP has been notified again, action should be taken shortly. The current domain portfolio including new ones parked there: 

ereuqba .cn - Email: spscript@hotmail.com
eqoxyda .cn - Email: spscript@hotmail.com
evouga .cn - Email: spscript@hotmail.com
edivuka .cn - Email: spscript@hotmail.com
ebeama .cn - Email: spscript@hotmail.com
kebugac .cn - Email: spscript@hotmail.com
eqoabce .cn - Email: spscript@hotmail.com
kixyhce .cn - Email: spscript@hotmail.com
cecyde .cn - Email: spscript@hotmail.com
evybine .cn - Email: spscript@hotmail.com
eqaone .cn - Email: spscript@hotmail.com
dyqunre .cn - Email: spscript@hotmail.com
byzivte .cn - Email: spscript@hotmail.com
dovzyag .cn - Email: spscript@hotmail.com
ebeozag .cn - Email: spscript@hotmail.com
cafgouh .cn - Email: spscript@hotmail.com
kebfoki .cn - Email: spscript@hotmail.com
ebogumi .cn - Email: spscript@hotmail.com
dyzani .cn - Email: spscript@hotmail.com
dybapi .cn - Email: spscript@hotmail.com
dusyti .cn - Email: spscript@hotmail.com
dutsyvi .cn - Email: spscript@hotmail.com
dutfij .cn - Email: spscript@hotmail.com
bysivak .cn - Email: spscript@hotmail.com
eqiovak .cn - Email: spscript@hotmail.com

cecxoyk .cn - Email: spscript@hotmail.com
dyqkuam .cn - Email: spscript@hotmail.com
edamym .cn - Email: spscript@hotmail.com
eqibuym .cn - Email: spscript@hotmail.com
ducyqan .cn - Email: spscript@hotmail.com
duzebyn .cn - Email: spscript@hotmail.com
etyawjo .cn - Email: spscript@hotmail.com
cerdiko .cn - Email: spscript@hotmail.com
erauso .cn - Email: spscript@hotmail.com
etuacwo .cn - Email: spscript@hotmail.com
etuexyp .cn - Email: spscript@hotmail.com
etywuq .cn - Email: spscript@hotmail.com
ebejar .cn - Email: spscript@hotmail.com
ebiuhas .cn - Email: spscript@hotmail.com
dozabes .cn - Email: spscript@hotmail.com
eqoybu .cn - Email: spscript@hotmail.com
eviyzru .cn - Email: spscript@hotmail.com
evaopsu .cn - Email: spscript@hotmail.com
ebaetu .cn - Email: spscript@hotmail.com
dytrevu .cn - Email: spscript@hotmail.com
eboezu .cn - Email: spscript@hotmail.com
eruqav .cn - Email: spscript@hotmail.com
eqoumiv .cn - Email: spscript@hotmail.com
epuneyv .cn - Email: spscript@hotmail.com
etykauw .cn - Email: spscript@hotmail.com
ebeoxuw .cn - Email: spscript@hotmail.com
eqidax .cn - Email: spscript@hotmail.com
evaolux .cn - Email: spscript@hotmail.com
cafropy .cn - Email: spscript@hotmail.com
etyupy .cn - Email: spscript@hotmail.com
kebquty .cn - Email: spscript@hotmail.com
cakevy .cn - Email: spscript@hotmail.com
eqouwy .cn - Email: spscript@hotmail.com
epuvyiz .cn - Email: spscript@hotmail.com 

UPDATED - Monday, November 16, 2009: The Koobface gang is pushing a new update, followed by a new portfolio of scareware redirectors and actual scareware serving domains.

New portfolio of redirectors parked at 91.213.126.250:
befree2 .cn - Email: gmk2000@yahoo.com
scandinavianmall .cn - Email: admin@calen.be 
densityoze .cn - Email: admin@calen.be
moored2009 .cn - Email: cael@newstile.it
pica-pica .cn - Email: cael@newstile.it
stroboscopicmovie .cn - Email: cael@newstile.it
comedienne .cn - Email: admin@calen.be
densityoze .cn - Email: admin@calen.be
furorcorner .cn - Email: cael@newstile.it
ionisationtools .cn - Email: guzimi@brendymail.de
wax-max .cn - Email: cael@newstile.it
plate-tracery .cn - Email: guzimi@brendymail.de
little-bitty .cn - Email: admin@calen.be
night-whale .cn - Email: admin@calen.be
scary-scary .cn - Email: gmk2000@yahoo.com

Second redirectors portfolio at 91.213.126.102:
disorganization000 .cn - Email: guzimi@brendymail.de
rainbowlike .cn - Email: HuiYingTsui@airways.au
skewercall .cn - Email: HuiYingTsui@airways.au
wegenerinfo .cn - Email: guzimi@brendymail.de
kangaroocar .cn - Email: HuiYingTsui@airways.au
pericallis .cn - Email: HuiYingTsui@airways.au
treasure-planet .cn - Email: guzimi@brendymail.de
genusbiz .cn - Email: HuiYingTsui@airways.au

Currently pushing scareware from primescan1 .com - 83.133.124.149; 91.213.126.103; 83.133.119.84; 85.12.24.13. Sampled scareware phones back to windowsupdate8 .com/download/timesroman.tif - 88.198.105.145 and angle-meter .com/?b=1 (safewebnetwork .com) - 92.48.119.36.

