Showing posts with label phishing. Show all posts
Showing posts with label phishing. Show all posts

Sunday, 16 November 2014

Malware spreading via Steam chat

If you're only interested in how to remove this malware from your machine or other tips and prevention advise, click here. In case you have questions, issues or doubts, feel free to leave a comment and I'll be happy to help or answer any questions you may have. (you may have to click 'Load more...' or 'Loading...' to view all comments)


Today I was brought to the attention of a Tumblr post - apparently there's malware doing the rounds making use of Steam chat, (adding Steam friends and) spamming Steam users.

Example message:
"karpathos" sending a bit.ly link (Image source)






















Onyx is right, the link's indeed phishy and uses bit.ly (a URL shortener) to trick users into clicking it. Remember the worm that spread via Skype and Messenger last year? (reference here and here) This is a similar campaign.



Setup

Someone adds you on Steam, you accept and immediately a chat pops up as similar to above.

Alternatively someone from your friends list already got infected and is now sending the same message to all his/her friends.

The bit.ly link actually refers to a page on Google Drive, which immediately downloads a file called IMG_211102014_17274511.scr, which is in fact a Screensaver file - an executable.
The file is shared by someone named "qwrth gqhe". Looks legit.

Note that normally, the Google Drive Viewer application will be shown and this will allow you to download the .scr file. In this case, the string "&confirm=no_antivirus" is added to the link, which means the file will pop-up immediately asking what to do: Run or Save.
(and in some cases download automatically)

At time of writing, the file is actually still being hosted by Google Drive. I have reported it however.

Afterwards, you're presented with the screensaver file which has the following icon:
Image of IMG_211102014_17274511.scr file














Opening the file will result in installing malware on your system, which will steal your Steam credentials.



Technical details

IMG_211102014_17274511.scr

Original Filename: wrrrrrrrrrrrr.exe

Type: PE32 executable for MS Windows (GUI) Intel 80386 32-bit Mono/.Net assembly
SHA1: 7d0575a883fed7a460b49821c7d81897ae515d43
VirusTotal: link


Connects to:
185.36.100.181


Server in Czech Republic. VirusTotal reference










Downloads and executes:
temp.exe

Type: PE32 executable for MS Windows (GUI) Intel 80386 32-bit Mono/.Net assembly

SHA1: cd9b3bf5c8d70e833b5c580c9b2fc1f3e5e4341e
VirusTotal: link




Interesting information in the debug path, note the "steamstealer" string.











Remediation

What if you clicked the link and executed the file? Follow these steps:


  • Exit Steam immediately
  • Open up Task Manager (CTRL + SHIFT + ESC) and find a process called temp.exewrrrrrrrrrrrr.exevv.exe or a process with a random name, for example 340943.exe or a process similar to the file you executed
  • Launch a scan with your installed antivirus
  • Launch a scan with another, online antivirus or install & scan with Malwarebytes
  • When the malware has been disinfected or deleted, change your Steam password - if you use the same password for other sites, change those as well
  • De-authorize any unknown machines, read how to do that here:
    Family Library Sharing User Guide
  • Verify none of your Steam items are missing - if so, it is advised to reinstall Steam as well.
    Note: move the Steamapps folder (default on C:\Program Files\Steam\Steamapps) outside of the Steam directory to prevent your games from being deleted
  • Contact Steam/Valve in order to get your items back:
    Send a ticket to Steam support




Prevention
  • Be wary when someone new or with Level 0 adds you on Steam and immediately starts sending links
  • In fact, don't click on links someone unknown sends to you
  • If you receive a link which is a URL shortener (bit.ly or goo.gl for example), you can use GetLinkInfo to see the real URL
  • If you did click the link, don't open or execute anything else - just close the webpage (if any) or cancel the download
  • By default, file extensions are not shown. Enable 'Show file extensions' to see the real file type. Read how to do that here
  • Install WOT - WOT is a community-based tool and is therefore very useful for those fake screenshot websites, whereas other users can warn you about the validity.
  • Follow the tips by Steam itself to further protect your account:
    Account Security Recommendations
  • If you trade a lot or want to check if a Steam account has a bad reputation, you can use SteamRep:
    https://steamrep.com/
  • SteamRep has also set up a Safe Trading Practices guide.
  • Consider setting up the Steam Guard Mobile Authenticator (2FA).
  • There's a useful guide in preventing scams on this Reddit link as well.
  • For sysadmins/network administrators, I have created an IOC on AlienVault OTX with all known (to me at least) SteamStealer IPs.




    Conclusion 


    Never click on unknown links, especially when a URL shortener service like bit.ly is used. (others are for example t.co, goog.gl, tinyurl, etc.)
    Don't be fooled by known icons or "legit" file descriptions, this can easily be altered.

