Anti Virus Softwares

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Sunday, 26 October 2008

Phishing Clue Needed in Ecuador

Posted on 07:05 by Unknown

UPDATE: MISSION ACCOMPLISHED


After 26 days of continuous abuse, all of the ".ec" domains mentioned below were terminated within 1 day of the posting of this article. Thanks to those who saw this and helped bring it to the attention of our new friends in Ecuador...

End Update



Help! If you happen to know someone who works at NIC.EC, would you be willing to help translate a phishing problem to them?

The current longest-lived phishing campaign on the planet is currently abusing a group of domains in Ecuador, and its time for these domains to be terminated.

The domains in question are:

dll.ec
dll.com.ec
dll.net.ec
dllst.net.ec
dllst.ec

This campaign is part of the longest lived phishing campaign in the history of phishing, which has been continually plaguing Abbey Bank, a part of the Santander Group. Its long been obvious in the anti-phishing world that no one at Santander Group cares about phishing, so we pretty much just leave them alone. They don't answer emails, they don't have a visible level of participation in the Anti-Phishing Working Group, and they don't have a visible level of participation in the Digital PhishNet. They are also one of the few phishing-targeted banks on the planet that don't seem to use any external anti-phishing services. (Based on volume and longevity of phishing sites only -- if they are paying someone to shut down phishing sites, that company should find a new line of work.)

But this post isn't about Abbey. If Abbey were the only victim, I wouldn't be writing this. The problem is that the great success this phisher is having hosting his domains on ".ec" (Ecuador) domain space has caused him to branch out to target other brands.

The current Abbey path "/CentralFormWeb/Form/", has been in use since September 23rd. Since that date, I've received 64,473 alerts of phishing URLs on that path. The initial domains for the attack, dlstcks.com, dlstcks.net, and dlstcks.org were quickly terminated. dllst.ec was created on September 26th and has been used contantly since that time. dllst.com.ec, dllst.net.ec were added on September 27th, and dll.ec and dll.com.ec on September 30th.

Several other domains have come and gone during this campaign, including: dllstd.eu, dllstd.me.uk, ppt.net.kg, dlspot01.com, dllst.vu, dll-i.ph, dll-s.eu, dllsrv.co.uk, server.org.kg, dllstd.co.uk, dllsrv.co.uk.

For each of the domains above, one can do "path replacement" to demonstrate that there are several brands being targeted. As an example:

http://myonlineaccounts2.abbeynational.co.uk.dll.ec/CentralFormWeb/Form/



http://www.americanexpress.com.dll.ec/myca/form/serverstack/action



http://www.scotiaonline.scotiabank.com.dll.ec/online/form.jsp



http://online.lloydstsb.co.uk.dll.ec/customercare/serverid/cform.jsp



The machine name portion does not matter. Any machine name may be used with any of the four paths.

American Express was added to the attack on October 20th. That's EXTREMELY unusual, as we almost never see attacks against American Express!

Scotia Bank was next, added to the attack on October 23rd, using .dllst.com.ec, .dllst.ec since its first day.

Lloyds TSB is the newest victim brand, introduced to these paths only on October 25th. The Lloyds and Scotia attack paths have only used 9 domain names so far this time around, with the paths "/myca/form/serverstack/action" and "/online/form.jsp/" respectively:

dll.ec
dllst.com.ec
dllst.ec
dllst.net.ec

moder.ph

infod.tk
infodl.tk
mmdt.tk
tracklt.tk

I'm watching for new domains both in my phish pheeds, and by monitoring the Nameservers ns1.bestthetravel.net and ns1.alterdll.com, both being currently preferred by this phisher.

Because these are "proxy hosted" phish, they may temporarily not resolve for 90 seconds or so until it is noticed that one of the proxies is non-functional. When that is detected, the phisher's monitoring system automagically updates the nameserver resolution to point to a new available proxy. With a pool of thousands of potential proxy redirectors, this phish will continue to live until our friends in Ecuador terminate the domain names.

Thanks for any introductions you may have for us.

Oh - for any former CastleCops PIRT Handlers - I'm happy to report that the system seems "stable" and its time to report back to work! We've had a few die-hard PIRT Handlers who have worked straight through - most notably "Downie" and "s0tet". I hope to see many of the rest of you back there soon!

A sample PIRT ticket for the Abbey/AmEx/Scotia phish would be:

http://www.castlecops.com/Abbey_Bank_American_Express_Scotia_Bank_phish973790.html