More scareware domains are parked on the same IPs:
yourantivira7 .com - Email: j.wirth@smsdetective.com - detection rate
web-scanm .com - Email: essi@calinsella.eu - detection rate
yourantivira3 .com (wwwsecurescana1 .com) - Email: j.wirth@smsdetective.com
primescan8 .com
online-check-v11 .com
antivir-scan1 .com - Email: contact@armadastate.us
antispy-scan1 .com - Email: contact@armadastate.us
primescan1 .com
checkforspyware2 .com - Email: admin@calen.be
pc-antispyware3 .com - Email: contact@spaintours.com
premium-protection6 .com - Email: contact@spaintours.com
antivir7 .com - Email: admin@maternitycloth.eu
online-check-v7 .com
beprotected8 .com - Email: admin@maternitycloth.eu
pc-antispyware9 .com - Email: contact@spaintours.com
online-check-v9 .com
checkfileshere .com - Email: admin@calen.be
scanfileshere .com - Email: admin@calen.be
antivir-scano .com - Email: contact@armadastate.us
check-files-now .com - Email: admin@calen.be
antivir-scanz .com - Email: contact@armadastate.us
antispy-scanz .com - Email: contact@armadastate.us

ISP's contributing the the monetization of Koobface have been notified.

UPDATE: 91.212.107.103 has been taken offline courtesy of Blue Square Data Group Services Limited -- previous cooperation took place within a 3 hour period -- with the Koobface gang migrating scareware operations to 93.174.95.191 (AS29073 ECATEL-AS , Ecatel Network) and 188.40.52.181; 188.40.52.180 - (AS24940, HETZNER-AS Hetzner Online AG RZ) - ISPs have been notified.

The .info scareware domain portfolio will be suspended within the next 24 hours.

Ali Baba and the 40 thieves LLC a.k.a my Ukrainian "fan club", the one with the Bahama botnet connection, the recent malvertising attacks connection, and the current market leader of black hat search engine optimization campaigns, has been keeping themselves busy over the past couple of weeks, continuing to add additional layers of legitimacy into their campaigns (bit.ly redirectors to blogspot.com accounts leading to compromised hosts), proving that if a cybercrime enterprise wants to, it can run its malicious operations on the shoulders of legitimate service providers using them as "virtual human shield" in order to continue its operations without fear of retribution.
Over the past two weeks, the Koobface gang once again indicated that it reads my blog, "appreciates" the ways I undermine the monetization element of their campaigns, and next to redirecting Facebook's entire IP space to my blog, they've also, for the first time ever, moved from using my name in their redirectors, to typosquatting it.

For instance, the -- now suspended -- Koobface domain pancho-2807 .com is registered to Pancho Panchev, pancho.panchev@gmail.com, followed by rdr20090924 .info registered to Vancho Vanchev, vanchovanchev@mail.ru. As always, I'm totally flattered, and I'm still in a "stay tuned" mode for my very own branded scareware release - the Advanced Pro-Danchev Premium Live Mega Professional Anti-Spyware Online Cleaning Cyber Protection Scanner 2010.

It's time to summarize some of the Koobface gang's recent activities, establish a direct connection with the Bahama botnet, the Ukrainian dating scam agency Confidential Connections whose botnet operations were linked to money-mule recruitment scams, with active domains part of their affiliate network parked at a Koobface-connected scareware serving domains, followed by the fact that they're all responding to an IP involved in the ongoing U.S Federal Forms themed blackhat SEO campaign. It couldn't get any uglier.

As of recently the gang has migrated to a triple-layer of legitimate infrastructure, consisting of bit.ly redirectors, leading to automatically registered Blogspot account which redirect to Koobface infected hosts serving the Koobface binary and the redirecting to a periodically updated scareware domain. Here are some of the domains involved.

Ongoing campaing dynamically generating bit.ly URLs redirecting to automatically registered Blogspot accounts, using the following URLs:
bit.ly /VumFK -> drbryanferazzoli .blogspot.com
bit.ly /lJcK3 -> toyetoyebalnaja .blogspot.com
bit.ly /3mFyzs -> raimeishelkowitz .blogspot.com
bit.ly /2wuSPj -> kelakelamccovery .blogspot.com
bit.ly /2Pnn8l -> pattyedevero .blogspot.com
bit.ly /2wuSPj -> kelakelamccovery .blogspot.com
bit.ly /1HDmbm -> malinegainey-green. blogspot.com
bit.ly /2xf5vB -> advaadvarukuni .blogspot.com
bit.ly /3mFyzs -> raimeishelkowitz .blogspot.com
bit.ly /2xf5vB -> advaadvarukuni .blogspot.com
bit.ly /46pcCI -> paulangelogaetano .blogspot.com
bit.ly /1HDmbm -> malinegainey-green .blogspot.com
bit.ly /3JZsDD -> derieuwsdarrius .blogspot.com
bit.ly /lJcK3 -> toyetoyebalnaja .blogspot.com
bit.ly /2h7XRU -> shunnarahamandla .blogspot.com
bit.ly /3JZsDD -> derieuwsdarrius .blogspot.com
bit.ly /3Zj98G -> schubachmarquis .blogspot.com
bit.ly /1sXgRH -> nicnicmiralles .blogspot.com
bit.ly /3eijza -> froneksaxxon .blogspot.com
bit.ly /1I3rr7 -> attreechappy .blogspot.com
bit.ly /2m3wP4 -> bilsboroughkebrom .blogspot.com
bit.ly /30wcJn -> raheelanucci .blogspot.com
bit.ly /2U7jYM -> orvelorvelblues .blogspot.com
bit.ly /1CWOlZ -> kondrackinehemias .blogspot.com
bit.ly /2m3wP4 -> bilsboroughkebrom .blogspot.com
bit.ly /1qbXsi -> lizzamottymotty .blogspot.com
bit.ly /79ONz -> rayvongonsalves .blogspot.com
bit.ly /22Jyex -> klaartjebjorgvinsson .blogspot.com
bit.ly /p07jC -> humphriesteelateela .blogspot.com
bit.ly /2lpZXx -> kalandraaleisha .blogspot.com