    Even if you clicked the link and you're not suspicious, you should be when a file is downloaded and it's (in this case) a screensaver file.

    For checking what is really behind a short URL, you can use:

    For checking whether a file is malicious or not:

    Follow the prevention tips above to stay safe and protect yourself from the SteamStealer malware.


    Wednesday, 14 November 2012

    Diablo account phishing


    Do you love the smell of phishing in the morning? I surely don't. In today's post we will be reviewing a phishing attempt for Diablo or Diablo III.

    The following mail ended up in my mailbox:

    You need to login as soon as possible to avoid account closing

    There are other, less fancy examples:

    Same trick as in the previous example. You need to "verify" your account


    Subjects of the mail can vary, but these are the most common:
    - Blizzard Notification About Diablo III Account
    - Diablo III Account-Notice
    - Diablo III Account - login validation‏
    - You must verify your identity as the registered account .World of  Warcraft - Diablo III account (s).

    The introduction in the email reads:

    Greetings!   It has come to our attention that you are trying to sell your personal Diablo III account(s). As you may not be aware of, this conflicts with the EULA and Terms of Agreement. If this proves to be true, your account can and will be disabled.  It will be ongoing for further investigation by Blizzard Entertainment's employees. If you wish to not get your account suspended you should immediately verify your account ownership.


    Let's move on to the actual link in the phishing mail. When clicked you'll land on the following page:

    An exact copy of the real login page at Battle.net















    Below you can find the list of URLs I've gathered in the past days, do not visit any of them as they may harm your computer (or even worse, your Diablo account ;-) ).

    hxxp://battle.net.noreply-login.com
    hxxp://cn15mcc.com
    hxxp://eu.diablo.net.account.oy-login.in
    hxxp://eu.diablo.net.account.ts-login.in
    hxxp://eu.diablo.net.ca.zx-login.in
    hxxp://eu.diablo.net.jiagedi.info
    hxxp://eu.diablo.net.tianzhou58.info
    hxxp://us.battle.com.wwowus.com
    hxxp://us.battle.net.aacc.cn.com
    hxxp://us.battle.net.cacc.cn.com
    hxxp://us.battle.net.ccus.asia
    hxxp://us.battle.net.ddeu.asia
    hxxp://us.battle.net.eacc.cn.com
    hxxp://us.battle.net.en.oo-rs.com
    hxxp://us.battle.net.en.qq-rs.com
    hxxp://us.battle.net.en.uu-rs.com
    hxxp://us.battle.net.facc.cn.com
    hxxp://us.battle.net.ffus.asia
    hxxp://us.battle.net.gacc.cn.com
    hxxp://us.battle.net.ggwow.asia
    hxxp://us.battle.net.hhwow.asia
    hxxp://us.battle.net.iacc.cn.com
    hxxp://us.battle.net.iieu.asia
    hxxp://us.battle.net.jacc.cn.com
    hxxp://us.battle.net.kacc.cn.com
    hxxp://us.battle.net.lacc.cn.com
    hxxp://us.battle.net.lacc.cn.com
    hxxp://us.battle.net.llus.asia
    hxxp://us.battle.net.login.en.ddus.asia
    hxxp://us.battle.net.login.en.yykiki.com
    hxxp://us.battle.net.login.en.zkiki.com
    hxxp://us.battle.net.ok.jjweb.asia
    hxxp://us.battle.net.ok.kk-rs.com
    hxxp://us.battle.net.ok.qw-rs.com
    hxxp://us.battle.net.ok.uuweb.asia
    hxxp://us.battle.net.ok.yywow.asia
    hxxp://us.battle.net.pacc.cn.com
    hxxp://us.battle.net.ppwow.asia
    hxxp://us.battle.net.qacc.cn.com
    hxxp://us.battle.net.racc.cn.com
    hxxp://us.battle.net.rreu.asia
    hxxp://us.battle.net.tacc.cn.com
    hxxp://us.battle.net.uacc.cn.com
    hxxp://us.battle.net.uuwow.asia
    hxxp://us.battle.net.w.llweb.asia
    hxxp://us.battle.net.wacc.cn.com
    hxxp://us.battle.net.w-u.asia
    hxxp://us.battle.net.xacc.cn.com
    hxxp://us.battle.net.yacc.cn.com
    hxxp://us.battle.net.zacc.cn.com
    hxxp://us.battle.net-bizzard-d3-com.account-com.net
    hxxp://us.diablo.net.en.rk-login.in




