Friday, January 28, 2011

FBI Impersonation Spam Serves Trojan.Ransom

For the past month,  a compromised web site has been sending emails purporting to be from the "Federal Bureau of Investigation".   The email encourages the victim to download a file which installs Trojan.Ransom.


The spear phishing email originates from an evidently compromised domain robertmueller.com.  The email that I received bears the subject line "Email Correspondence", and was 111 kb in size.  The email account which was used to send the email is infors@robertmueller.com.


A check of the site reveals that it has been in existence since 1999:

robertmueller.com a 85.13.128.201 dd1932.kasserver.com
robertmueller.net
ICANN Registrar:INTERNETWIRE COMMUNICATIONS GMBHCreated:1999-08-24Expires:2011-08-24Updated:2010-12-07
domain:          robertmueller.com
nserver:         ns5.kasserver.com
nserver:         ns6.kasserver.com
created:         1999-08-24
updated:         2010-12-07

owner-id:        RM624348
owner-org:       
owner-name:      Robert Caspar Mueller
owner-address:   Frankfurter Tor 7
owner-pcode:     10243
owner-city:      Berlin
owner-country:   DE
owner-phone:     +49 305 4714361
owner-email:     mail@robertmueller.com

This spear phishing campaign appears to be relatively unknown.  I checked the domain at Google Safe Browsing and Norton Safe Web, neither of which had checked the site.  McAfee Site Advisor gives the site a safe rating.


For over a year, members of the Russian Business Network have sought to impersonate F.B.I. leaders and web sites.


If you receive this email do not open it.


James McQuaid
1-28-2011

Tuesday, January 25, 2011

Massive Blackhat SEO Malware Campaign Launched

"Do not blame the Soviet Union had thousands of such care, the body for small medical gas cents, even if he is especially the fear, if allowed to spread this poison out of stock"

On January 23rd, thousands of machine generated attack sites were registered through GoDaddy via DNSPod name servers.  These sites generally include a name of 5 characters in length, and utilize the .info TLD.  The sites combine black hat SEO poisoning with virulent malware infections.  At least one anti-virus vendor has labeled the infections as "not disinfectable".

The structure of these sites take two forms.  The attack sites utilize a technique known as wild card DNS.  This enables an infinite number of subdomains to be created for a single domain name.  Sites like pgkqy.info, which I will refer to as the hounds, contain over 6000 links to the attack sites.  The hounds' content (6000 links) consists of 200 links to the subdomains of 30 different attack domains (note http://doc.emergingthreats.net/bin/viewfile/Main/RussianBusinessNetwork?rev=1;filename=hounds_to_the_hunters.txt).  The hounds' large number of links serve to boost the search engine rankings of the attack sites. 

The attack sites themselves are littered with keywords and phrases designed to poison search engine results, and lure the unwary.  These include references to celebrity sex scandals, teenage sex, and so forth.  The attack sites also contain machine generated text consisting of numerous paragraph length narratives (in English and Mandarin). Inserted among these narratives are out of context messages, which resemble coded messages.  Might the following be a reference to Iranian oil?:

"Since no increase, and that this spirit of building the base fluid, the patriarch will be purchased by the Shaw and the next war"

Regardless, the malware payload appears quite ominous on its own.  One of the sites distributing malware to the visitors of the attack sites (code1.2bj.cc) has previously distributed malware deemed "exact, not disinfectable" by F-Prot.  In that incident, anti-virus detection rates were approximately 50%:

Antivir                    TR/Agent.DT  
Avast                     Win32:Trojan-gen  
Bit Defender           Trojan.Agent.DT  
ClamAV                 Trojan.Agent-298  
DrWeb                   Trojan.PWS.Htool  
F-Prot                    W32/Trojan.CXF (exact, not disinfectable)  
F-Secure Anti-Virus           Trojan.Win32.Agent.dt  
Ikarus                    Trojan.Win32.Agent  
Kaspersky Anti-Virus         Trojan.Win32.Agent.dt  
McAfee VirusScan             potentially unwanted program Generic HTool  
Panda Anti-Virus               Trj/Agent.AMJ  
Sophos                Troj/HTool-B  
Symantec Command Line Scanner         Trojan Horse  
VBScan               Trojan.Agent.HPVY  
VirusBlokAda       Trojan.Win32.Agent.dt