The Blogspot accounts consist of a single post of automatically syndicated news item, which compared to previous campaign which relied on 25+ Koobface infected IPs directly embedded at Blogspot itself, this time relies on a single URL which attempts to connect to any of the Koobface infected IPs embedded on it. The currently active campaign redirects to rainbowlike cn/?pid=312s02&sid=4db12f, which then redirects to the scareware domain secure-your-files .com, with the sample phoning back to forbes-2009 .com/?b=1s1 - 113.105.152.230, with another domain parked there activate-antivirus .com - Email: support@personal-solutions.com.

Time to expose the entire portfolio of scareware domains pushed by the gang, and offer some historical OSINT data on their activities which were not publicly released until enough connections between multiple campaigns were established.Which ISPs are currently offering hosting services for the scareware domains portfolio pushed by the Koobface gang? The current portfolio is parked at 206.217.201.245 (AS36351 SOFTLAYER Technologies Inc. surprise, surprise!); 212.117.174.19 (AS44042 ROOT eSolutions surprise, surprise part two) and at 91.212.226.155 (AS44042 ROOT eSolutions).

Scareware redirectors parked at 91.213.126.102:
rainbowlike .cn - Email: HuiYingTsui@airways.au
authorized-payments .com - Email: degrysemario@googlemail.com
poltergeist2000 .cn - Email: nfrank@flamcon.com.cn
sestiad2 .cn - Email: PietroToscani@celli.it
uninformed2 .cn - Email: PietroToscani@celli.it
retrocession2 .cn - Email: PietroToscani@celli.it
unimpressible3 .cn - Email: PietroToscani@celli.it
uncrown3 .cn - Email: PietroToscani@celli.it
sneak-peak .cn - Email: info@Milwaukee911.com
cellostuck .cn - Email: info@Milwaukee911.com
stinkingthink .cn - Email: nfrank@flamcon.com.cn
skewercall .cn - Email: HuiYingTsui@airways.au
be-spoken .cn - Email: info@Milwaukee911.com
transmitteron .cn - Email: nfrank@flamcon.com.cn
kangaroocar .cn - Email: HuiYingTsui@airways.au
pericallis .cn - Email: HuiYingTsui@airways.au
exponentials .cn - Email: info@Milwaukee911.com
triforms .cn - Email: info@Milwaukee911.com
outperformoly .cn - Email: nfrank@flamcon.com.cn
genusbiz .cn - Email: HuiYingTsui@airways.au

Scareware domains parked at 206.217.201.245; 212.117.174.19 and 91.212.226.155:
anti-malware-scan-for-you .com - Email: information@brunter.sw
available-scanner .com - Email: m.smith@Recruiters.com
bewareofspyware .com - Email: m.smith@Recruiters.com
defender-scan-for-you .com - Email: information@brunter.sw
defender-scan-for-you3 .com - Email: informatio@belize.ca
foryoumalwarecheck .com - Email: information@brunter.sw
friends-protection .com - Email: m.smith@Recruiters.com
further-scan .com - Email: m.smith@Recruiters.com
goodonlineprotection .com - Email: info@time.co.uk
good-scans .com - Email: m.smith@Recruiters.com
guidetosecurity3 .com - Email: info@time.co.uk
howtocleanpc2 .com - Email: admin@gnar-star.com
howtoprotectpc3 .com - Email: admin@gnar-star.com
howtosecure2 .com - Email: admin@gnar-star.com
howtosecurea .com - Email: admin@gnar-star.com
how-to-secure-pc2 .com - Email: admin@gnar-star.com
protection-secrets .com - Email: info@time.co.uk
scan-for-you .com - Email: information@brunter.sw
scannerantimalware2 .com
scannerantimalware4 .com
scannerantimalware6 .com
secure-your-data0 .com - Email: spradlin@carrental.com
secure-your-files .com - Email: spradlin@carrental.com
security-guide5 .com - Email: JohnnySMcmillan@yahoo.com
security-info1 .com - Email: JohnnySMcmillan@yahoo.com
security-tips3 .com - Email: info@time.co.uk
security-tools4 .com - Email: JohnnySMcmillan@yahoo.com
webviruscheck1 .com
webviruscheck-4 .com
webviruscheck5 .com

Let us further expand the portfolio by listing the newly introduced scareware domains at 91.212.107.103, which was first mentioned in part one of the Koobface Botnet's Scareware Business Model as a centralized hosting location for the gang's portfolio.

