FYI...
Fake Boston Marathon SPAM / askmeaboutcctv .com
-
http://blog.dynamoo....outcctvcom.html
17 April 2013 - "This pretty shameful Boston marathon themed spam
leads to malware on askmeaboutcctv .com:
Sample 1:
From: Graham Jarvis [mailto:alejandro.alfonzo-larrain @tctwest .net]
Sent: 17 April 2013 09:49
Subject: Video of Explosion at the Boston Marathon 2013
hxxp:||61.63.123.44/news .html
Sample 2:
From: Sally Rasmussen [mailto:artek33 @risd .edu]
Sent: 17 April 2013 09:49
To: UK HPEA 2
Subject: Aftermath to explosion at Boston Marathon
hxxp:||190.245.177.248/news .html
(Note that the payload links have been lightly obfuscated, don't click them).
If you click the link you see a set of genuine YouTube videos. However, the last one seems blank because it is in fact
a malicious IFRAME to [donotclick]askmeaboutcctv .com/wmiq.html (report here*) which appears to be on a legitimate but hacked site. The server seems to be overloaded at the moment which is a good thing I suppose.
*
http://urlquery.net/....php?id=2044081
...
RedKit applet + obfuscated URL...
more sample subjects and links:
Subject: Video of Explosion at the Boston Marathon 2013
Subject: Aftermath to explosion at Boston Marathon
Subject: Explosion at Boston Marathon
Subject: Explosions at the Boston Marathon
[donotclick]
46.233.4.113 /boston.html
[donotclick]
37.229.92.116 /boston.html
[donotclick]
188.2.164.112 /news.html
[donotclick]
109.87.205.222 /news.html
I would advise blocking these IPs and domains. Be vigilant against this kind of attack, also bear in mind that the bad guys might try to exploit Margaret Thatcher's funeral and the London Marathon in the same way."
-
http://blog.dynamoo....n-marathon.html
17 April 2013 - "Earlier today I reported some Boston Marathon themed spam and since then I have seen
more malicious landing pages on -hacked- legitimate sites as follows (don't click those links, obviously):
hxxp :||
46.233.4.113 /boston.html
96.125.163.122 (WebsiteWelcome.com, US) ...
hxxp :||
190.245.177.248 /news.html
184.172.168.32 (WebsiteWelcome.com, US)...
hxxp :||
95.87.6.156 /boston.html
50.22.194.64 (WebsiteWelcome.com, US)...
69.56.174.178 ...
This situation has been reported to HostGator / WebsiteWelcome who are investigating..."
(More detail at the dynamoo URL above.)
Sample screenshot:
https://gs1.wac.edge...VPcg1qz4rgp.png
___
KELIHOS Worm Emerges, Takes Advantage of Boston Marathon Blast
-
http://blog.trendmic...marathon-blast/
April 16, 2013 11:52 pm (UTC-7) - "... a spam outbreak of
more than 9,000 Blackhole Exploit Kit spammed messages, all related to the said tragedy that killed at least three people and injured many more. Some of the spammed messages used the subjects “2 Explosions at Boston Marathon,” “Aftermath to explosion at Boston Marathon,” “Boston Explosion Caught on Video,” and “Video of Explosion at the Boston Marathon 2013" to name a few. Below is a spam sample she found:
>
http://blog.trendmic..._blast_fig1.png
The spammed message only contains the URL... but once you click it, it displays a web page with an embedded video, supposedly from YouTube. At this point, users who click the link may have already downloaded malware unknowingly, aka
drive-by-download attacks. Here’s a screenshot of the web page with the embedded video:
>
http://blog.trendmic..._blast_fig2.png
... Aside from the spam sample discussed earlier, we also found that other platforms have also been exploited to spread similar threats. Malicious Tweets and links on free blogging platforms were also crafted just hours after the blast took place.
>
http://blog.trendmic..._blast_fig6.png
... a cybercriminal’s work is never complete. Taking advantage of newsworthy events is indeed a cybercrime staple; each new scheme always seems to vary, which results in a never-ending cycle of malicious mischief."
___
Boston Marathon bombings used to spread malware
-
https://www.net-secu...ews.php?id=2469
April 17, 2013 - "... the Boston Marathon bombings have become an effective lure in the hands of cyber scammers and malware peddlers. Kaspersky Lab researchers are warning about
spam emails* offering nothing more than a simple link to a web page that contains URLs of non-malicious YouTube videos about the attacks. Unfortunately,
after 60 seconds, another link is activated, and this one leads to a malicious executable:
>
https://www.net-secu...xe-17042013.jpg
The file offered for download is a variant of the Tepfer info-stealer Trojan, which phones home to a number of IP addresses in Ukraine, Argentina and Taiwan... don't follow links or download files delivered via
unsolicited emails or messages sent via popular social media sites and IM services. You're best bet is to check out reputable news sites for information."
*
https://www.secureli...oston_Aftermath
___
Fake BBB SPAM / janariamko .ru
-
http://blog.dynamoo....nariamkoru.html
17 Apr 2013 - "After a few quiet days on the RU:8080 spam front it has started again..
Date: Wed, 17 Apr 2013 20:18:14 +0800
From: "Better Business Bureau" [guttersnipeg792 @ema1lsv100249121 .bbb.org]
Subject: Better Business Beareau accreditation Terminated 64A488W04
Case N. 64A488W04
Respective Owner/Responsive Person:
The Better Business Bureau has been filed the above said reclamation from one of your clients with reference to their business relations with you. The information about the consumer's trouble are available at the link below. Please give attention to this matter and communicate with us about your opinion as soon as possible.