Sites serving malware to the attack sites have been highly successful in separate campaigns over the past 90-days.  A sampling of Google Safe Browsing reveals results like the following:

tpjt.info:
Over the past 90 days, tpjt.info appeared to function as an intermediary for the infection of 254 site(s)
coooog.com:
Malicious software includes 143 exploit(s).
Over the past 90 days, coooog.com appeared to function as an intermediary for the infection of 371 site(s)

In the case of attack site 175.bctjd.info, network activity included:

Requests
URL    Status    Content Type
http://175.bctjd.info     200    text/html
http://175.bctjd.info/tj400.js     404    text/javascript
http://175.bctjd.info/tj.js     200    text/javascript
http://js.users.51.la/4440802.js     200    text/javascript
http://175.bctjd.info/1.js     200    text/javascript
http://tpjt.info/bs003/?9865     200    text/html
http://vip.coooog.com:8080/f/cpv.asp?adid=4207&uid=11228     200    text/javascript
http://122.226.223.149:8080/coo/uploadfile/20110114110108277.swf     200    application/x-shockwave-flash
about:blank     200    text/html
http://s6.cnzz.com/stat.php?id=1583556&web_id=1583556     200    text/javascript
http://vip.coooog.com:8080/f/mt.js     200    text/javascript
http://tpjt.info/skins/orange/images/style.css     200    text/javascript
http://tpjt.info/liaotian/cjtc.js     200    application/x-javascript
http://74.207.249.234/liaotian2/     200    text/html
http://74.207.249.234/liaotian1/flash/novie.swf     200    application/x-shockwave-flash
http://74.207.249.234/liaotian2/img/ChatShow.js     200    application/x-javascript
http://74.207.249.234/liaotian1/f1ash/16.swf     404    text/html
http://www.blogkou.com/f1ash/11.swf     200    application/x-shockwave-flash
http://www.blogkou.com/f1ash/3.swf     200    application/x-shockwave-flash
http://www.blogkou.com/f1ash/6.swf     200    application/x-shockwave-flash
http://www.blogkou.com/f1ash/5.swf     200    application/x-shockwave-flash
http://www.blogkou.com/f1ash/4.swf     200    application/x-shockwave-flash
http://www.blogkou.com/f1ash/7.swf     200    application/x-shockwave-flash
http://www.blogkou.com/f1ash/8.swf     200    application/x-shockwave-flash
http://www.blogkou.com/f1ash/9.swf     200    application/x-shockwave-flash
http://www.blogkou.com/f1ash/2.swf     200    application/x-shockwave-flash
http://www.blogkou.com/f1ash/13.swf     200    application/x-shockwave-flash
http://www.blogkou.com/f1ash/12.swf     200    application/x-shockwave-flash
http://www.blogkou.com/f1ash/15.swf     200    application/x-shockwave-flash
http://www.blogkou.com/f1ash/1.swf     200    application/x-shockwave-flash
http://74.207.249.234/liaotian2/img/ip.js     200    text/javascript
http://fw.qq.com:80/ipaddress     200    text/javascript
http://js.users.51.la/4429735.js     200    text/javascript
http://cpm.ad123456.com/m.js     200    text/javascript
http://tpjt.info/1.js     200    text/javascript
http://images.sohu.com/cs/jsfile/js/lu.js     200    text/javascript
http://js.star8.net/code.js     200    text/javascript
http://js.users.51.la/4192183.js     200    text/javascript
http://js.users.51.la/4397946.js     200    text/javascript