Scareware domains parked at 91.212.107.103:
g-antivirus .com - Email: mhbilate@gmail.com
generalantivirus com - Email: compalso@gmail.com
general-antivirus .com - Email: abuse@domaincp.net.cn
general-av .com - Email: mhbilate@gmail.com
generalavs .com - Email: mhbilate@gmail.com
gobackscan .com - Email: alcnafuch@gmail.com
gobarscan .com - Email: jowimpee@gmail.com
godeckscan .com - Email: quetotator@gmail.com
godirscan .com - Email: momorule@gmail.com
godoerscan .com - Email: geofishe@gmail.com
goeachscan .com - Email: momorule@gmail.com
goeasescan .com - Email: geofishe@gmail.com
gofatescan .com - Email: alcnafuch@gmail.com
gofowlscan .com - Email: stinfins@gmail.com
gohandscan .com - Email: quetotator@gmail.com
goherdscan .com - Email: jowimpee@gmail.com
goironscan. com - Email: aloxier@gmail.com
gojestscan. com - Email: jowimpee@gmail.com
golimpscan. com - Email: stinfins@gmail.com
golookscan. com - Email: stinfins@gmail.com
gomendscan. com - Email: gleyersth@gmail.com
gomutescan. com - Email: momorule@gmail.com
gonamescan. com - Email: geofishe@gmail.com

goneatscan .com - Email: momorule@gmail.com
gopickscan. com - Email: momorule@gmail.com
gorestscan. com - Email: quetotator@gmail.com
goroomscan. com - Email: gleyersth@gmail.com
gosakescan. com - Email: stinfins@gmail.com
goscanadd. com - Email: momorule@gmail.com
goscanback .com - Email: alcnafuch@gmail.com
goscanbar .com - Email: jowimpee@gmail.com
goscancode .com - Email: geofishe@gmail.com
goscandeck. com - Email: geofishe@gmail.com
goscandir. com - Email: crschuma@gmail.com
goscandoer .com - Email: crschuma@gmail.com
goscanease. com - Email: crschuma@gmail.com
goscanfowl. com - Email: stinfins@gmail.com
goscanhand. com - Email: quetotator@gmail.com
goscanherd. com - Email: jowimpee@gmail.com
goscanjest. com - Email: jowimpee@gmail.com
goscanlike. com - Email: geofishe@gmail.com
goscanlimp. com - Email: stinfins@gmail.com
goscanmend .com - Email: gleyersth@gmail.com
goscanname. com - Email: crschuma@gmail.com
goscanneat .com - Email: crschuma@gmail.com
goscanpick. com - Email: crschuma@gmail.com

goscanref. com - Email: quetotator@gmail.com
goscanrest .com - Email: quetotator@gmail.com
goscanroom .com - Email: gleyersth@gmail.com
goscansake. com - Email: stinfins@gmail.com
goscanslip. com - Email: jowimpee@gmail.com
goscansole .com - Email: crschuma@gmail.com

goscantoil. com - Email: jowimpee@gmail.com
goscantrio. com - Email: crschuma@gmail.com
goscanxtra. com - Email: crschuma@gmail.com
gosolescan. com - Email: geofishe@gmail.com
gotoilscan. com - Email: jowimpee@gmail.com
gotrioscan. com - Email: momorule@gmail.com
gowellscan. com - Email: stinfins@gmail.com
goxtrascan. com - Email: momorule@gmail.com
iantiviruspro .com - Email: broderma@gmail.com
iantivirus-pro .com - Email: feetecho@gmail.com
ia-pro .com - Email: abuse@domaincp.net.cn
iav-pro .com - Email: mcgettel@gmail.com
in5ch .com - Email: getoony@gmail.com
in5cs .com - Email: getoony@gmail.com
in5ct .com - Email: phounkey@gmail.com
in5id .com - Email: getoony@gmail.com
in5it .com - Email: phounkey@gmail.com
in5iv .com - Email: phounkey@gmail.com
in5st .com - Email: getoony@gmail.com
inavpro .com - Email: thdunnag@gmail.com
scanatom6 .com - Email: sckimbro@gmail.com
windoptimizer .com - Email: wousking@gmail.com
wopayment .com - Email: broderma@gmail.com
woptimizer .com - Email: broderma@gmail.com

cafropy .cn - Email: spscript@hotmail.com
cakevy .cn - Email: spscript@hotmail.com
dotqyuw .cn - Email: spscript@hotmail.com
dovnaji .cn - Email: spscript@hotmail.com
dovzyag .cn - Email: spscript@hotmail.com
dozabes .cn - Email: spscript@hotmail.com
ducyqan .cn - Email: spscript@hotmail.com
duvaba .cn - Email: spscript@hotmail.com
duvegy .cn - Email: spscript@hotmail.com
duwbiec .cn - Email: spscript@hotmail.com
duxsoez .cn - Email: spscript@hotmail.com
duzebyn .cn - Email: spscript@hotmail.com
dybapi .cn - Email: spscript@hotmail.com
dyqkuam .cn - Email: spscript@hotmail.com
dyqunre .cn - Email: spscript@hotmail.com
dytrevu .cn - Email: spscript@hotmail.com
dyzani .cn - Email: spscript@hotmail.com
ebaetu .cn - Email: spscript@hotmail.com
ebeoxuw .cn - Email: spscript@hotmail.com
ebeozag .cn - Email: spscript@hotmail.com
edoqeg .cn - Email: spscript@hotmail.com
epuneyv .cn - Email: spscript@hotmail.com
epuvyiz .cn - Email: spscript@hotmail.com