    Most of the domains seem to be set up by the same person, someone named "Jin Yu":
    Registrant Contact:
       Jin Yu
       Yu Jin jinyu2000@yahoo.cn
       +86.324242434233 fax: +86.324242434233
       ShengLiLu
       Shangraoshi Jiangxi 610041
       CN

    Other email addresses associated with Jin Yu:
    329409115@qq.com
    service@511web.com


    Almost all of the IP addresses are originating from China. The hosting companies are as follows, and seem to not care (or know) that malware and phishing pages are set up:

    Beijing Weishichuangjie Technical Development Co. - IPvoid Result
    DEEPAK MEHTA FIE - IPvoid Result
    New World Telecom Ltd., Hong Kong - IPvoid Result
    XIN XIN LING - IPvoid Result


    Thanks to IPvoid you can easily see other sites hosted there, seems there is more of the same. (read: more malware & phishing pages are hosted)




    Conclusion

    Stay away from phishing mails like the ones pointed out in this post. There are several variants, some more graphical than others, but in the end they serve the same purpose:
    Trying to steal your login credentials!

    I'm sure that even when you open the mail, alarm bells should be going off if you simply check the URL, it's pointing to another address than the usual login page.

    To be clear, the real webpage to login for your Battle.net account is:
    https://battle.net/login/en/

    If you're ever in doubt, visit the website directly and do not click on any links in emails from unknown senders. Use add-ons like WoT and/or NoScript to stay protected against these types of threats.
    You can also use the URL scanning services at VirusTotal or URLvoid to double-check a URL.



    Friday, 10 August 2012

    A word on XDocCrypt/Dorifel/Quervar

    I'm sure everyone has heard by now about the so called XDocCrypt/Dorifel/Quervar malware.

    It has mostly damaged machines in The Netherlands, but reports have come in from other countries (including the United States) as well. I myself have seen this infection on 08/08/2012, my initial thought was: ransomware. However, there isn't any message displayed, so it's either a failed ransomware attempt or the malware simply wants to annoy users.

    This virus infects Office files, reverses the extension and adds “.scr” behind it (this is also known as the RTLO unicode hole, which makes it easy to hide the original file extensions. - I remember a blogpost from not too long, about this hole targeting users of the Arabic language, let me know if you find it - ). Renaming does not solve the issue, you cannot open the documents.



    Office files affected by the malware


    As is depicted in the figure above, Word and Excel files have their extension reversed, so now the files appear to be .scr files, which is the format for a Screensaver. The .jpg file is not affected in any way.

    The files are encrypted with RC4, which is a very common encryption algorithm in the cryptography. SurfRight has developed a tool to decrypt (and recover) your files:
    Dorifel decrypter



    The malware has probably been downloaded by the Citadel or Zeus (aka Zbot) malware.


    Zeus sample:

    remyf.exe
    Result: 12/42
    MD5: 30e7785cb9eafcea34fe930631fbba07
    VirusTotal Report
    Anubis Report



    Let's take a look at a few Dorifel samples:

    Acquisit.exe
    Result: 15/42
    MD5: d913394b8011b317f6d916507ffb7f2f
    VirusTotal Report
    Anubis Report


    gis-woz4_v8.exe
    Result: 12/42
    MD5: a311cd6f67cb112cba78a27b87320fc3
    VirusTotal Report
    Anubis Report


    DGRAYP.exe
    Result: 24/42
    MD5: f05f4f5be8431f746e59fe409a0b9bb1
    VirusTotal Report
    Anubis Report


    Y6TK9B.exe
    Result: 11/42
    MD5: c1fa3618d7b54ab6a7a25857d7b30b3c
    VirusTotal Report
    Anubis Report



    The malware tries to connect to one of the following IP addresses:
    184.82.162.163 - IPvoid result
    184.22.103.202 - IPvoid result


    Where it will attempt to download the following file:

    a.exe
    Result: 13/42
    MD5: 493887a87cd95b004f9ffbbaaecd1ac6
    VirusTotal Report
    Anubis Report



    I haven't taken an in-depth look at it, but besides encrypting your Office files, I have seen the malware will kill itself when you open up Task Manager. Not sure what the point is there. It also doesn't seem to start up again automatically.

    It does create an .lnk file to the dropped malware and puts that as an autorun entry, so it will start every time the machine starts.



    Conclusion

    The infection vector (how it spreads) is via phishing or spam email, so as usual:

    - Don't open attachments from unknown senders - ever.
    - Some antivirus already detected Dorifel generically, so update your antivirus.

    - If you're in a corporate network, use a strong spamfilter. It will prevent a lot of troubles if correctly configured.
    - Educate your users: raise the general awareness. Not even a spamfilter stops 100% of all the spam, there's always a chance something slips through.




    Thanks to @erikremmelzwaal from Medusoft for most of the samples.