http://js.users.51.la/4392080.js     200    text/javascript
http://js.users.51.la/4286690.js     200    text/javascript
http://vip.coooog.com:8080/gotocpvv.asp?id=11228&adid=2105&Vfc=38333831333132383131313438313534&tid=11295&url=http://tpjt.info/bs003/?9865     500    text/html
http://lu.sogou.com/kwd?pid=meilalala&ct=kwd&fmt=h_kwd&dn=8&iw=728&ih=15&fs=12&c_bo=ffffff&c_bg=ffffff&c_fg=ff0000&tdw=&charset=gb2312&ti=QVOD%E4%BC%A6%E7%90%86%E7%94%B5%E5%BD%B1,%E4%BC%A6%E7%90%86%E7%94%B5%E5%BD%B1,QVOD%E7%94%B5%E5%BD%B1,%E5%BF%AB%E6%92%AD%E7%94%B5%E5%BD%B1,%E4%BC%A6%E7%90%86%E7%89%87,%E5%BF%AB%E6%92%AD%E4%BC%A6%E7%90%86%E7%94%B5%E5%BD%B1-%E5%9C%A8%E7%BA%BF%E5%85%8D%E8%B4%B9%E4%BC%A6%E7%90%86%E7%94%B5%E5%BD%B1%E7%BD%91&ref=http://tpjt.info/bs003/?9865&sohuurl=http://tpjt.info/bs003/?9865     200    text/html
http://code1.2bj.cc:8899/click.html?adid=687&uid=9idy     200    text/html
http://code1.2bj.cc:8899/cf.aspx?action=adget&ad_id=687&username=9idy     200    text/javascript
http://code1.2bj.cc:8899/CF.aspx?action=adget_2&UserName=9idy&Ad_ID=687&CycleAd=0&TcType=0&TcSpace=0&Ly=http://code1.2bj.cc:8899/click.html?adid=687&uid=9idy&FirstShow=1&CookieOk=1&WebWidth=0&WebHeight=0&WebTop=0&WebLeft=0     200    text/html
http://code1.2bj.cc:8899/click.html?adid=551&uid=9idy     200    text/html
http://code1.2bj.cc:8899/cf.aspx?action=adget&ad_id=551&username=9idy     200    text/javascript
http://code1.2bj.cc:8899/CF.aspx?action=adget_2&UserName=9idy&Ad_ID=551&CycleAd=0&TcType=0&TcSpace=0&Ly=http://code1.2bj.cc:8899/click.html?adid=551&uid=9idy&FirstShow=1&CookieOk=1&WebWidth=0&WebHeight=0&WebTop=0&WebLeft=0     200    text/html
http://pic.2bj.cn/upload/wz823/55/950x90.files/2.js     200    application/x-javascript
http://code1.2bj.cc:8899/click.html?adid=675&uid=9idy     200    text/html
http://code1.2bj.cc:8899/cf.aspx?action=adget&ad_id=675&username=9idy     200    text/javascript
http://code1.2bj.cc:8899/CF.aspx?action=adget_2&UserName=9idy&Ad_ID=675&CycleAd=0&TcType=0&TcSpace=0&Ly=http://code1.2bj.cc:8899/click.html?adid=675&uid=9idy&FirstShow=1&CookieOk=1&WebWidth=0&WebHeight=0&WebTop=0&WebLeft=0     200    text/html
http://c.star8.net/c1.ashx?ln=1&w=314261&sid=0&logo=true&e=OR8cNc5cKsA3Zk8bA2zB4PEV5be4MdCu4ZolkxB8r4c6mTNwRdD3UQ==&ar2s=1&furl=http://tpjt.info/bs003/?9865&ffurl=http://tpjt.info/bs003/?9865     200    text/html
http://sougoudaima.soua.com/101105/950x220/950x220.html?uid=2234     200    text/html
http://code.soua.com/js/common.js     200    text/javascript
http://code.soua.com/js/word.js     200    application/x-javascript
http://code1.2bj.cc:8899/click.html?adid=311&uid=9idy     200    text/html
http://code1.2bj.cc:8899/cf.aspx?action=adget&ad_id=311&username=9idy     200    text/javascript
http://code1.2bj.cc:8899/CF.aspx?action=adget_2&UserName=9idy&Ad_ID=311&CycleAd=0&TcType=0&TcSpace=0&Ly=http://code1.2bj.cc:8899/click.html?adid=311&uid=9idy&FirstShow=1&CookieOk=1&WebWidth=0&WebHeight=0&WebTop=0&WebLeft=0     200    text/html
http://pic.2bj.cn/upload/wz425/950_90_5_files/js.js     200    text/javascript
http://pic.2bj.cn/upload/wz425/950_90_5_files/279.css     200    text/javascript
In addition, numerous ActiveX controls were invoked.