eqadozu .cn - Email: spscript@hotmail.com
eqaofed .cn - Email: spscript@hotmail.com
eqaone .cn - Email: spscript@hotmail.com
eqayweh .cn - Email: spscript@hotmail.com
eqibuym .cn - Email: spscript@hotmail.com
eqidax .cn - Email: spscript@hotmail.com
eqiovak .cn - Email: spscript@hotmail.com
eqoabce .cn - Email: spscript@hotmail.com
eqoumiv .cn - Email: spscript@hotmail.com
erauso .cn - Email: spscript@hotmail.com
ereuqba .cn - Email: spscript@hotmail.com
erujale .cn - Email: spscript@hotmail.com
eruqav .cn - Email: spscript@hotmail.com
esuteyb .cn - Email: spscript@hotmail.com
etuacwo .cn - Email: spscript@hotmail.com
etuexyp .cn - Email: spscript@hotmail.com
etyawjo .cn - Email: spscript@hotmail.com
etykauw .cn - Email: spscript@hotmail.com
evaolux .cn - Email: spscript@hotmail.com
evaopsu .cn - Email: spscript@hotmail.com
keturma .cn - Email: spscript@hotmail.com
kevsopi .cn - Email: spscript@hotmail.com
kijxayt .cn - Email: spscript@hotmail.com
kiluxso .cn - Email: spscript@hotmail.com
kipuxo .cn - Email: spscript@hotmail.com
kirdabe .cn - Email: spscript@hotmail.com
kiwraux .cn - Email: spscript@hotmail.com
kixyhce .cn - Email: spscript@hotmail.com

adjudg .info - Email: deciable@gmail.com
afront .info - Email: calexing@gmail.com
anprun .info - Email: deciable@gmail.com
apalet .info - Email: deciable@gmail.com
argier .info - Email: stthatch@gmail.com
asbro .info - Email: recuscon@gmail.com
atquit .info - Email: recuscon@gmail.com
atwain .info - Email: deciable@gmail.com
bagse .info - Email: calexing@gmail.com
bedaub .info - Email: jaohra@gmail.com
bedrid .info - Email: magoetzim@gmail.com
beeves .info - Email: piproux@gmail.com
besort .info - Email: jaohra@gmail.com
bettev .info - Email: recuscon@gmail.com
bettre .info - Email: phvandiv@gmail.com
birnam .info - Email: jaohra@gmail.com
botled .info - Email: deciable@gmail.com
brawns .info - Email: calexing@gmail.com
brisky .info - Email: recuscon@gmail.com
camlet .info - Email: enomman@gmail.com
caretz .info - Email: piproux@gmail.com
cheir .info - Email: jaohra@gmail.com
cuique .info - Email: calexing@gmail.com
daphni .info - Email: calexing@gmail.com

deble .info - Email: bebrashe@gmail.com
debuty .info - Email: stthatch@gmail.com
declin. info - Email: stthatch@gmail.com
devicel .info - Email:stthatch@gmail.com
dislik. info - Email: krharbou@gmail.com
dolchi. info - Email: stthatch@gmail.com
dolet. info - Email: magoetzim@gmail.com
dolet. info - Email: magoetzim@gmail.com
droope .info - Email: deciable@gmail.com
empery .info - Email: phvandiv@gmail.com
engirt .info - Email: jaohra@gmail.com
eratile .info - Email: magoetzim@gmail.com
erpeer .info - Email: deciable@gmail.com
evyns. info - Email: magoetzim@gmail.com
exampl .info - Email: krharbou@gmail.com
extrip .info - Email: piproux@gmail.com
fatted .info - Email: stthatch@gmail.com
fedar. info - Email: phvandiv@gmail.com
fifthz .info - Email: stthatch@gmail.com
figgle .info - Email: deciable@gmail.com
fliht .info - Email: krharbou@gmail.com
fosset .info - Email: deciable@gmail.com
freckl .info - Email: stthatch@gmail.com
freiny. info - Email: krharbou@gmail.com

froday. info - Email: deciable@gmail.com
fulier. info - Email: deciable@gmail.com
gaudad .info - Email: enomman@gmail.com
gelded. info - Email: stthatch@gmail.com
gicke .info - Email: magoetzim@gmail.com
girded .info - Email: jaohra@gmail.com
goterm .info - Email: calexing@gmail.com
guiany. info - Email: krharbou@gmail.com
haere .info - Email: deciable@gmail.com
hilloa. info - Email: phvandiv@gmail.com
holdit. info - Email: stthatch@gmail.com
hownet .info - Email: stthatch@gmail.com
ignomy. info - Email: jaohra@gmail.com
implor. info - Email: jaohra@gmail.com
inclin. info - Email: grattab@gmail.com
inquir .info - Email: stthatch@gmail.com
jorgan .info - Email: bebrashe@gmail.com
kedder .info - Email: enomman@gmail.com
knivel .info - Email: deciable@gmail.com
krapen .info - Email: deciable@gmail.com
lavolt .info - Email: jaohra@gmail.com
lavyer .info - Email: bebrashe@gmail.com

lequel .info - Email: acjspain@gmail.com
lowatt .info - Email: krharbou@gmail.com
meanly.info - Email: krharbou@gmail.com
meyrie.info - Email: piproux@gmail.com
midid .info - Email: magoetzim@gmail.com
miloty .info - Email: stthatch@gmail.com
mobled .info - Email: magoetzim@gmail.com
monast. info - Email: phvandiv@gmail.com
moont. info - Email: magoetzim@gmail.com
narowz .info - Email: enomman@gmail.com
nevils .info - Email: stthatch@gmail.com
nnight .info - Email: piproux@gmail.com
nroof .info - Email: krharbou@gmail.com
numben .info - Email: deciable@gmail.com
obsque .info - Email: jaohra@gmail.com
octian .info - Email: jaohra@gmail.com
odest. info - Email: phvandiv@gmail.com
onclew .info - Email: phvandiv@gmail.com
orifex .info - Email: krharbou@gmail.com
orodes .info - Email: deciable@gmail.com
outliv .info - Email: stthatch@gmail.com

