domain used in spam operation. insurefundspick.com… 95.111.240.167, 66.165.240.210
Рубрика: contabo.de
phishing server
Stolen domains hosting phishing sites. 777v777.com has address 194.233.83.185 acombcomc.com has address 194.233.83.185 adilynjune.com has address 194.233.83.185 mycreativelearning.org has address 194.233.83.185 onlineteachingclasses.com has address 194.233.83.185 loreworks.ca has address 194.233.83.185 insuranceforcarsnearme.com has address 194.233.83.185 digitaltoolsmarketing.com has address 194.233.83.185 freeinsurancecarquotes.com has address 194.233.83.185 glovelhealthcare.in has address 194.233.83.185 fourwheeldealer.com has address 194.233.83.185 catharsispresents.com has address 194.233.83.185 centermeds.com has… Читать далее phishing server
Socelars botnet controller @178.18.250.204
The host at this IP address is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. Socelars botnet controller located at 178.18.250.204 on port 80 (using HTTP POST): hXXp://www.eceinfos.top/ $ dig +short www.eceinfos.top 178.18.250.204 $ nslookup 178.18.250.204 vmi707598.contaboserver.net Referencing malware binaries (MD5 hash):… Читать далее Socelars botnet controller @178.18.250.204
spam source
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; s=dkim; d=ciskamail.com; h=Message-ID:Date:Subject:From:Reply-To:To:MIME-Version:Content-Type: List-Unsubscribe:List-Id; i=notification@ciskamail.com; bh=.*=; b=.*u.* .*f.* .*= Return-Path: <postmaster@ciskamail.com> Message-ID: <.*@ciskamail.com> Date: .* Subject: =?utf-8?Q?=F0=9F=92=A5?= .* Black Fridays Deal | Upto 50% Off | Every Friday in November From: .* <notification@ciskamail.com> Reply-To: .* <info@ciskamail.com> To: «.*» <.*> MIME-Version: 1.0 Content-Type: multipart/alternative; boundary=»_=_swift_v4_1635.*_.*c.*f.*_=_» X-Report-Abuse: Please report abuse for this campaign… Читать далее spam source
Phishing origination against Nordea Bank (Nordics)
Return-Path: <email@govind.navodayawelfarefoundation.org> Received: from server.nephost.net (server.nephost.net [167.86.66.101]) (using TLSv1.2 with cipher DHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by x (Postfix) with ESMTPS id x for <x>; Tue, 19 Oct 2021 ##:##:## +0300 (EEST) Authentication-Results: x; dkim=pass reason=»2048-bit key» header.d=govind.navodayawelfarefoundation.org header.i=@govind.navodayawelfarefoundation.org header.b=PUhBwoyq; dkim-adsp=pass DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=govind.navodayawelfarefoundation.org; s=default; h=Content-Type: MIME-Version:Sender:To:Message-Id:Subject:Date:From:Reply-To:Cc: Content-Transfer-Encoding:Content-ID:Content-Description:Resent-Date: Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:In-Reply-To: References:List-Id:List-Help:List-Unsubscribe:List-Subscribe:List-Post:… Читать далее Phishing origination against Nordea Bank (Nordics)
phishing / fraud server
IP is full of phish and fraud sites. Fake banks and other financial «companies», fake goverment sites, Law firms, etc. usmilitaryofficial.org has address 173.249.6.57 warnerbnk.com has address 173.249.6.57 cicbaccess.com has address 173.249.6.57 horizondigitalinvest.com has address 173.249.6.57 mibcapitaltrust.com has address 173.249.6.57 fsbinternationalb.com has address 173.249.6.57 expressfundingventures.com has address 84.200.110.123 aliebinainvestmententerprise.com has address 173.249.6.57 mercantilcapital.com has address… Читать далее phishing / fraud server
AsyncRAT botnet controller @5.189.186.155
The host at this IP address is obviously operated by cybercriminals. It is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. Malware botnet controller located at 5.189.186.155 on port 7878 TCP: $ telnet 5.189.186.155 7878 Trying 5.189.186.155… Connected to 5.189.186.155. Escape character… Читать далее AsyncRAT botnet controller @5.189.186.155
phishing server
sevice-securepass.gq has address 161.97.112.151 sevice-securepass.ml has address 161.97.112.151 sevice-securepass.cf has address 161.97.112.151 sevice-securepass.ga has address 161.97.112.151 noreplay-postalcertiplus.gq has address 161.97.112.151 securite-bancaire-belgique.ml has address 161.97.112.151 noreplayto-assistance.gq has address 161.97.112.151 cristal-secure.cf has address 161.97.112.151 postalgm.ml has address 161.97.112.151 noreplayto-assistance.tk has address 161.97.112.151 cristal-secure.ml has address 161.97.112.151 securite-banque-france.ga has address 161.97.112.151 securite-bancaire-france.ml has address 161.97.112.151 securite-bancaire-france.tk has address… Читать далее phishing server
QuasarRAT botnet controller @209.126.85.216
The host at this IP address is obviously operated by cybercriminals. It is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. Malware botnet controller located at 209.126.85.216 on port 9632 TCP: $ telnet 209.126.85.216 9632 Trying 209.126.85.216… Connected to 209.126.85.216. Escape character… Читать далее QuasarRAT botnet controller @209.126.85.216
Malware distribution
http://safalkisan.co.in/id/?blahblahblah was advertised in Polish SMS spam. On a desktop browser it returns an empty page, on mobile the results are different. This is a hallmark of a specific phishing kit that offers downloads of the FakeCop malware pretending it is a DHL package delivery site. $ host safalkisan.co.in safalkisan.co.in has address 207.244.236.34 See also… Читать далее Malware distribution