Hopefully we'll have PIRT tickets for all nine of the active domains by this evening.
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in phishing | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • From Russia, With Love . . . new Postcard spam spies on your PC
    Isn't it nice to have friends who send you postcards? The UAB Spam Data Mine is especially fortunate in that way. Beginning the evenin...
  • Happy New Year! Here's a Virus! (New Year's Postcard malware)
    I've been busy this week looking at the various defacements (see ComputerWorld , and ABC News ) and other cyber attacks (see yesterday...
  • ACH Spammer switches to Shortened URLs
    For many weeks now the spammers behind one particular malware family have been fighting a running battle to keep their malware-hosting domai...
  • Tempting Photo Attachments Lead to Fake AV
    One of today's largest malicious spam campaigns continued an occasional theme we've been seeing for a few weeks. A subject line, fo...
  • Indictments reveal $77 Million in Illegal Pill Sales
    Congratulations to the Daytona Beach FBI, US Attorney Robert O'Neill, and their colleagues at IRS and FDA. The Daytona Beach News report...
  • Most Dangerous Cities for Cyber Crime?
    Symantec Riskiest Cybercrime Cities Symantec released a study today in conjunction with Sperling's Best Places today. According to thei...
  • Morocco based "Team Evil" reroutes prominent Israeli websites
    After more than 10,000 websites being defaced in protest of Israeli actions in Gaza, Morrocco-based defacement team "Team Evil" ha...
  • Minipost: Google v. Pacific WebWorks
    I blogged recently about the "Google Jobs" scammers who were abusing Twitter, Blogspot, Google Reader, and spaces.live.com by crea...
  • New Year's Waledac Card
    We haven't seen a new version of Waledac since Independence Day (July 4, 2009), but it looks like its back! I'm on vacation today, s...
  • WIRED: November Jargon Watch & Forensics?
    One of my NASA buddies (hi, Lisa!) dropped by last week for coffee and to catch up on the world of information management. When I introduce...

Categories

  • Blogs
  • Calendar
  • china
  • Communities
  • computer security careers
  • conficker
  • cyberwar
  • digital certificates
  • Drivers
  • email
  • Excel 2007
  • facebook
  • fake av
  • Features
  • Firewall
  • Gadgets
  • gumblar
  • Hardware
  • Hotmail
  • IE7
  • Internet Explorer 7
  • koobface
  • law enforcement
  • malware
  • Microsoft
  • Outlook
  • pharmaceuticals
  • phishing
  • PowerPoint 2007
  • public policy
  • Ready Boost
  • ReadyBoost
  • Security
  • Sidebar
  • Software
  • spam
  • Tutorials
  • twitter
  • twitter malware
  • USB
  • Virtual PC
  • Vista
  • waledac
  • Wallpaper
  • Websites
  • Windows
  • Windows Live
  • Windows Vista
  • Word 2007
  • zbot

Blog Archive

  • ►  2013 (17)
    • ►  November (1)
    • ►  October (1)
    • ►  September (1)
    • ►  August (3)
    • ►  July (1)
    • ►  June (1)
    • ►  May (5)
    • ►  April (3)
    • ►  March (1)
  • ►  2012 (18)
    • ►  August (1)
    • ►  June (1)
    • ►  May (7)
    • ►  April (2)
    • ►  March (7)
  • ►  2011 (28)
    • ►  November (3)
    • ►  October (1)
    • ►  August (4)
    • ►  July (6)
    • ►  June (1)
    • ►  May (2)
    • ►  April (2)
    • ►  March (6)
    • ►  February (1)
    • ►  January (2)
  • ►  2010 (80)
    • ►  December (6)
    • ►  November (10)
    • ►  October (6)
    • ►  September (12)
    • ►  August (5)
    • ►  July (4)
    • ►  June (11)
    • ►  April (7)
    • ►  March (8)
    • ►  February (4)
    • ►  January (7)
  • ►  2009 (93)
    • ►  December (12)
    • ►  November (11)
    • ►  October (16)
    • ►  September (7)
    • ►  July (5)
    • ►  June (10)
    • ►  May (2)
    • ►  April (7)
    • ►  March (7)
    • ►  February (6)
    • ►  January (10)
  • ▼  2008 (109)
    • ►  December (7)
    • ►  November (17)
    • ▼  October (12)
      • LaSalle acquisition by Bank of America spreads mal...
      • First Enom Phish, now Network Solutions Phish
      • Caution: Enom Phishing continues
      • Ding Dong The Witch Is Dead! ( ICANN Pulls the Pl...
      • Operación Carrusel sets an example for fighting Ch...
      • Phishing Clue Needed in Ecuador
      • The demise of index1.php PornTube Video Malware
      • Ryan Goldstein: Digerati Faces ?Justice?
      • FTC stops AffKing and SanCash, so is Pill Spam Gone?
      • SanCash (Affking) taken down in New Zealand
      • Vista Compatible Firewalls
      • Need help with your debt? Ask the Panamanian Russ...
    • ►  September (10)
    • ►  August (23)
    • ►  July (14)
    • ►  June (3)
    • ►  May (8)
    • ►  April (6)
    • ►  March (2)
    • ►  February (3)
    • ►  January (4)
  • ►  2007 (37)
    • ►  December (3)
    • ►  November (9)
    • ►  October (3)
    • ►  September (2)
    • ►  August (5)
    • ►  July (5)
    • ►  April (2)
    • ►  March (2)
    • ►  February (2)
    • ►  January (4)
  • ►  2006 (5)
    • ►  December (2)
    • ►  October (3)
Powered by Blogger.

About Me

Unknown
View my complete profile