Saturday, May 28, 2011

RBN Targets Lady Gaga

Steroid marketers in the Russian Business Network have targeted pop star Lady Gaga.

This takes the form of brand/copyright infringement attendant with the creation of the following domains:


On the face of it, these Lady Gaga domains appear to be the property of a Swedish marketing firm:
Reverse Whois:
"Ogelvy & Nielsen Ltd" owns about 19 other domains

Domain ID:D160903576-LROR
Created On:11-Dec-2010 21:48:32 UTC
Last Updated On:10-Feb-2011 03:49:07 UTC
Expiration Date:11-Dec-2011 21:48:32 UTC
Sponsoring Registrar:Directi Internet Solutions Pvt. Ltd. d/b/a
Registrant ID:DI_2144851
Registrant Name:Per Lundstroem
Registrant Organization:Ogelvy & Nielsen Ltd
Registrant Street1:12, Gammel Kongevej
Registrant Street2:
Registrant Street3:
Registrant City:Copenhagen V
Registrant State/Province:Bornholm
Registrant Postal Code:1610
Registrant Country:DK
Registrant Phone:+45.332565
Registrant Phone Ext.:
Registrant FAX:
Registrant FAX Ext.:
Registrant Email: is also Ogelvy & Nielsen Ltd (

Looking more closely, we can see that Ogelvy & Nielsen Ltd are a front: is hosted on a server in Hong Kong with IP address    a
Hong Kong

The name server for is

Other domains with the same IP address and name server are:
Domains using this as name server (8) itself is shielded by privacyprotect:

Domain Name: PRANZA.COM
Domain Admin (
ID#10760, PO Box 16
Note - All Postal Mails Rejected, visit
Nobby Beach
null,QLD 4218
Tel. +45.36946676 was registered through Directi:

Domain Name:    PRANZA.COM
Examining the other properties associated by DNS and IP address:

Created On:25-Mar-2005 09:25:39 UTC
Last Updated On:24-Aug-2010 13:46:11 UTC
Expiration Date:25-Mar-2012 09:25:39 UTC
Sponsoring Registrar:1API GmbH (R1724-LROR)
Registrant ID:RAI6113358-QAPX
Registrant Name:Rusnac Irina Anatoli
Registrant Organization:ICS Interland SRL
Registrant Street1:B-dul Stefan celMare, no. 169
Registrant Street2:
Registrant Street3:
Registrant City:Chisinau
Registrant State/Province:Chisinau
Registrant Postal Code:2004
Registrant Country:MD
Registrant Phone:+373.60305749
Registrant Phone Ext.:
Registrant FAX:
Registrant FAX Ext.:
Registrant Email:, based in Moldova, is an Internet marketer of anabolic steroids, human growth hormone, and the like, presumably manufactured by Balkan Pharmaceuticals SRL:

iVitamins Shop

Manufacturer:Balkan Pharmaceuticals. This product is human use licensed by law at GMP standards. More details on company website ... - Cached - Similar
Show more results from

iVITAMINS - Anabolic Steroids Discussion and Bodybuilding Forum

20 posts - 10 authors - Last post: Sep 19, 2006
Just to let others know,I had some damage occur during shipping and I-vitamins said they would ship a replacement.Exellent costumer service. ... › ... › News & Updates › Anasci Board Sponsors - Cached - Similar
Very Happy with
Reverse Whois:
"SC Balkan Pharmaceuticals SRL" owns about 1 other domains
Registration Service Provided By: IMENA.UA
Contact: +380.442010102
    SC Balkan Pharmaceuticals SRL
    Silviu Chiru        ()
    ul. N.Grehdesku 4
    Tel. +1.22503588
    Fax. +373.22503589

James McQuaid

Saturday, May 14, 2011

How To Disable WebGL

On May 11th, Swa Frantzen posted "Time to disable WebGL?" on the Internet Storm Center's Diary page (  Dan Goodin also covered this story on the 11th: "New graphics engine imperils users of Firefox and Chrome" ( 

Both articles point out that US-CERT has recommended that WebGL be turned off in browsers which support it (

The SANS piece mentions that in order to disable WebGL in Google Chrome "It needs the --disable-webgl argument on the command line".  After some testing, I have concluded that this only works once (i.e. in the browser session opened from the command line).  In addition, if you open the command window in the Run As Administrator mode, the command line argument does not work at all.

In order to disable WebGL on end user computers, it is necessary to change the target of every Google Chrome shortcut on a machine. 