    External sources:

    Wednesday, 11 April 2012

    Hacked Hotmail accounts... and the consequences

    It's a trend I'm seeing more and more, even with some of my relatives:

    Their Hotmail account is getting hacked, and from then on is being used by scammers or malware authors to spread their malicious intent.

    In almost all cases, you'll receive an email with (No Subject), and the only content is a link pointing to some website. But wait: it seems that all those websites have (probably an outdated version of) Wordpress installed.

    When you click the link, you will be redirected to either a scam/phishing page or scareware/rogueware.

    Either way, you'll first get the following message:


    Message you receive when clicking on the link

    So let's take a closer look at the 2 scenarios you get on your plate:

    Scenario #1 - scam


    Scam page

    In scenario number one, you'll be presented with an awesome News page, where you can read several testimonials of how great working from home is.

    It also has some fascinating news stories on how to make lots of money by simply being at your comfortable home. This includes reactions on the articles - of course this is all fake.

    If you click on any of the links on this website, you'll be ultimately redirected to - hxxp://internetprofitpacket.com

    Administrative Contact:
    WhoisGuard
    WhoisGuard Protected
    +1.6613102107
    Fax: +1.6613102107
    11400 W. Olympic Blvd. Suite 200
    Los Angeles, CA 90064
    US


    UrlQuery Result:
    Suspicious
    http://urlquery.net/report.php?id=40849

    URLvoid Result:
    1/25 (4.00%)
    http://www.urlvoid.com/scan/internetprofitpacket.com/


    Ultimately you land on the following page:


    Landing page where you'll need to pay

    After paying a small price, you'll get lifetime access to the Internet Profit Package ! What honor !

    Obviously, you'll get scammed and your credit card details might get stolen.


    Scenario #2 - scareware

    Likewise as in scenario #1, you'll get the nice message that you got here thanks to your friend.


    Seems like you're infected ... right ?

    You'll then be presented with a pop-up indicating critical process activity has been found and a scan will be launched... (I think we all know this one by now) :


    Fake Explorer window indicating numerous infections

    If you click on any button, a file will be downloaded with the name of setup.exe.

    In this case, the file was downloaded from:
    hxxp://fail-safetylow.info/bb61f9bcec711d56/29/setup.exe

    This site and several other rogueware pages are hosted on the IP:
    64.120.207.107


    Several other rogueware sites are hosted on this IP


    We'll now see some more details about the downloaded file:

    setup.exe
    Result: 5/40
    MD5: 8b0c16a50c0bca1eb0b45bd411eb30e5
    VirusTotal Report
    ThreatExpert Report
    Anubis Report

    This file drops another executable:

    Protector-hfpt.exe
    Result: 5/42
    MD5: f04cb906356f19a1dbf68c62f162c4e7
    VirusTotal Report
    Anubis Report


    The payload is a rogueware called "Windows Antibreaking System" :


    Windows Antibreaking System setup screen



    Windows Antibreaking System main screen


    Prevention

    - Most important of all: use a strong password ! You can verify your current password, or create a new one to check its strength on the following website: http://www.passwordmeter.com

    - Second important rule:
    don't use the same password for each and every website !

    - Be wary when receiving such a mail, even if it's from someone you know.

    - Use browser extentions to verify the integrity of an image or URL. Useful add-ons are for example WOT or NoScript.

    - Keep your Antivirus and browser, as well as your browser add-ons up-to-date.

    - If it is too late and a 'scan' is already starting, immediately close your browser by bringing up Task Manager (CTRL + ALT + DEL) and killing your browser's process:
    • a) For Google Chrome: chrome.exe or chrome.exe *32
    • b) For Mozilla Firefox: firefox.exe or firefox.exe *32
    • c) For Microsoft's Internet Explorer: iexplore or iexplore.exe *32


    Desinfection

    If the harm is already done and you are getting warnings, messages or pop-ups stating you are infected and you need to take 'immediate action' to clean your computer, follow the guide below at BleepingComputer's to rid yourself of this malware:

    BleepingComputer's Virus Removal


    Also, if you know the sender personally, notify him/her that they've been hacked and they need to change their password. If you don't know the sender, immediately remove the email.

    In Hotmail, you even have a useful option if you know the sender. Open the email, select Mark as and click on My friend's been hacked!


    Help your friend by stating (s)he's been hacked


    If you happen to have a Wordpress website, be sure to update it regularly as well as any Wordpress plugins you may have installed. This website will aid you in the matter: Hardening WordPress



    Conclusion

    Don't fall for either of these, in both cases you'll lose a lot of money !

    Follow the above prevention tips to decrease the chance of your computer becoming infected.

