FYI...
Fake 'Invoice' SPAM - delivers Dridex
- https://myonlinesecu...banking-trojan/
5 Jun 2017 - "... emails with random numbered -pdf- attachments that drops a malicious macro enabled word doc is an email with the subject of 'Invoice' pretending to come from a random first name Holmes at random email addresses but the body of the email imitates John Miller Ltd...
Screenshot: https://myonlinesecu...ler_-Holmes.png
... the PDF actually having some content that makes it almost look real:
> https://myonlinesecu..._129303_pdf.png
A4 Inv_Crd 21297.pdf - Current Virus total detections 9/56*. Payload Security**
drops Invoice_129302.docm (VirusTotal 8/59[3]) (Payload Security[4]) downloads an encrypted txt file from
http ://spaceonline .in\8yfh4gfff which is converted by the script to miniramon8.exe (VirusTotal 13/61[5])...
DO NOT follow the advice they give to enable macros or enable editing to see the content... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
* https://www.virustot...sis/1496654801/
** https://www.hybrid-a...vironmentId=100
Contacted Hosts
111.118.212.86
192.48.88.167
89.110.157.78
85.214.126.182
46.101.154.177
3] https://www.virustot...sis/1496654938/
4] https://www.hybrid-a...vironmentId=100
Contacted Hosts
111.118.212.86
192.48.88.167
89.110.157.78
85.214.126.182
46.101.154.177
5] https://www.virustot...85e97/analysis/
spaceonline .in: 111.118.212.86: https://www.virustot...86/information/
> https://www.virustot...c915b/analysis/
___
- http://blog.dynamoo....ed-invoice.html
5 Jun 2017 - "This spam pretends to come from John Miller Ltd (but doesn't) and comes with a malicious payload. The domain mentioned in the email does -not- match the company being spoofed, and varies from message to message.
Screenshot: https://3.bp.blogspo...john-miller.png
The attachment currently has a detection rate of about 9/56*. As is common with some recent attacks, the PDF actually contains an embedded Microsoft Office document. Hybrid Analysis** shows the malicious file downloading a component from cartus-imprimanta .ro/8yfh4gfff (176.126.200.56 - HostVision SRL, Romania) although other -variants- possibly exist. A file is dropped (in the HA report called miniramon8.exe) at detection rate of 11/61***. According to the Hybrid Analysis report, that attempts tom communicate with the following IPs:
192.48.88.167 (Tocici LLC, US)
89.110.157.78 (netclusive GmbH, Germany)
85.214.126.182 (Strato AG, Germany)
46.101.154.177 (Digital Ocean, Germany)
The payload is not clear at this time, but it will be nothing good.
Recommended blocklist:
192.48.88.167
89.110.157.78
85.214.126.182
46.101.154.177 "
* https://virustotal.c...sis/1496654625/
** https://www.hybrid-a...vironmentId=100
Contacted Hosts
176.126.200.56
192.48.88.167
89.110.157.78
85.214.126.182
46.101.154.177
*** https://virustotal.c...sis/1496655625/
cartus-imprimanta .ro: 176.126.200.56: https://www.virustot...56/information/
> https://www.virustot...70dc3/analysis/
___
'WakeMed' Phish
REAL 'WakeMed': http://www.wakemed.org/contact-us
Raleigh, NC 27610
FAKE/Phish: https://myonlinesecu...pt-at-phishing/
5 June 2017
Screenshot: https://myonlinesecu...ERVICE-DESK.png
"... If you follow the link you see a very badly designed webpage, complete with spelling errors, obviously created by a non English speaker, looking like this:
(from: http ://itupdat.tripod .com/)
> https://myonlinesecu...ripod_phish.png
... the spam -email- is a -compromised- (may be spoofed) Canadian Nova Scotia Department of Education address... these emails use Social engineering tricks to persuade you to open the attachments that come with the email..."
itupdat.tripod .com: 209.202.252.101: https://www.virustot...01/information/
> https://www.virustot...0ddb7/analysis/
ccrsb .ca: 142.227.247.226: https://www.virustot...26/information/
___
Police dismantle crime network - online payment SCAMS
- https://www.helpnets...-crime-network/
June 5, 2017 - "The Polish National Police, working in close cooperation with its law enforcement counterparts in Croatia, Germany, Romania and Sweden, alongside Europol’s European Cybercrime Centre (EC3), have smashed a Polish organised crime network suspected of online payment scams and money laundering... Operation MOTO on 29-31 May 2017 resulted in 9 arrests including the criminal network’s masterminds, as well as 25 house searches in Poland. The perpetrators were advertising online cars as well as construction or agricultural machinery/vehicles, but never delivered the advertised goods to interested buyers, despite having received advance fee payments..."
Edited by AplusWebMaster, 05 June 2017 - 01:47 PM.