To make this change in Windows 7:
1) right click the Google Chrome shortcut,
2) left click Properties,
3) click the Shortcut tab,and
4) change the Target to:
C:\Users\THEUSERNAME\AppData\Local\Google\Chrome\Application\chrome.exe --disable-webgl

This will not prevent users from creating a new WebGL enabled shortcut.

In Firefox 4.01, WebGL can be disabled by:
1) enter "about:config" in the address window,
2) scroll down to webgl.disabled and right click on it,
3) left click Toggle.

You can test your configurations by browsing to this site:  If the puppy appears in a rotating cube, WebGL is enabled.  If WebGL is disabled, you will see a photograph.

The WebGL extension designed to protect the GPU stack from exploitation, GL_ARB_robustness, has not been deployed by most GPU vendors.

Once WebGL is effectively sandboxed by Google and Mozilla, I will be happy to turn it back on.  Until then, the eye candy will have to wait.

Additional references:

James McQuaid

Sunday, March 20, 2011

RBN IP List and Super Black Hole Updated

Hunting the RBN

IP address ranges from which the former customers of the RBN ISP, their malware marketing affiliate networks, emulators, and other organized crime groups exploit consumers. Block at will:

Protect your family and home network from 300,675 of "the baddest of the bad" domains blacklisted for Smoothwall 3:



Sunday, March 6, 2011

RBN IP List Update 3-6-2011

RBN IP List Update 3-6-2011 is available at:

In this update we add more coverage for ChronoPay properties.  Thus far, we have seen only one domain object move.  The mail server was located at (AS43355 UPL-TELECOM-AS UPL Telecom) and is now deployed at (Hetzner).  Both of these IP addresses also host DNS servers, so this provides a clue as to enemy infrastructure.

In addition to Pavel Vrublevsky's hubris, the update lists new instances of SpyEye Command and Control servers, Zeus, several backdoor trojans, a Heihachi deployment of Trojan Palevo, and we catch the Koobface Gang victimizing cancer patients with Trojan Bredolab.

We have consolidated several IP listings (an opportunity provided by consistently malicious behavior).

We wish to acknowledge Brian Krebs, the Malware Domain List, and David Glosser at Malware Domains.

Thank you,

James McQuaid

Saturday, February 12, 2011

AnonLeaks On The Move

Yesterday, I pointed out that had been deployed on IP address During the night, was moved to In addition, was deployed on
In addition, has been set up within criminal hoster Webalta's IP space:
Anonops has several familiar dedicated DDOS domains at
Hijacked brands on include Facebook, HSBC Finance, Nintendo, and Star Wars. In addition, the IP is cluttered with web spam junk domains.

According to, there have been 29 separate instances of malware on during the past 12 months (including, and the host domain objects remain in play (they include various subdomains for,, and
MalwareURL reports that Zeus and other keyloggers are currently active on the IP. is the bad hosting firm involved, and we will be taking a close look at their other operations.

James McQuaid

Friday, February 11, 2011

AnonLeaks Continues Relationship With Criminals

The sociopaths at Anonymous are once again aligning themselves with cyber criminals.  You may recall that they hooked up with Heihachi some time ago.  Now they are launching AnonLeaks as a replacement for wikileaks.  While AnonLeaks is being promoted through social media, and a free sites such as blogger, they have also launched a subdomain at malware domain

Google Safe Browsing paints a pretty ugly picture:
"Malicious software includes 1 scripting exploit(s), 1 trojan(s), 1 exploit(s). Successful infection resulted in an average of 1 new process(es) on the target machine."

Threat Expert, Norton, and McAfee also warn of malware at the site: is nestled in with numerous scam, fraud and malware sites at

    * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
If you don't want to reload your computer as well as, deal with the nightmare that is identity theft, stay away from the various AnonLeaks sites.

We will be adding to the RBN IP List with the next update.

Amazon may be interested to learn that they are hosting a site being utilized by Anonymous:

AnonLeaks. posted Dec 14, 2010 03:57:55 by anonleaks123. Pure Awesomeness. page 1. Back to Topics. Login below to reply: get your own embeddable forum with a United States Amazon IAD prefix AS14618 Amazon-AES-IAD

One of the characteristics that the members of Anonymous have in common with their Russian and Ukrainian cybercriminal benefactors is that they evidently never received a moral education. Another is that they are felons who have earned hard prison time.

James McQuaid
11 February 2011

Friday, January 28, 2011

FBI Impersonation Spam Serves Trojan.Ransom

For the past month,  a compromised web site has been sending emails purporting to be from the "Federal Bureau of Investigation".   The email encourages the victim to download a file which installs Trojan.Ransom.