    Tuesday, 10 April 2012

    Free Riot codes scam



    Below you can find a list of confirmed phishing and scam websites. In the conclusion (end of this post or click) you'll be able to find some prevention tips and what to do if your account has been hacked.




    Facebook. A social networking place. For some a dream come true, for others a true nightmare. Guess in which category phishers, scammers and malware authors reside?

    In today's post we will be highlighting a scam specifically focusing on players of the game League of Legends, an action real-time strategy game developed and published by Riot Games.

    The scam page on Facebook in question is:
    hxxp://www.facebook.com/pages/Free-Riot-codes/141669939249958

    Currently, it already has over 41,000 likes:


    More and more people are liking the page, thus might be getting scammed



    On Youtube as well as on Google+ and Twitter it is -for now- pretty calm. Only a few video's and tweets promoting this scam:


    On Twitter, Google+ and Youtube they are also promoting their website, but not as heavily as on Facebook


    Example websites where you can get "free" riot points  or "free" riot codes are
    (ALL FAKE!):

    hxxp://bilgewaterchests.com      
    hxxp://blogs.gamenov.us/lol
    hxxp://cheatsjungle.com/league-of-legends-promotional-code-generator-2
    hxxp://cheatsjungle.com/league-of-legends-riot-points-generator
    hxxp://christmas.riotpromotions.com
    hxxp://clasentropsorp.somee.com
    hxxp://easycheat.org
    hxxp://elohell.org
    hxxp://free20skins.jimdo.com
    hxxp://free-mystery-skins-2015.esy.es
    hxxp://free-riot-points-codes.org
    hxxp://free-riotcodes.info
    hxxp://free-riotpointscodes.com
    hxxp://free3600rp.byethost22.com
    hxxp://freehackgames.org/league-of-legends-riot-points-generator-3-2-version              
    hxxp://freeleaguecodes.com    
    hxxp://freeleaguecodes.congoloid.net
    hxxp://freeleaguecodes.net    
    hxxp://freeleagueoflegendsriotpoints.com
    hxxp://freeleagueoflegendsriotpointcodes.com    
    hxxp://freeleagueoflegendskins.co.uk    
    hxxp://freelol-skins.blogspot.ba    
    hxxp://freelolcodes.com      
    hxxp://freelolriotcodes.com   
    hxxp://freelolriotcodes.info
    hxxp://freelolriotcodes.netii.net  
    hxxp://freelolriotpointz.blogspot.com      
    hxxp://freelolrpcodez.weebly.com 
    hxxp://freelolskins.com   
    hxxp://freepoitnsforyou.com 
    hxxp://freeriot4free.com
    hxxp://freeriotcodes.com            
    hxxp://freeriotcodes.filegame.net              
    hxxp://freeriotcodes.info  
    hxxp://freeriotcodes.org           
    hxxp://freeriotcodes.weebly.com              
    hxxp://freeriotcodesgift.com 
    hxxp://freeriotpoints32.blogspot.com
    hxxp://freeriotpoints.me
    hxxp://freerpgenerator.com
    hxxp://freeriotpointcodes.net
    hxxp://freerpriotpoints.wordpress.com
    hxxp://freeriotpointsgeneration.com     
    hxxp://freeriotpointderiot.yolasite.com
    hxxp://freeriotpointscheat.blogspot.com
    hxxp://freeriotpointsclub.com  
    hxxp://freeriotpointscode.com
    hxxp://freeriotpointscodes.com
    hxxp://freeriotpointsgenerators.blogspot.com   
    hxxp://freeriotpointsleagueoflegends.blogspot.com
    hxxp://freeriotpointslol.com        
    hxxp://freeriotpointsnow.com              
    hxxp://freeriotpointss.com 
    hxxp://freerpcodegenerator.com            
    hxxp://freerpcodes.com              
    hxxp://freerpcodes.tk  
    hxxp://freerpleagueoflegends.yzi.me        
    hxxp://freerppoint.com    
    hxxp://gameskeys.info/riot-points-generator   
    hxxp://getfreeriotcodes.blogspot.com              
    hxxp://getfreeriotcodes.com              
    hxxp://getfreeriotpoints.com 
    hxxp://getfreeriotpoints.org 
    hxxp://getfreeriotpointsfast.com
    hxxp://getfreerppoints.blogspot.com
    hxxp://getfrenocturneskin.webs.com          
    hxxp://getriotcodes.com      
    hxxp://getriotpoints.info       
    hxxp://getriotpointscodes.com   
    hxxp://getriotpointsforfree.com
    hxxp://getriotpointsfree.com
    hxxp://getyourfreeriotpointcodes.blogspot.com
    hxxp://giftsofsnowdown.com
    hxxp://give-aways.net
