{"id":7142,"date":"2012-06-13T08:09:04","date_gmt":"2012-06-13T15:09:04","guid":{"rendered":"http:\/\/blog.webroot.com\/?p=7142"},"modified":"2018-10-05T11:05:59","modified_gmt":"2018-10-05T17:05:59","slug":"spamvertised-your-amazon-com-order-confirmation-emails-serving-client-side-exploits-and-malware","status":"publish","type":"post","link":"https://www.webroot.com/blog/2012\/06\/13\/spamvertised-your-amazon-com-order-confirmation-emails-serving-client-side-exploits-and-malware\/","title":{"rendered":"Spamvertised &#8216;Your Amazon.com order confirmation&#8217; emails serving client-side exploits and malware"},"content":{"rendered":"<p>Everyone uses Amazon!\u00a0At least\u00a0that&#8217;s what the cybercriminals are hoping. \u00a0Cybercriminals are currently spamvertising millions of emails impersonating Amazon.com Inc. in an attempt to trick end and corporate users into clicking on the malicious links found in the emails.<\/p>\n<p>More details:<\/p>\n<p><!--more--><\/p>\n<p><strong>Screenshot of the spamvertised email:<\/strong><\/p>\n<p style=\"text-align: center;\"><a href=\"http:\/\/webrootblog.files.wordpress.com\/2012\/06\/amazon_spam_exploits_malware.png\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter wp-image-7145\" title=\"Amazon_spam_exploits_malware\" src=\"http:\/\/webrootblog.files.wordpress.com\/2012\/06\/amazon_spam_exploits_malware.png\" alt=\"\" width=\"614\" height=\"382\" \/><\/a><\/p>\n<p style=\"text-align: center;\"><a href=\"http:\/\/webrootblog.files.wordpress.com\/2012\/06\/amazon_spam_exploits_malware_011.png\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter wp-image-7150\" title=\"Amazon_spam_exploits_malware_01\" src=\"http:\/\/webrootblog.files.wordpress.com\/2012\/06\/amazon_spam_exploits_malware_011.png\" alt=\"\" width=\"614\" height=\"294\" \/><\/a><\/p>\n<p><strong>Sample subjects:\u00a0<\/strong><em>Your Amazon.com Kindle e-book order confirmation<\/em>;\u00a0<em>Your Amazon.com order confirmation<\/em><\/p>\n<p><strong>Sample spamvertised compromised URls:\u00a0<\/strong><em>hxxp:\/\/www.archos5.com\/wp-content\/themes\/twentyten\/enoz.html<\/em>;\u00a0<em>hxxp:\/\/bambizilla.com\/wp-includes\/enoz.html<\/em>;\u00a0<em>hxxp:\/\/save20discout.com\/wp-content\/plugins\/social-stats\/omaz.html<\/em><\/p>\n<p><strong>Client-side exploits serving URls:\u00a0<\/strong><em>hxxp:\/\/kidwingz.net\/main.php?page=614411383eef8d97<\/em>;\u00a0<em>hxxp:\/\/cool-mail.net\/main.php?page=640db37c90c88306<\/em><\/p>\n<p><strong>cool-mail.net<\/strong> responds to 84.106.114.97, responding to the same IP are also the following domains <strong>lifelovework.net<\/strong>; <strong>homeofficecaptioning.ru<\/strong>. Name servers courtesy of \u00a0<strong>ns1.grapecomputers.net<\/strong> with the following domains also using the same name server as <strong>cool-mail.net<\/strong> &#8211; <strong>grapecomputers.net<\/strong>; <strong>kidwingz.net<\/strong>; <strong>itscholarshipz.net<\/strong>; \u00a0h<strong>omeofficecaptioning.ru;\u00a0kidwingz.net<\/strong> responds to 208.91.197.54.