Malware distribution @13.90.173.206

The host at this IP address (13.90.173.206) is either operated by cybercriminals or hosting compromised websites that are being used to distribute malware: http://osdsoft.com/update20180524/explorer.exe AS number: AS8075 AS name: MICROSOFT-CORP-MSN-AS-BLOCK

Опубликовано
В рубрике microsoft.com

Abused / misconfigured newsletter service (listbombing)

The host at this IP address is being (ab)used to «listbomb» email addresses: From: paulgrethlk@hotmail.com Subject: Re: Prices Problem description ============================ Spammers signed up for the bulk email service using the victim’s email address. As a result, the victim is being «listbombed» with transactional messages and bulk email campaigns. Problem resolution ============================ In order to… Читать далее Abused / misconfigured newsletter service (listbombing)

Опубликовано
В рубрике microsoft.com

Abused / misconfigured newsletter service (listbombing)

The host at this IP address is being (ab)used to «listbomb» email addresses: From: info@schulman.nl Subject: Online Auction — Online Veiling, Nog maar 7 dagen! Problem description ============================ Spammers signed up for the bulk email service using the victim’s email address. As a result, the victim is being «listbombed» with transactional messages and bulk email… Читать далее Abused / misconfigured newsletter service (listbombing)

Опубликовано
В рубрике microsoft.com

phish source

IP emitting phish spam. Other similar seen today: 104.208.39.158 adm35.gruppobancobpm-id.com 104.43.197.21 adm31.gruppobancobpm-id.com 104.46.104.186 adm28.gruppobancobpm-id.com 104.46.97.56 adm23.gruppobancobpm-id.com 104.46.99.100 adm25.gruppobancobpm-id.com 137.116.80.178 adm21.gruppobancobpm-id.com 137.116.89.17 adm29.gruppobancobpm-id.com 23.100.83.231 adm34.gruppobancobpm-id.com ========================================================================================== Return-Path: <root@adm33.gruppobancobpm-id.com> Received: from minerim03.k1ob2oczazhedjugn4bo2dnzcd.gx.internal.cloudapp.net (adm33.gruppobancobpm-id.com [13.89.41.201]) by x (Postfix) with ESMTP id x for <x>; Mon, 8 Jun 2020 xx:xx:xx +0200 (CEST) Received: by minerim03.k1ob2oczazhedjugn4bo2dnzcd.gx.internal.cloudapp.net (Postfix, from userid 0)… Читать далее phish source

Опубликовано
В рубрике microsoft.com

Abused / misconfigured newsletter service (listbombing)

The host at this IP address is being (ab)used to «listbomb» email addresses: From: info@schulman.nl Subject: Laatste kans om te bieden! — Last chance to bid! Problem description ============================ Spammers signed up for the bulk email service using the victim’s email address. As a result, the victim is being «listbombed» with transactional messages and bulk… Читать далее Abused / misconfigured newsletter service (listbombing)

Опубликовано
В рубрике microsoft.com

Spam source @40.92.23.94

The host at this IP address is emitting spam emails. Spam sample ========================================= From: manishamedirattavb@outlook.com Subject: Website Services…? =========================================

Опубликовано
В рубрике microsoft.com

Spam source @40.92.255.86

The host at this IP address is emitting spam emails. Spam sample ========================================= From: kaverinadanqsp@outlook.com Subject: RE: (web-design) proposal =========================================

Опубликовано
В рубрике microsoft.com

Malware botnet controller @23.96.24.107

The host at this IP address is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. Malware botnet controller located at 23.96.24.107 on port 80 (using HTTP GET): hXXp://mediadownloader25.tk/click.php $ dig +short mediadownloader25.tk 23.96.24.107 Referencing malware binaries (MD5 hash): 006317d614432119b8d907f15d5b60ac — AV detection:… Читать далее Malware botnet controller @23.96.24.107

Опубликовано
В рубрике microsoft.com

Malware distribution @20.151.19.163

The host at this IP address (20.151.19.163) is either operated by cybercriminals or hosting compromised websites that are being used to distribute malware: http://20.151.19.163/lmaoWTF/loligang.x86 http://20.151.19.163/lmaoWTF/loligang.arm http://20.151.19.163/lmaoWTF/loligang.arm5 http://20.151.19.163/lmaoWTF/loligang.arm6 http://20.151.19.163/lmaoWTF/loligang.arm7 http://20.151.19.163/lmaoWTF/loligang.sh4 http://20.151.19.163/lmaoWTF/loligang.m68k http://20.151.19.163/lmaoWTF/loligang.mips http://20.151.19.163/lmaoWTF/loligang.mpsl http://20.151.19.163/lmaoWTF/loligang.spc http://20.151.19.163/lmaoWTF/loligang.ppc AS number: AS8075 AS name: MICROSOFT-CORP-MSN-AS-BLOCK

Опубликовано
В рубрике microsoft.com