    hxxp://www.godshack.tk
    hxxp://gogamecheats.com/league-of-legends-free-riot-points 
    hxxp://hackerzzs.blogspot.com              
    hxxp://hackscheatsgamesprograms.blogspot.com
    hxxp://hacksplanet.net/league-of-legends-hack-2014
    hxxp://howtogetfreeriotpoints.com
    hxxp://lcs.riotpromotions.com
    hxxp://leageuoflegends.com
    hxxp://league-gamers.com
    hxxp://leaguecodes.net
    hxxp://leaguecodes.org
    hxxp://leaguegift.com
    hxxp://leagueofcheat.com
    hxxp://leagueoflegends.byethost33.com
    hxxp://leaguesoflegends.nazuka.net
    hxxp://leagueoflegends2012hack.blogspot.com    
    hxxp://leagueoflegendsrpandipgenerator.blogspot.com
    hxxp://leagueoflegendsrphack.com 
    hxxp://leagueoflegendvotevelkoz.ye.vc  
    hxxp://leaguereward.net
    hxxp://leaguerewards.net         
    hxxp://leaguerp.com  
    hxxp://leaguerp.net
    hxxp://leaguerpgifts.com       
    hxxp://leagueoflegendseuw.esy.es
    hxxp://leagueoflegendsgenerator.wordpress.com
    hxxp://leagueoflegendsgiveaway.com
    hxxp://leagueoflegendsrpcodegenerator.blogspot.com   
    hxxp://leagueoflegendsrpcodegenerator.weebly.com
    hxxp://leagueoflegendssupporte.esy.es
    hxxp://leagueflegendvoteasestribunall.gaming.lc
    hxxp://live.rpgiveaway.com  
    hxxp://lol.freepoitnsforyou.com         
    hxxp://lolhacktool.blogspot.com 
    hxxp://lolfreeriotpoints.blogspot.com
    hxxp://lolfreerp.com             
    hxxp://lolmultihack2012.blogspot.com
    hxxp://lolpromobundles.blogspot.com             
    hxxp://lolriotpointcodes.blogspot.com              
    hxxp://lolrpgenerator.webs.com   
    hxxp://lolrpgifts.com
    hxxp://lolrpgiveaways.weebly.com    
    hxxp://lolrpoints.com
    hxxp://lordhacks.com/league-of-legends-hack
    hxxp://lordhacks.com/league-of-legends-promotional-code-generator
    hxxp://my-riotpoints.xyz
    hxxp://naleagueoflegends.ga
    hxxp://oisn.mypressonline.com/league
    hxxp://rafflesforprizes.com
    hxxp://riot.ws
    hxxp://riot-codes.com
    hxxp://riot-point.com
    hxxp://riot-points-free.info
    hxxp://riot-points.free-cards.info   
    hxxp://riot.edgehacking.com              
    hxxp://riot.freecodesgiveaway.com   
    hxxp://riot.generator4points.com          
    hxxp://riotcodegenerator.com 
    hxxp://riotcodesgenerator.com            
    hxxp://riotcodes.hacksfiles.com              
    hxxp://riotcodes.net              
    hxxp://riotcodesforfree.org              
    hxxp://riotcodesfree.com              
    hxxp://riotcodesfree.net
    hxxp://riotgames.qualtrics.com
    hxxp://riotgenerator.com
    hxxp://riotgiveaway.net
    hxxp://riotpoint.eu
    hxxp://riotpointcodes.org
    hxxp://riotpointgenerator.com
    hxxp://riotpointsgenerator.net
    hxxp://riotpointshack.eu
    hxxp://riotpoints.4free-games.net
    hxxp://riotpoints.alqbyte.com
    hxxp://riotpoints.cu.cc  
    hxxp://riotpoints.net
    hxxp://riotpointsadderforfree.blogspot.com
    hxxp://riotpointscampaign.com 
    hxxp://riotpointscheat.blogspot.com      
    hxxp://riotpointscodes.info 
    hxxp://riotpointscodes.net
    hxxp://riotpointscodes.org
    hxxp://riotpointsgeneratorfree.blogspot.com           
    hxxp://riotpointsfree.com  
    hxxp://riotpointsgenerator.co
    hxxp://riotpointsgenerator.org  
    hxxp://riotpointshop.com    
    hxxp://riotpointsrewards.weebly.com      
    hxxp://riotpoints-free.com
    hxxp://riotpromotions.com
    hxxp://riotsgiftcard.com
    hxxp://rpcode.me
    hxxp://rpcodes.info
    hxxp://rpcodesnow.com
    hxxp://rpfree.com
    hxxp://rprewards.com
    hxxp://rp-free.blogspot.com              
    hxxp://rpgiveaway.com
    hxxp://rpointsgenerator.com  
    hxxp://rppointsfree.com   
    hxxp://smashingsports.co/download/riot-points-generator
    hxxp://thefreeriotpoints.com  
    hxxp://thefreerp.yolasite.com
    hxxp://unlimitedhacks.com/league-of-legends-riot-points-generator 
    hxxp://unlockcodehome.com/riot-unlockcodes.php      
    hxxp://videogamehacks.net/riot-points-generator
    hxxp://www.vix-group.com/lol
    hxxp://xpandhacks.net/league-of-legends-riot-points-generator
    hxxp://xpandhacks.com/league-of-legends-riot-points-generator-2                