We graciously ask you to visit the COMPLAINT REPORT to respond on this reclamation. Click here to be taken directly to your report today:
bbb .org/business-claims/customercare/report-65896564
If you think you got this email by mistake - please forward this message to your principal or accountant
We are looking forward to your prompt answer.
Looking for info on additional ways your BBB Accreditation can boost your business? Visit the BBB SmartGuide.
Sincerely,
Gabriel Reyes - Online Communication Specialist
bbb.org - Start With Trust
The malicious payload is at [donotclick]janariamko.ru:8080/forum/links/public_version.php (report here*) hosted on the following IPs:
91.191.170.26 (Netdirekt, Turkey)
93.187.200.250 (Netdirekt, Turkey)
208.94.108.238 (Fibrenoire, Canada)
Blocklist:
91.191.170.26
93.187.200.250
208.94.108.238 ..."
*
http://urlquery.net/....php?id=2048054
... Blackholev2 redirection successful 93.187.200.250
___
Another BBB spam run / freedblacks .net
-
http://blog.dynamoo....dblacksnet.html
17 Apr 2013 - "Another BBB spam run today, although this time not an RU:8080 spam we saw earlier but an "Amerika" spam run instead. Interestingly, both mis-spell "Beareau" which indicates they are using the same software, even if they are different gangs. The link in the email
leads to malware on freedblacks .net.
Date: Wed, 17 Apr 2013 21:20:20 +0800 [09:20:20 EDT]
From: BBB [bridegroomc @m.bbb .org]
Subject: Better Business Beareau accreditation Cancelled P5088819
Case No. P5088819
Respective Owner/Responsive Person:
The Better Business Bureau has been registered the above said claim letter from one of your users as regards their business contacts with you. The information about the consumer's worry are available for review at a link below. Please pay attention to this issue and inform us about your sight as soon as possible.
We amiably ask you to click and review the APPEAL REPORT to respond on this claim letter. Click here to be taken directly to your report today:
http://www.bbb .org/business-claims/customercare/report-02111671
If you think you recieved this email by mistake - please forward this message to your principal or accountant
We are looking forward to your prompt answer.
Looking for info on additional ways your BBB Accreditation can boost your business? Visit the BBB SmartGuide.
Sincerely,
Ian Wilson - Online Communication Specialist
bbb.org - Start With Trust
The link goes to a legitimate hacked site and then to a malicious landing page at [donotclick]freedblacks.net/news/agency_row_fixed.php (report here*) hosted on the following IPs:
65.34.160.10 (Comcast, US)
94.249.206.117 (GHOSTnet, Germany)
155.239.247.247 (Centurion Telkom, South Africa)
173.234.239.60 (Nobis Technology Group, US)
Blocklist:
65.34.160.10
94.249.206.117
155.239.247.247
173.234.239.60 ..."
*
http://wepawet.isecl...c...729&type=js
___
Fake CNN .com Boston Marathon SPAM / thesecondincomee .com
-
http://blog.dynamoo....athon-spam.html
17 Apr 2013 - "This Boston Marathon themed spam
leads to malware on thesecondincomee .com:
Example 1:
Date: Wed, 17 Apr 2013 10:32:18 -0600 [12:32:18 EDT]
From: CNN Breaking News [BreakingNews@mail.cnn.com]
Subject: Opinion: Boston Marathon Explosions - Obama Benefits? - CNN.com
CNN.com
Powered by
* Please note, the sender's email address has not been verified.
You have received the following link from BreakingNews @mail .cnn .com:
Click the following to access the sent link:
Boston Marathon Explosions - Obama Benefits? - CNN.com*
SAVE THIS link FORWARD THIS link
Get your EMAIL THIS Browser Button and use it to email content from any Web site. Click here for more information.
*This article can also be accessed if you copy and paste the entire address below into your web browser.
by clicking here
Example 2:
Date: Wed, 17 Apr 2013 22:32:56 +0600
From: behring401 @mail .cnn .com
Subject: Opinion: Boston Marathon Explosions - North Korea trail or Osama Legacy? - CNN.com
Powered by
* Please note, the sender's email address has not been verified.
You have received the following link from BreakingNews @mail .cnn .com:
Click the following to access the sent link:
Boston Marathon Explosions - North Korea trail or Osama Legacy? - CNN.com*
Get your EMAIL THIS Browser Button and use it to email content from any Web site. Click here for more information.
This article can also be accessed if you copy and paste the entire address below into your web browser.
by clicking here
Screenshot:
https://lh3.ggpht.co.../cnn-boston.png
The malicious payload is at [donotclick]thesecondincomee .com/news/agency_row_fixed.php hosted on:
94.249.206.117 (GHOSTnet, Germany)
155.239.247.247 (Centurion Telkom, South Africa)
173.234.239.60 (Nobis Technology Group, US)
The recommended blocklist is the same as used in this earlier attack*."
*
http://blog.dynamoo....dblacksnet.html
Edited by AplusWebMaster, 17 April 2013 - 01:42 PM.