The spear phishing email originates from an evidently compromised domain  The email that I received bears the subject line "Email Correspondence", and was 111 kb in size.  The email account which was used to send the email is

A check of the site reveals that it has been in existence since 1999: a
ICANN Registrar:INTERNETWIRE COMMUNICATIONS GMBHCreated:1999-08-24Expires:2011-08-24Updated:2010-12-07
created:         1999-08-24
updated:         2010-12-07

owner-id:        RM624348
owner-name:      Robert Caspar Mueller
owner-address:   Frankfurter Tor 7
owner-pcode:     10243
owner-city:      Berlin
owner-country:   DE
owner-phone:     +49 305 4714361

This spear phishing campaign appears to be relatively unknown.  I checked the domain at Google Safe Browsing and Norton Safe Web, neither of which had checked the site.  McAfee Site Advisor gives the site a safe rating.

For over a year, members of the Russian Business Network have sought to impersonate F.B.I. leaders and web sites.

If you receive this email do not open it.

James McQuaid

Tuesday, January 25, 2011

Massive Blackhat SEO Malware Campaign Launched

"Do not blame the Soviet Union had thousands of such care, the body for small medical gas cents, even if he is especially the fear, if allowed to spread this poison out of stock"

On January 23rd, thousands of machine generated attack sites were registered through GoDaddy via DNSPod name servers.  These sites generally include a name of 5 characters in length, and utilize the .info TLD.  The sites combine black hat SEO poisoning with virulent malware infections.  At least one anti-virus vendor has labeled the infections as "not disinfectable".

The structure of these sites take two forms.  The attack sites utilize a technique known as wild card DNS.  This enables an infinite number of subdomains to be created for a single domain name.  Sites like, which I will refer to as the hounds, contain over 6000 links to the attack sites.  The hounds' content (6000 links) consists of 200 links to the subdomains of 30 different attack domains (note;filename=hounds_to_the_hunters.txt).  The hounds' large number of links serve to boost the search engine rankings of the attack sites. 

The attack sites themselves are littered with keywords and phrases designed to poison search engine results, and lure the unwary.  These include references to celebrity sex scandals, teenage sex, and so forth.  The attack sites also contain machine generated text consisting of numerous paragraph length narratives (in English and Mandarin). Inserted among these narratives are out of context messages, which resemble coded messages.  Might the following be a reference to Iranian oil?:

"Since no increase, and that this spirit of building the base fluid, the patriarch will be purchased by the Shaw and the next war"

Regardless, the malware payload appears quite ominous on its own.  One of the sites distributing malware to the visitors of the attack sites ( has previously distributed malware deemed "exact, not disinfectable" by F-Prot.  In that incident, anti-virus detection rates were approximately 50%:

Antivir                    TR/Agent.DT  
Avast                     Win32:Trojan-gen  
Bit Defender           Trojan.Agent.DT  
ClamAV                 Trojan.Agent-298  
DrWeb                   Trojan.PWS.Htool  
F-Prot                    W32/Trojan.CXF (exact, not disinfectable)  
F-Secure Anti-Virus           Trojan.Win32.Agent.dt  
Ikarus                    Trojan.Win32.Agent  
Kaspersky Anti-Virus         Trojan.Win32.Agent.dt  
McAfee VirusScan             potentially unwanted program Generic HTool  
Panda Anti-Virus               Trj/Agent.AMJ  
Sophos                Troj/HTool-B  
Symantec Command Line Scanner         Trojan Horse  
VBScan               Trojan.Agent.HPVY  
VirusBlokAda       Trojan.Win32.Agent.dt

Sites serving malware to the attack sites have been highly successful in separate campaigns over the past 90-days.  A sampling of Google Safe Browsing reveals results like the following:
Over the past 90 days, appeared to function as an intermediary for the infection of 254 site(s)
Malicious software includes 143 exploit(s).
Over the past 90 days, appeared to function as an intermediary for the infection of 371 site(s)

In the case of attack site, network activity included:

URL    Status    Content Type     200    text/html     404    text/javascript     200    text/javascript     200    text/javascript     200    text/javascript     200    text/html     200    text/javascript     200    application/x-shockwave-flash
about:blank     200    text/html     200    text/javascript     200    text/javascript     200    text/javascript     200    application/x-javascript     200    text/html     200    application/x-shockwave-flash     200    application/x-javascript     404    text/html     200    application/x-shockwave-flash     200    application/x-shockwave-flash     200    application/x-shockwave-flash     200    application/x-shockwave-flash     200    application/x-shockwave-flash     200    application/x-shockwave-flash     200    application/x-shockwave-flash     200    application/x-shockwave-flash     200    application/x-shockwave-flash     200    application/x-shockwave-flash     200    application/x-shockwave-flash     200    application/x-shockwave-flash     200    application/x-shockwave-flash     200    text/javascript     200    text/javascript     200    text/javascript     200    text/javascript     200    text/javascript     200    text/javascript     200    text/javascript     200    text/javascript     200    text/javascript     200    text/javascript     200    text/javascript     500    text/html,%E4%BC%A6%E7%90%86%E7%94%B5%E5%BD%B1,QVOD%E7%94%B5%E5%BD%B1,%E5%BF%AB%E6%92%AD%E7%94%B5%E5%BD%B1,%E4%BC%A6%E7%90%86%E7%89%87,%E5%BF%AB%E6%92%AD%E4%BC%A6%E7%90%86%E7%94%B5%E5%BD%B1-%E5%9C%A8%E7%BA%BF%E5%85%8D%E8%B4%B9%E4%BC%A6%E7%90%86%E7%94%B5%E5%BD%B1%E7%BD%91&ref=     200    text/html     200    text/html     200    text/javascript     200    text/html     200    text/html     200    text/javascript     200    text/html     200    application/x-javascript     200    text/html     200    text/javascript     200    text/html     200    text/html     200    text/html     200    text/javascript     200    application/x-javascript     200    text/html     200    text/javascript     200    text/html     200    text/javascript     200    text/javascript
In addition, numerous ActiveX controls were invoked.

The sites have been deployed throughout HostNOC.  Hound site is at, while attack sites and reside at  However, both hound site and attack site are at  All are utilizing as a DNS server.
We will pinpoint more hostile IP addresses as time permits.  You can pursue further investigation with the use of this file:;filename=includes_skynet.txt.

James McQuaid

Sunday, January 23, 2011

More Glavmed to Kick

Citing an alarming statistic, the Partnership at announced the results of a suvey of consumers of online drug purchasing behavior. The survey's results? 1 in 6 adults, approximately 16% of adult population have bought or currently buy medications online without a doctor's prescription.

These counterfeit drugs are likely to harm you, and will leave your condition untreated.  One counterfeit's ingredients were shown to include roach powder, powdered brick, road paint, and floor wax. 

When you obtain a medication that has been approved by the FDA, and prescribed by a licensed practitioner, and purchased at a licensed pharmacy, that product is safe. When you go out of the system, you are dealing with criminals who have found it is easier to sell drugs online than to sell crack or heroin on the street.

Glavmed is the Russian mafia consortium that operates these illegal "pharmacies".  Today's RBN IP List Update includes additional Glavmed online properties.

Come on people, let's get smart.  For the most part, these guys are militant nationalists who hate all Americans.  They find it amusing that they can get the "stupid Americans" to pay to harm themselves.

Additional information is available at Gary Warner's excellent blog:

James McQuaid

Tuesday, January 18, 2011

A Backhand Blow to the Koobface Gang

Today's RBN IP List update is a backhand blow to the Koobface Gang. They are electronic terrorists systematically poisoning the Internet ecosystem, and they should be hunted down with extreme prejudice.

Over 100,000 networks utilize's emerging-rbn.rules in their intrusion prevention systems and firewalls. You can find all of the files at, including the RBN IP List. You can download today's observations update at:

Home users can easily block the Koobface Gang (and other threats) using DNS BlackHole in Smoothwall Express.  The files are free and are available here:

James McQuaid

Sunday, January 16, 2011

Notes On The Darzhavna Sigurnost

I once worked with a refined and very gracious man, a gentlemen's gentlemen in every sense of the word. He had retired from the C.I.A. before taking a position in the organization where we had become acquainted. Not given to the negative, he was an evangelist for the power of positive thinking. He had a great sense of humor, which he could inject into an otherwise grim business meeting.

I had occasion to ask him about the Darzhavna Sigurnost during the Cold War. He described them as murderous gangsters, and related the story of an individual he had sought to extract from Bulgaria. He eventually found his man, at least the lower torso; the other half of the body having been burned up in a furnace.

Once Moscow’s most obedient ally, Bulgaria operated one of the most notorious spy networks in the Cold War era. The Darzhavna Sigurnost was implicated in plots ranging from a failed assassination attempt on Pope John Paul II to the killing of an exiled dissident in London with a poison-tipped umbrella.