<\/p>\n<p>Both domains attempt to exploit client-side exploits served by the BlackHole web malware exploitation kit,\u00a0Exploits <a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2010-1885\"><strong>CVE-2010-1885<\/strong><\/a> in particular.<\/p>\n<p>Upon successful client-side exploitation the campaingn drops <a href=\"https:\/\/www.virustotal.com\/file\/f10a33c2542a46dbd231638b9c7569dfb2a833750328848e3d5eae04521bf1dd\/analysis\/\"><strong>MD5: c23dab8cff55155f815639d7072de21a<\/strong><\/a> detected by 31 out of 42 antivirus scanners as TROJ_CRYPTOR.TH;\u00a0Trojan.Generic.KD.644812, and\u00a0and <a href=\"https:\/\/www.virustotal.com\/file\/aadb79ae5fb91a99c6494d775f157b1594b0ddd69520d85fbf1fbff725a769d6\/analysis\/\"><strong>MD5: 49f91a1597bc4dd25d3d23302125dae7<\/strong><\/a> &#8211; detected by 5 out of 41 antivirus scanners as PWS-Zbot.gen.xs<\/p>\n<p>Upon execution the samples create the following registry entry, next to creating a new process:<\/p>\n<p><em>[HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionRun] KB00121600.exe = &#8220;&#8221;%AppData%KB00121600.exe&#8221; so that KB00121600.exe runs every time Windows starts<\/em><\/p>\n<p>Next, the samples phones back to <strong>85.214.204.32 <\/strong>on port 8080, <strong>hxxp:\/\/85.214.204.32:8080\/zb\/v_01_b\/in\/<\/strong> in particular.<\/p>\n<p><strong>More MD5s are known to have phone back to the same command and control C&amp;C server in the past:<\/strong><br \/>\n<a href=\"https:\/\/www.virustotal.com\/file\/b862cd83606a7e9367b5086c113569ccd476ef4f8141e70d6110586462d8b6cc\/analysis\/\"><strong>MD5: aa9b1b6037afaceee96c888c948a20fe<\/strong><\/a> &#8211; detected by 14 out of 42 antivirus scanners as Trojan.Generic.KDV.647512<\/p>\n<p><strong><a href=\"https:\/\/www.virustotal.com\/file\/aadb79ae5fb91a99c6494d775f157b1594b0ddd69520d85fbf1fbff725a769d6\/analysis\/\">MD5: 49f91a1597bc4dd25d3d23302125dae7<\/a><\/strong> &#8211; detected by 5 out of 41 antivirus scanners as PWS-Zbot.gen.xs<\/p>\n<p><a href=\"https:\/\/www.virustotal.com\/file\/046a7fac35a29f66e37193a2048f6a324754df131bad07c21f87fc814d7763f5\/analysis\/\"><strong>MD5: 734aadd62d0662256a65510271d40048<\/strong><\/a> &#8211; detected by 9 out of 42 antivirus scanners as Troj\/DwnLdr-KAY<\/p>\n<p><a href=\"https:\/\/www.virustotal.com\/file\/4ddebdfcebbd6106ebe932d51b70fafb754ee725213dff2468c5f93fde04e5d9\/analysis\/\"><strong>MD5: a444a9a941c1f0d28e5c3de711f04a3c<\/strong><\/a> &#8211; detected by 14 out of 42 antivirus scanners as Trojan.Generic.KD.647627<\/p>\n<p><a href=\"https:\/\/www.virustotal.com\/file\/0b6368fd2406cb66e8a713321859911f133fa0a56abeaa669ac0b3296de3a690\/analysis\/\"><strong>MD5: 3c87e446ccee826a4707d47f268d705d<\/strong><\/a> &#8211; detected by 25 out of 42 antivirus scanners as W32\/AutoRun_Spy_Banker.P<\/p>\n<p><a href=\"https:\/\/www.virustotal.com\/file\/88b4e1d0b3fdcb234653a8e6d0f2149257e6228b913a0de29536dd93da168781\/analysis\/\"><strong>MD5: cf6f40f1ce37fd8edefc447f68a88e1f<\/strong><\/a> &#8211; detected