pante .info - Email: jaohra@gmail.com
pasio .info - Email: jaohra@gmail.com
pittie. info - Email: stthatch@gmail.com
plamet .info - Email: stthatch@gmail.com
plazec. info - Email: bebrashe@gmail.com
potinz. info - Email: stthatch@gmail.com
pplay. info - Email: jaohra@gmail.com
pretia .info - Email: krharbou@gmail.com
quoifs. info - Email: enomman@gmail.com
qward. info - Email: enomman@gmail.com
raught .info - Email: piproux@gmail.com
realfly .info - Email: phvandiv@gmail.com
reglet. info - Email: stthatch@gmail.com
rogero .info - Email: stthatch@gmail.com
sallut. info - Email: deciable@gmail.com
sawme .info - Email: stthatch@gmail.com
scarre .info - Email: enomman@gmail.com
scrowl. info - Email: enomman@gmail.com
sigeia. info - Email: krharbou@gmail.com
sighal. info - Email: stthatch@gmail.com
speen. info - Email: enomman@gmail.com
spelem .info - Email: bebrashe@gmail.com
spinge. info - Email: krharbou@gmail.com
squach. info - Email: krharbou@gmail.com

stampo. info - Email: enomman@gmail.com
steepy. info - Email: stthatch@gmail.com
strawy. info - Email: jaohra@gmail.com
suivez. info - Email: krharbou@gmail.com
sundery .info - Email: phvandiv@gmail.com
surnam. info - Email: krharbou@gmail.com
swoln. info - Email: acjspain@gmail.com
swoons .info - Email: enomman@gmail.com
taulus. info - Email: jaohra@gmail.com
tenshy. info - Email: stthatch@gmail.com
tented. info - Email: deciable@gmail.com
ticedu. info - Email: enomman@gmail.com
tithed. info - Email: bebrashe@gmail.com
topful. info - Email: jaohra@gmail.com
unclin. info - Email: stthatch@gmail.com
undeaf. info - Email: enomman@gmail.com
unowed. info - Email: enomman@gmail.com
unwept. info - Email: stthatch@gmail.com
usicam. info - Email: stthatch@gmail.com
vagrom. info - Email: bebrashe@gmail.com
veldun. info - Email: jaohra@gmail.com
vipren. info - Email: calexing@gmail.com
voided. info - Email: krharbou@gmail.com
volsce. info - Email: krharbou@gmail.com
washy. info - Email: phvandiv@gmail.com
wincot. info - Email: enomman@gmail.com
wiving. info - Email: enomman@gmail.com
wooer. info - Email: jaohra@gmail.com
xonker. info - Email: jaohra@gmail.com 

Historical OSINT of Koobface scareware activity over a period of two weeks
The following is a snapshot of Koobface scareware activity during the last two weeks, establishing a direct connection between the Koobface botnet, the ongoing blackhat SEO campaigns, the Bahama botnet with scareware samples modifying HOSTS files, and an Ukrainian dating scam agency where the gang appears to be part of an affiliate network.

Scareware samples pushed by Koobface, with associated detection rates:
mexcleaner .in - Email: niclas@i.ua
safetyscantool .com - 62.90.136.237 - Email: Suzanne.R.Muniz@trashymail.com
stabilitytoolsonline .com - Email: Brent.I.Purnell@pookmail.com
securitytestnetonline .com - 62.90.136.237 - Email: Dianne.T.Whitley@pookmail.com
securityprogramguide .com - Email: Kiyoko.T.Johnson@mailinator.com
cheapsecurityscan .com - Email: Kevin.L.Linkous@trashymail.com
securitycheckwest .com; webbiztest .com - Email: Ruthie.R.Wilcox@mailinator.com
securitycodereviews .com - 62.90.136.237 - Email: Darwin.L.Mcgowan@trashymail.com
netmedtest .com - 62.90.136.237 - Email: Irene.D.Snow@trashymail.com
toolsdirectnow .com - Email: Frank.J.Bullard@trashymail.com
(ratspywawe .in; wqdefender .in; pivocleaner .in; mexcleaner .in; sapesoft .in; alsoft .in; samosoft .in; jastaspy .in; lastspy .in; felupdate .info; inkoclear .info; drlcleaner .info; tiposoft .info; fkupd .eu; piremover .eu; igsoft .eu; sersoft .eu) - detection rate