The sites have been deployed throughout HostNOC.  Hound site pgkqy.info is at 173.212.238.77, while attack sites vdjiv.info and bbzfc.info reside at 173.212.238.76.  However, both hound site dsqof.info and attack site bjpwn.info are at 184.82.9.206.  All are utilizing f1g1ns1.dnspod.net as a DNS server.
We will pinpoint more hostile IP addresses as time permits.  You can pursue further investigation with the use of this file: http://doc.emergingthreats.net/bin/viewfile/Main/RussianBusinessNetwork?rev=1;filename=includes_skynet.txt.


James McQuaid
1-25-2011

Sunday, January 23, 2011

More Glavmed to Kick


Citing an alarming statistic, the Partnership at Drugfree.org announced the results of a suvey of consumers of online drug purchasing behavior. The survey's results? 1 in 6 adults, approximately 16% of adult population have bought or currently buy medications online without a doctor's prescription.


These counterfeit drugs are likely to harm you, and will leave your condition untreated.  One counterfeit's ingredients were shown to include roach powder, powdered brick, road paint, and floor wax. 


When you obtain a medication that has been approved by the FDA, and prescribed by a licensed practitioner, and purchased at a licensed pharmacy, that product is safe. When you go out of the system, you are dealing with criminals who have found it is easier to sell drugs online than to sell crack or heroin on the street.


Glavmed is the Russian mafia consortium that operates these illegal "pharmacies".  Today's RBN IP List Update includes additional Glavmed online properties.


Come on people, let's get smart.  For the most part, these guys are militant nationalists who hate all Americans.  They find it amusing that they can get the "stupid Americans" to pay to harm themselves.


Additional information is available at Gary Warner's excellent blog: http://garwarner.blogspot.com/2010/12/36-million-americans-buy-drugs-online.html


James McQuaid

Tuesday, January 18, 2011

A Backhand Blow to the Koobface Gang

Today's RBN IP List update is a backhand blow to the Koobface Gang. They are electronic terrorists systematically poisoning the Internet ecosystem, and they should be hunted down with extreme prejudice.

Over 100,000 networks utilize EmergingThreats.net's emerging-rbn.rules in their intrusion prevention systems and firewalls. You can find all of the files at http://doc.emergingthreats.net/bin/view/Main/RussianBusinessNetwork, including the RBN IP List. You can download today's observations update at: http://doc.emergingthreats.net/pub/Main/RussianBusinessNetwork/RBN_IP_List_Update_1-18-2011.txt

Home users can easily block the Koobface Gang (and other threats) using DNS BlackHole in Smoothwall Express.  The files are free and are available here: http://doc.emergingthreats.net/bin/view/Main/HoneywallSamples


James McQuaid

Sunday, January 16, 2011

Notes On The Darzhavna Sigurnost

I once worked with a refined and very gracious man, a gentlemen's gentlemen in every sense of the word. He had retired from the C.I.A. before taking a position in the organization where we had become acquainted. Not given to the negative, he was an evangelist for the power of positive thinking. He had a great sense of humor, which he could inject into an otherwise grim business meeting.

I had occasion to ask him about the Darzhavna Sigurnost during the Cold War. He described them as murderous gangsters, and related the story of an individual he had sought to extract from Bulgaria. He eventually found his man, at least the lower torso; the other half of the body having been burned up in a furnace.

Once Moscow’s most obedient ally, Bulgaria operated one of the most notorious spy networks in the Cold War era. The Darzhavna Sigurnost was implicated in plots ranging from a failed assassination attempt on Pope John Paul II to the killing of an exiled dissident in London with a poison-tipped umbrella.

Under current Bulgarian law, no one can be punished or face any legal consequences if they are named as former informants or spies. Previous attempts to bar them from holding public positions (including in law enforcement) have consistently been overruled by the constitutional court.