    You can +1 it, share it on Facebook, Tweet it ... Share the scam with everyone you like ;-) .

    The first link in bold is the one discussed in this blog post. All you have to do to get your Riot Points for free is to follow these 3 easy steps:

    Step 1 - Share it on Facebook
    Step 2 - Post the following message once on your wall and 5 times on a Different Game Page on Facebook:
    WOW! I just got my League of Legends Riot Code for free! So excited! Thanks hxxp://freeriotcodes.com !
    Step 3 - Click "Like and Confirm"

    Step 2 in the process - posting on Facebook. In this specific scam, it is not being posted automatically to your wall, you actually have to share it yourself


    That's it, 3 simple steps and then you'll be able to download your Riot Points or codes free of charge!

    ... But wait, there's a timer on the page indicating you'll have to wait before the next giveaway:



    Somehow, I got lucky and, through one of the other websites, I was able to visit the download page and acquire my points!

    However, ultimately I have to complete a survey to finally download my Riot points. I am getting redirected to several other scams and so on. You can win a smartphone, the new iPad, an iPhone, trendy boots, a Macbook ....

    In some cases only your phone number is sufficient, in others you'll have to fill in complete information like your full address, email address ...

    Some examples of dubious file sharing websites, which are also showing a popup with some Javascript behind it (another survey scam):
    hxxp://cleanfiles.net
    hxxp://fileharmony.com
    hxxp://fileice.net
    hxxp://fileme.us
    hxxp://fileml.com
    hxxp://filenix.com
    hxxp://filesquick.net
    hxxp://jlyse.net
    hxxp://matrixmega.com
    hxxp://needforfile.net
    hxxp://oceanfiles.me
    hxxp://redirectlock.com
    hxxp://sharecash.org
    hxxp://sharkyfiles.com 
    hxxp://skippyfile.com 
    hxxp://speedyfiles.net
    hxxp://tinyfileshost.com
    hxxp://topfiles.me
    hxxp://videlocked.pw


    There's also a Pastebin link with all the above scam/phishing sites for League of Legends here: League of Legends scam & phishing URLs



    Conclusion

    Tuesday, 6 December 2011

    New Facebook scam

    A new Facebook scam is spreading today, 6th of December. The interesting thing is that I have seen it posted in Dutch as well.

    The method used is the same as in previous Facebook scams, see for example my earlier post:
    New Facebook scam

    Here is the post in question (in Dutch):


    Classical scam post to lure users into clicking the link.

    Here's what it reads:
    WOW! Mijn profiel is ALLEEN VANDAAG AL 12 keer bekeken.. en ik kan zien dat er behoorlijk wat stalkers bijzitten LOL! Kijk zelf wie jou allemaal in de gaten houdt op #removed#

    In English:

    WOW! My profile has been seen 12 time ALREADY ONLY TODAY .. and I can see that quite a few stalkers are included LOL! See for yourself who's keeping an eye on yoy on #removed#



    The link has been shortened by the bit.ly URL shortening service. While this service is not malicious on itself, it can also be used by persons with malicious intent, whether it would be hackers, malware authors, ... Or in this case scammers.

    Let's review some stats for the bit.ly link first:


    98 clicks on this link in the last hour



    Top countries, including: France, Germany, The Netherlands



    Facebook.com is the most referring site


    At the moment of writing, there have been over 1,000 clicks on the link so far. I have already reported it to bit.ly and it should be taken down soon.

    UPDATE: bit.ly has already issued a warning for when you click on the link. (12/07/2011)


    Now let us analyse where the bit.ly link is taking us. The link can redirect you to different websites, but they will all (so far) redirect you to a page similar to this one (depending on your location):


    Who is viewing your Facebook profile ?


    You probably don't remember my post from February this year, but the concept is the same: you can supposedly view who's been "stalking", or viewing, your profile. This to attract users on clicking the link. Who doesn't want to see this, right ? Here is my post from early this year:
    Facebook rogue applications still lurking around

    You can presented with a screen like this (I have several, but I will only post one as example):

    Are you the "lucky" winner ?