Download locations of the actual scareware binary used over the past two weeks:
0ni9o1s3feu60 .cn - Email: robertsimonkroon@gmail.com
6j5aq93iu7yv4 .cn - Email: robertsimonkroon@gmail.com
mf6gy4lj79ny5 .cn - Email: robertsimonkroon@gmail.com
84u9wb2hsh4p6 .cn - Email: robertsimonkroon@gmail.com
6pj2h8rqkhfw7 .cn - Email: robertsimonkroon@gmail.com
7cib5fzf462g8 .cn - Email: robertsimonkroon@gmail.com
7bs5nfzfkp8q8 .cn - Email: robertsimonkroon@gmail.com
kt4lwumfhjb7a .cn - Email: robertsimonkroon@gmail.com
q2bf0fzvjb5ca .cn - Email: robertsimonkroon@gmail.com
rncocnspr44va .cn - Email: robertsimonkroon@gmail.com
t1eayoft9226b .cn - Email: robertsimonkroon@gmail.com
4go4i9n76ttwd .cn - Email: robertsimonkroon@gmail.com
kzvi4iiutr11e .cn - Email: robertsimonkroon@gmail.com
hxc7jitg7k57e .cn - Email: robertsimonkroon@gmail.com
mfbj6pquvjv8e .cn - Email: robertsimonkroon@gmail.com
mt3pvkfmpi7de .cn - Email: robertsimonkroon@gmail.com
fb7pxcqyb45oe .cn - Email: robertsimonkroon@gmail.com
fyivbrl3b0dyf .cn - Email: robertsimonkroon@gmail.com
z6ailnvi94jgg .cn - Email: robertsimonkroon@gmail.com
ue4x08f5myqdl .cn - Email: robertsimonkroon@gmail.com
p7keflvui9fkl .cn - Email: robertsimonkroon@gmail.com
gjpwsc5p7oe3m .cn - Email: robertsimonkroon@gmail.com
f1uq1dfi3qkcm .cn - Email: robertsimonkroon@gmail.com
7mx1z5jq0nt3o .cn - Email: robertsimonkroon@gmail.com
3uxyctrlmiqeo .cn - Email: robertsimonkroon@gmail.com
p0umob9k2g7mp .cn - Email: robertsimonkroon@gmail.com
od32qjx6meqos .cn - Email: robertsimonkroon@gmail.com
bnfdxhae1rgey .cn - Email: robertsimonkroon@gmail.com
7zju2l82i2zhz .cn - Email: robertsimonkroon@gmail.com

What's the deal with the historical OSINT and why wasn't this data communicated right away? Keep reading.

The Bahama Botnet Connection
During September, the folks at ClickForensics made an interesting observation regarding my Ukrainian "fan club" and the ad revenue stealing/click-fraud committing botnet Bahama - some of the scareware samples were modifying the HOSTS file and presenting the victim with "one of those cybecrime-friendly search engines" stealing revenue in the process.

Once the connection was also established by me at a later stage, data released in regard to the New York Times malvertising attack once again revealed a connection between all campaigns - the very same domains used to serve the scareware, were also used in a blackhat SEO campaign which I analyzed a week before the incident took place. Basically, the scareware pushed by the Koobface botnet, as well as the scareware pushed by the blackhat SEO campaigns maintained by the gangs is among the several propagation approaches used for the DNS records poisoning to take place:

"However, in the case of the Bahama Botnet, this DNS translation method gets corrupted.  The Bahama botnet malware causes the infected computer to mistranslate a domain name.  Instead of translating “Google.com” as 74.125.155.99, an infected computer will translate it as 64.86.17.56. That number doesn’t represent any computer owned by Google.  Instead, it represents a computer located in Canada.  When a user with an infected machine performs a search on what they think is google.com, the query actually goes to the Canadian computer, which pulls real search results directly from Google, fiddles with them a bit, and displays them to the searcher.  

Now the searcher is looking at a page that looks exactly like the Google search results page, but it’s not.  A click on the apparently “organic” results will redirect as a paid click through several ad networks or parked domains — some complicit, some not.  Regardless, cost per click (CPC) fees are generated, advertisers pay, and click fraud has occurred."

The 64.86.17.56 mentioned is actually AS30407 (Velcom), which has also been used in recent campaigns.

ISP and domain registrars have been notified, action should be taken shortly. What was particularly interesting to observe was scareware pushed by the Koobface botnet phoning back to its well known urodinam .net/8732489273.php domain, was also modifying the HOSTS file in the following way. Sample HOSTS modification of scareware (MD5: 0x0FBF1A9F8E6E305138151440DA58B4F1) pushed by Koobface:
89.149.210.109 www.google.com
89.149.210.109 www.google.de
89.149.210.109 www.google.fr
89.149.210.109 www.google.co.uk
89.149.210.109 www.google.com.br
89.149.210.109 www.google.it
89.149.210.109 www.google.es
89.149.210.109 www.google.co.jp
89.149.210.109 www.google.com.mx
89.149.210.109 www.google.ca
89.149.210.109 www.google.com.au
89.149.210.109 www.google.nl
89.149.210.109 www.google.co.za
89.149.210.109 www.google.be
89.149.210.109 www.google.gr
89.149.210.109 www.google.at
89.149.210.109 www.google.se
89.149.210.109 www.google.ch
89.149.210.109 www.google.pt
89.149.210.109 www.google.dk
89.149.210.109 www.google.fi
89.149.210.109 www.google.ie
89.149.210.109 www.google.no
89.149.210.109 search.yahoo.com
89.149.210.109 us.search.yahoo.com
89.149.210.109 uk.search.yahoo.com