The Komitet za darzhavna sigurnost's 6th Directorate were the political police, and they were succeeded by the "Head Service for Combating Organized Crime". It had the following departments:
1st Department – worked among the intelligentsia and controlling the unions of artists
2nd Department – worked in the universities and among the students
3rd Department – responsible for the clergy, the Jews, Armenians and Russian White emigrants
4th Department – specialized in pro-Turkish and pro-Macedonian nationalism
5th Department – worked among the political rivals, such as the agrarians and social democrats
6th Department – observed pro-Maoist and anti-party activity
7th Department – information analysis and anonymous activity

The publication by Bulgaria's parliament in mid-December of the names of ambassadors and top diplomats in capitals ranging from Berlin, Lisbon, London, Madrid, Moscow and Rome to Beijing and Tokyo who all worked as agents or collaborators for the Darzhavna Sigurnost "has dealt a humiliating blow to Bulgaria's foreign service".

88 former Darzhavna Sigurnost agents "were still currently employed by the foreign ministry, including 33 ambassadors, eight interim ambassadors and four consuls-general. They included the Bulgarian envoys to 13 of the other 26 European Union capitals, plus Sofia's representatives to the United Nations in Geneva and New York, as well as all of its missions in the neighbouring Balkan countries". One former collaborator includes the country's current president Georgy Parvanov.

"In the second half of the 1970s and the first half of the 1980s, known terrorists were granted a safe haven in Bulgaria – the terrorist group led by Ilich Ramirez Sanchez, also known as Carlos the Jackal, the Abu Nidal group, and members and supporters of the Muslim Brotherhood.

During the same period, Bulgaria was visited by activists of known terrorist organizations, including the German Red Army Faction – also known as the Baader Meinhoff Gang – Turkey’s right- and left-wing extremists from the Grey Wolves and Dev Sol, as well as the Armenian Secret Army for the Liberation, or Armenia ASALA. These visits can be associated with the first acts of international terrorism on Bulgarian soil, such as hijacking of airplanes and assassinations of foreign diplomats."

In 2008, the New York Times cited an unnamed senior Western European diplomat as saying, "You could bet that anything we shared with Bulgaria inside NATO went straight to Moscow. The old Communist nomenklatura and secret services is still around in Romania and Bulgaria."

Western law enforcement officials, computer security specialists, and journalists need to bear in mind the character of who they are dealing with when they interact with Bulgaria's diplomatic service and law enforcement organizations.

James McQuaid
16 January 2011

Saturday, January 1, 2011

Blocking the Heihachi and 2x4.ru Networks

Lance Corporal Albert Miranda, Lance Corporal David Burdwell, and platoon Lieutenant Alec Bodenwiser hold Khe Sanh

USMC Lance Corporal Albert Miranda, Lance Corporal David Burdwell, and platoon Lieutenant Alec Bodenwiser hold Khe Sanh.

(photograph by David Douglas Duncan)


Heihachi Ltd. is a bulletproof, blackhat-hosting provider, located in the Russian Federation, which is a well known safe haven for Internet as well as, real world criminals. Heihachi hosts a large number of domains, the operators of which are engaged in hard core crime. The types of crimes these domains perpetrate include bank fraud, wire fraud, stolen credit card (carder), piracy, brand jacking, money mule recruiting, illegal drugs, illegal pornography, human smuggling, botnet operation, stealth malware, web site hacking, denial of service attacks, spam and phishing. It is more than disturbing that the Russian and Ukrainian governments shield these predators from prosecution. In December, Heihachi launched denial of service attacks against Spamhaus, and set up a mirror site from which it could attack the computers of those attempting to visit WikiLeaks. Heihachi Ltd. operates front companies in Panama and elsewhere.

Closely allied with Heihachi is the 2x4.ru network, operated from Moscow by Pavel Ivanov. Ivanov sits at the nexus between the criminality and terrorism. He is believed to have enabled terrorist activity. Ivanov operates shell companies in the Seychelles Islands and elsewhere (the address he used in registering these fronts in the Seychelles is actually that of a hotel).

This is transnational organized crime at its worst.

Heihachi-2x4.txt is a list of Heihachi and 2x4.ru domains, and you are well advised to add these to your DNS black hole and blocklists. You can freely download the file at:
http://www.jamesmcquaid.com/Heihachi-2x4.txt

James McQuaid
1-1-2011