    As stated previously, the concept is the same. Before you can see who's been viewing your profile, you need to fill in a short service to continue.

    You may have won a prize, you may have won an iPad, you may have won free ringtones, you may have won a free iPhone application, etc, etc, etc, .... This is of course all a lie.
    Remember: if it looks too good to be true, it probably is !

    You have to fill in your email address and/or phone number to continue as well. At the end you will end up losing a lot of money, leaving your email address in the open and maybe worse.

    Remember: if you click the link while logged in to Facebook, it will also post it on your own wall.



    Conclusion

    Conclusion is pretty straightforward: do not click on any of the links ! If in doubt, send your friend on Facebook (or if someone sent you the link) via PM if he or she knows what this is about.

    To remove this from your or your friend's wall, click on the X on the message, and choose to "Report/Mark as spam" or "Remove Post".

    You can also use a linkscanner to verify the integrity of a link on either http://www.urlvoid.com or https://www.virustotal.com/

    To get some information on a bit.ly (or other URL shortener serivce) link, you can use any of the following websites:
    - http://www.getlinkinfo.com/
    - http://longurl.org/
    - http://www.longurlplease.com/ (includes Firefox extension)

    To report a malicious bit.ly link use:
    http://bitly.com/a/report_spam

    For any other question, do not hesitate to post a comment !

    Wednesday, 13 April 2011

    Increase in Dutch banking phishing

    Recently I made a post on Malware Disasters about an increase of targeted phishing in the last few monts. The focus was mainly on Dutch (and Belgian) customers of respectively Rabobank and ING, two major banks.

    Here's a small excerpt:

    The last few months there was an increase in a phishing campaign targeted on customers from Rabobank and ING, two major banks in The Netherlands and Belgium. Some examples of a phishing mail:


    Phishing email for ING with the subject “Account Verificatie” (or in English: “Account Verification”)

    You can read the full article here:
    http://malwaredisasters.blogspot.com/2011/04/increase-in-dutch-banking-phishing.html

    You can also download a Dutch (Nederlands) translation from the following link:
    Click HERE to download. (hosted on Uploading.com)





    Conclusion

    The following tips do not only apply to the above story, but apply to any other (suspicious) email you receive:
    • Do not click on any of the links (or anything for that matter) in the email you have received.
    • Do not reply to the email.
    • Delete the email immediately, certainly if you are not a customer of the aforementioned bank or did not order anything, changed your password, and so on.

    • If you really need to access or check your bank account, visit the website directly by typing the address in your browser’s address bar. Also verify the URL starts with https instead of http.
    • Another useful trick is to hover over the link in the email. In the bottom left corner you should be able to see the real address behind the URL displayed.
    • When in doubt, you can double-check using URL scanning services such as VirusTotal or URLVoid

    Saturday, 26 February 2011

    Windows Live Phishing


    This morning I received an email claiming that the database and email account center for Windows Live would be upgraded. They need to delete all unused account and to make sure that yours won't be deleted, you have to notify the Windows Live team.


    Email subject: Account Alert!!
    Windows Live Team Alert Confirmation


    You need to reply with your User name, Password, Date of Birth and Country or Territory. In reality this is a typical phishing campaign for retrieving your login details.


    In the last 2 paragraphs it also states:

    "YOUR DETAILS WILL NOT BE SHARED"
    -> this is to comfort you so you know that your credentials are safe
    and
    "Warning!!! Account owner that fails to verify his/her account after two weeks of receiving this warning will lose his or her account permanently."
    -> This is your typical scare tactic; if you don't do as instructed, your email account will be deleted.



    Conclusion

    In reality, Windows Live will not send you any emails instructing you to send your password to them so they can verify it is still active. Also, they won't delete your account without a valid reason.

    Never reply to these kinds of messages, delete the email and you're good to go.

    Tuesday, 15 February 2011

    Facebook rogue applications still lurking around


    Recently I made a post on Malware Disasters about rogue applications on Facebook.

    Here's a small excerpt:

    For quite some time now there are rogue applications trying to convince you that you are able to check whoever viewed your profile. There are a lot of different names for this rogue application, some but not all include:


    • creep exterminators
    • catch them being creepy
    • creepy profile peekers
    • privacy bros
    • we catch stalkers


    Profile Creeps application



    You can read the full article here:
    http://malwaredisasters.blogspot.com/2011/02/facebook-rogue-applications-still.html



    Conclusion

    Conclusion is quite simple: never trust an application on Facebook that promises things that look too good to be true. When things look too good to be true, they probably are ;) .

    Always be careful when allowing applications access to your data and/or wall.