Under current Bulgarian law, no one can be punished or face any legal consequences if they are named as former informants or spies. Previous attempts to bar them from holding public positions (including in law enforcement) have consistently been overruled by the constitutional court.

The Komitet za darzhavna sigurnost's 6th Directorate were the political police, and they were succeeded by the "Head Service for Combating Organized Crime". It had the following departments:
1st Department – worked among the intelligentsia and controlling the unions of artists
2nd Department – worked in the universities and among the students
3rd Department – responsible for the clergy, the Jews, Armenians and Russian White emigrants
4th Department – specialized in pro-Turkish and pro-Macedonian nationalism
5th Department – worked among the political rivals, such as the agrarians and social democrats
6th Department – observed pro-Maoist and anti-party activity
7th Department – information analysis and anonymous activity

The publication by Bulgaria's parliament in mid-December of the names of ambassadors and top diplomats in capitals ranging from Berlin, Lisbon, London, Madrid, Moscow and Rome to Beijing and Tokyo who all worked as agents or collaborators for the Darzhavna Sigurnost "has dealt a humiliating blow to Bulgaria's foreign service".

88 former Darzhavna Sigurnost agents "were still currently employed by the foreign ministry, including 33 ambassadors, eight interim ambassadors and four consuls-general. They included the Bulgarian envoys to 13 of the other 26 European Union capitals, plus Sofia's representatives to the United Nations in Geneva and New York, as well as all of its missions in the neighbouring Balkan countries". One former collaborator includes the country's current president Georgy Parvanov.

"In the second half of the 1970s and the first half of the 1980s, known terrorists were granted a safe haven in Bulgaria – the terrorist group led by Ilich Ramirez Sanchez, also known as Carlos the Jackal, the Abu Nidal group, and members and supporters of the Muslim Brotherhood.

During the same period, Bulgaria was visited by activists of known terrorist organizations, including the German Red Army Faction – also known as the Baader Meinhoff Gang – Turkey’s right- and left-wing extremists from the Grey Wolves and Dev Sol, as well as the Armenian Secret Army for the Liberation, or Armenia ASALA. These visits can be associated with the first acts of international terrorism on Bulgarian soil, such as hijacking of airplanes and assassinations of foreign diplomats."

In 2008, the New York Times cited an unnamed senior Western European diplomat as saying, "You could bet that anything we shared with Bulgaria inside NATO went straight to Moscow. The old Communist nomenklatura and secret services is still around in Romania and Bulgaria."

Western law enforcement officials, computer security specialists, and journalists need to bear in mind the character of who they are dealing with when they interact with Bulgaria's diplomatic service and law enforcement organizations.

James McQuaid
16 January 2011

Saturday, January 1, 2011

Blocking the Heihachi and Networks

Lance Corporal Albert Miranda, Lance Corporal David Burdwell, and platoon Lieutenant Alec Bodenwiser hold Khe Sanh

USMC Lance Corporal Albert Miranda, Lance Corporal David Burdwell, and platoon Lieutenant Alec Bodenwiser hold Khe Sanh.

(photograph by David Douglas Duncan)

Heihachi Ltd. is a bulletproof, blackhat-hosting provider, located in the Russian Federation, which is a well known safe haven for Internet as well as, real world criminals. Heihachi hosts a large number of domains, the operators of which are engaged in hard core crime. The types of crimes these domains perpetrate include bank fraud, wire fraud, stolen credit card (carder), piracy, brand jacking, money mule recruiting, illegal drugs, illegal pornography, human smuggling, botnet operation, stealth malware, web site hacking, denial of service attacks, spam and phishing. It is more than disturbing that the Russian and Ukrainian governments shield these predators from prosecution. In December, Heihachi launched denial of service attacks against Spamhaus, and set up a mirror site from which it could attack the computers of those attempting to visit WikiLeaks. Heihachi Ltd. operates front companies in Panama and elsewhere.

Closely allied with Heihachi is the network, operated from Moscow by Pavel Ivanov. Ivanov sits at the nexus between the criminality and terrorism. He is believed to have enabled terrorist activity. Ivanov operates shell companies in the Seychelles Islands and elsewhere (the address he used in registering these fronts in the Seychelles is actually that of a hotel).

This is transnational organized crime at its worst.

Heihachi-2x4.txt is a list of Heihachi and domains, and you are well advised to add these to your DNS black hole and blocklists. You can freely download the file at:

James McQuaid