FYI...
Something evil on 92.63.88.0/24 (MWTV, Latvia)
- http://blog.dynamoo....wtv-latvia.html
17 Feb 2015 - "I've been tracking -Dridex- for some time, and I keep seeing IPs for MWTV in Latvia cropping up. So far I have seen:
92.63.88.87
92.63.88.97
92.63.88.100
92.63.88.105
92.63.88.106
92.63.88.108
I'm not sure how widely this spreads through the MWTV network, but I would certainly recommend -blocking- 92.63.88.0/24 on your network perimeter."
___
Fake 'Customer statement' SPAM - doc malware
- http://myonlinesecur...rd-doc-malware/
17 Feb 2015 - "'Customer statement 0001031389 as on 02/05/2015' pretending to come from AR.Support@efi.com and being addressed to minutemanpresschicago@ comcast .net and sent to you via a bcc with a malicious word doc attachment is another one from the current bot runs... All these emails have random invoice numbers in the subject line and the invoice number matches the attachment name & number in most cases so far today...
Screenshot: http://myonlinesecur...-0001031389.png
17 February 2015 : Customer statement 0001031389 as on 02052015.DOC
Current Virus total detections: 0/57* ... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
* https://www.virustot...sis/1424169255/
- http://blog.dynamoo....m-customer.html
17 Feb 2015
"... Recommended blocklist:
202.44.54.5
66.110.179.66
92.63.88.105 "
___
Fake 'Service Suspension' SPAM - xls malware
- http://myonlinesecur...el-xls-malware/
17 Feb 2015 - "'Service Suspension Notification [ID:FECC254778] (random numbers)' with a malicious word excel XLS attachment is another one from the current bot runs... All these emails have random numbers in the subject line and the attachment name...
Screenshot: http://myonlinesecur...otification.png
17 February 2015 : FECC254778.xls
Current Virus total detections: 1/57* ... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
* https://www.virustot...sis/1424174070/
___
Fake 'Unpaid invoice' SPAM – XLS malware
- http://myonlinesecur...el-xls-malware/
17 Feb 2015 - "'Unpaid invoice [ID:AFCBF43812] ( random numbers)' with a malicious Excel XLS attachment is another one from the current bot runs... All these emails have random invoice numbers in the subject line and the invoice number matches the attachment name & number in most cases so far today...All these emails have random invoice numbers in the subject line and the invoice number matches the attachment name & number in most cases so far today. The email has a totally -blank- body...
17 February 2015 : AFCBF43812.xls - Current Virus total detections: 1/57* ... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
* https://www.virustot...sis/1424178689/
- http://blog.dynamoo....9876543210.html
17 Feb 2015
"... fake invoice comes with no body text, a random ID: in the subject and a randomly-named malicious Excel attachment...
Recommended blocklist:
92.63.88.97
92.63.88.87
78.129.153.27
62.76.43.194
46.4.232.206
136.243.237.194
74.208.68.243 "
___
Fake 'Invoices' SPAM - PDF malware
- http://myonlinesecur...ke-pdf-malware/
17 Feb 2015 "'Invoices for INTERCON, INC. Sent on 02/17/15 from Electroshield Inc' pretending to come from accounting@ interconinc .com with a zip attachment is another one from the current bot runs...
Screenshot: http://myonlinesecur...or-INTERCON.png
17 February 2015: invoices.zip: Extracts to: invoices.exe
Current Virus total detections: 7/57* ... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
* https://www.virustot...sis/1424188090/
___
FedEx Notification Spam
- http://threattrack.t...tification-spam
Feb 17, 2015 - "Subjects Seen
Postal Notification Service
Typical e-mail details:
Dear Customer,
You parcel arrived, read the account in the attachment.
Consignment: #149700366
Submit time: Tue, 17 Feb 2015 11:11:55 +0000
Malicious File Name and MD5:
invoice.exe (6E3EF30E49B69E8AA6F487816A4AC9F9)
Screenshot: https://gs1.wac.edge...QFbG1r6pupn.png
Tagged: FedEx, Upatre
___
Equation Group IP ranges and domains
- http://blog.dynamoo....tion-group.html
17 Feb 2915 - "There has been a lot of buzz this morning about "The Equation Group", a possible state actor involved in placing malware on hard disks..."
(Good read, but WAY too many IPs to be listed here - see the dynamoo URL above.)
- https://isc.sans.edu...l?storyid=19345
2015-02-17
- http://www.theregist...equation_group/
17 Feb 2015
Edited by AplusWebMaster, 18 February 2015 - 06:58 AM.