Sample HOSTS modification of scareware (MD5: 0x0FBF1A9F8E6E305138151440DA58B4F1) pushed by blackhat SEO:
74.125.45.100 4-open-davinci.com
74.125.45.100 securitysoftwarepayments.com
74.125.45.100 privatesecuredpayments.com
74.125.45.100 secure.privatesecuredpayments.com
74.125.45.100 getantivirusplusnow.com
74.125.45.100 secure-plus-payments.com
74.125.45.100 www.getantivirusplusnow.com
74.125.45.100 www.secure-plus-payments.com
74.125.45.100 www.getavplusnow.com
74.125.45.100 www.securesoftwarebill.com
74.125.45.100 secure.paysecuresystem.com
74.125.45.100 paysoftbillsolution.com
64.86.16.97 google.ae
64.86.16.97 google.as
64.86.16.97 google.at
64.86.16.97 google.az
64.86.16.97 google.ba
64.86.16.97 google.be
64.86.16.97 google.bg
64.86.16.97 google.bs
64.86.16.97 google.ca
64.86.16.97 google.cd
64.86.16.97 google.com.gh
64.86.16.97 google.com.hk
64.86.16.97 google.com.jm
64.86.16.97 google.com.mx
64.86.16.97 google.com.my
64.86.16.97 google.com.na
64.86.16.97 google.com.nf
64.86.16.97 google.com.ng
64.86.16.97 google.ch
64.86.16.97 google.com.np
64.86.16.97 google.com.pr
64.86.16.97 google.com.qa
64.86.16.97 google.com.sg
64.86.16.97 google.com.tj
64.86.16.97 google.com.tw
64.86.16.97 google.dj
64.86.16.97 google.de
64.86.16.97 google.dk
64.86.16.97 google.dm
64.86.16.97 google.ee


64.86.16.97 google.fi
64.86.16.97 google.fm
64.86.16.97 google.fr
64.86.16.97 google.ge
64.86.16.97 google.gg
64.86.16.97 google.gm
64.86.16.97 google.gr
64.86.16.97 google.ht
64.86.16.97 google.ie
64.86.16.97 google.im
64.86.16.97 google.in
64.86.16.97 google.it
64.86.16.97 google.ki
64.86.16.97 google.la
64.86.16.97 google.li
64.86.16.97 google.lv
64.86.16.97 google.ma
64.86.16.97 google.ms
64.86.16.97 google.mu
64.86.16.97 google.mw
64.86.16.97 google.nl
64.86.16.97 google.no
64.86.16.97 google.nr
64.86.16.97 google.nu
64.86.16.97 google.pl
64.86.16.97 google.pn
64.86.16.97 google.pt
64.86.16.97 google.ro
64.86.16.97 google.ru


64.86.16.97 google.rw
64.86.16.97 google.sc
64.86.16.97 google.se
64.86.16.97 google.sh
64.86.16.97 google.si
64.86.16.97 google.sm
64.86.16.97 google.sn
64.86.16.97 google.st
64.86.16.97 google.tl
64.86.16.97 google.tm
64.86.16.97 google.tt
64.86.16.97 google.us
64.86.16.97 google.vu
64.86.16.97 google.ws
64.86.16.97 google.co.ck
64.86.16.97 google.co.id

64.86.16.97 google.co.il
64.86.16.97 google.co.in
64.86.16.97 google.co.jp

64.86.16.97 google.co.kr
64.86.16.97 google.co.ls
64.86.16.97 google.co.ma
64.86.16.97 google.co.nz
64.86.16.97 google.co.tz
64.86.16.97 google.co.ug
64.86.16.97 google.co.uk
64.86.16.97 google.co.za
64.86.16.97 google.co.zm
64.86.16.97 google.com


The historical OSINT paragraph mentioned that several of the scareware domains pushed during the past two weeks were responding to 62.90.136.237. This very same 62.90.136.207 IP was hosting domains part of an Ukrainian dating scam agency known as Confidential Connections earlier this year, whose spamming operations were linked to a botnet involved in money mule recruitment activities.

For the time being, the following dating scam domains are responding to the same IP:
healthe-lovesite .com - Email: potenciallio@safe-mail.net
love-isaclick .com - Email: potenciallio@safe-mail.net
love-is-special .com - Email: potenciallio@safe-mail.net
only-loveall .com - Email: potenciallio@safe-mail.net
and-i-loveyoutoo .com - Email: potenciallio@safe-mail.net
andiloveyoutoo .com - Email: menorst10@yahoo.com
romantic-love-forever .com - Email: potenciallio@safe-mail.net

love-youloves .com - Email: potenciallio@safe-mail.net
love-galaxys .com - Email: potenciallio@safe-mail.net
love-formeandyou .com - Email: potenciallio@safe-mail.net
ifound-thelove .net - Email: potenciallio@safe-mail.net
findloveon .net - Email: wersers@yahoo.com
love-isexcellent .net - Email: potenciallio@safe-mail.net

Could it get even more malicious and fraudulent than that? Appreciate my thetoric. The same email (potenciallio@safe-mail.net) that was used to register the dating scam domains was also used to register exploit serving domains at 195.88.190.247, participate in phishing campaigns, and register a money mule recruitment site for the non-existent Allied Insurance LLC. (Allied Group, Inc.).

Now that's a multi-tasking underground enterprise, isn't it? The ISPs have been notified, domains suspension is pending.

Related posts:
Koobface Botnet Redirects Facebook's IP Space to my Blog
New Koobface campaign spoofs Adobe's Flash updater
Social engineering tactics of the Koobface botnet
Koobface Botnet Dissected in a TrendMicro Report
Koobface Botnet's Scareware Business Model
Movement on the Koobface Front - Part Two
Movement on the Koobface Front
Koobface - Come Out, Come Out, Wherever You Are
Dissecting Koobface Worm's Twitter Campaign
Dissecting the Koobface Worm's December Campaign
Dissecting the Latest Koobface Facebook Campaign 
The Koobface Gang Mixing Social Engineering Vectors

This post has been reproduced from Dancho Danchev's blog.