by 32 out of 42 antivirus scanners as Trojan.Win32.Yakes.aemo<\/p>\n<p><a href=\"https:\/\/www.virustotal.com\/file\/026199e4e9964235f499967c081ad6b6a8b5cab254538032544cc6a15395e14c\/analysis\/\"><strong>MD5: 179c9ac5c2540a9bca5c0908e589a768<\/strong><\/a> &#8211; detected by 28 out of 42 antivirus scanners as Troj\/Bckdr-RLT<\/p>\n<p><a href=\"https:\/\/www.virustotal.com\/file\/6260bd364a625d7cbb270c9036473e44f5f8ec479f264f2280d25bf9d56d73da\/analysis\/\"><strong>MD5: 83db494b36bd38646e54210f6fdcbc0d<\/strong><\/a> &#8211; detected by 33 out of 42 antivirus scanners as PWS-Zbot.gen.aae<\/p>\n<p><a href=\"https:\/\/www.virustotal.com\/file\/e44fa7d29c6944f7421b262192b403b8722463ebd304d963c6989f5f82a4e764\/analysis\/\"><strong>MD5: 462210ddded90ea065829766797b42b7<\/strong><\/a> &#8211; detected by 32 out of 42 antivirus scanners as Trojan-Dropper.Win32.Dapato.adpv<\/p>\n<p><a href=\"https:\/\/www.virustotal.com\/file\/a99d913e298e2819a632a9a7270ca57d529b390fd170d26c4da0c2f14aa9df26\/analysis\/\"><strong>MD5: 712be7239b0e7e47869798658dabd4d0<\/strong><\/a> &#8211; detected by 30 out of 42 antivirus scanners as Trojan-Ransom.Win32.PornoAsset.emi<\/p>\n<p>It&#8217;s worth emphasizing on the command and control (C&amp;C) IP &#8211;\u00a0<strong>85.214.204.32<\/strong>.\u00a0Responding to 85.214.204.32 are the following name servers:<\/p>\n<p><strong>ns3.pistolitnameste.ru<\/strong><br \/>\n<strong>ns3.puleneprobivaemye.ru<\/strong><br \/>\n<strong>ns2.spbfotomontag.ru<\/strong><br \/>\n<strong>ns3.pushkidamki.ru<\/strong><br \/>\n<strong>ns3.hamlovladivostok.ru<\/strong><br \/>\n<strong>ns3.saprolaunimaxim.ru<\/strong><br \/>\n<strong>ns2.uzindexation.ru<\/strong><br \/>\n<strong>ns2.holigaansongeer.ru<\/strong><br \/>\n<strong>ns3.paranoiknepjet.ru<\/strong><br \/>\n<strong>ns2.piloramamoskow.ru<\/strong><br \/>\n<strong>ns2.girlsnotcryz.ru<\/strong><\/p>\n<p>Historically, the following domains were also responding to the same IP, part of the botnet&#8217;s infrastructure:<\/p>\n<p><strong>cvredret.ru<\/strong><br \/>\n<strong>cxredret.ru<\/strong><br \/>\n<strong>opiumdlanaroda.ru<\/strong><br \/>\n<strong>porosenokpetya.ru<\/strong><br \/>\n<strong>garemonmystage.ru<\/strong><br \/>\n<strong>horoshovsebudet.ru<\/strong><br \/>\n<strong>hmvmgywkvayilcwh.ru<\/strong><br \/>\n<strong>wfyusepaxvulfdtn.ru<\/strong><br \/>\n<strong>wiwwkvjkinewgycb.ru<\/strong><br \/>\n<strong>hjpyvexsutdctjol.ru<\/strong><br \/>\n<strong>hbirjhcnsuiwgtrq.ru<\/strong><br \/>\n<strong>axwiyyfbraskytvs.ru<\/strong><br \/>\n<strong>skjwysujlpedxxsl.ru<\/strong><br \/>\n<strong>sumgankorobanns.ru<\/strong><br \/>\n<strong>ngdvmtwodjjuovsnfj.ru<\/strong><br \/>\n<strong>vjcuiqecxaomkytb.ru<\/strong><br \/>\n<strong>vaopxjiaphevkfpqdo.ru<\/strong><br \/>\n<strong>yhbyqwmrtqxvmpryon.ru<\/strong><br \/>\n<strong>qtdlnxbqfohcpwft.ru<\/strong><br \/>\n<strong>jfhxihwykiuwfknoni.ru <\/strong><br \/>\n<strong>kblqegxrumlsrefvmb.ru<\/strong><br \/>\n<strong>hngajjkuknzwdliqfj.ru<\/strong><br \/>\n<strong>hdylanfzmfngwbwxnc.ru<\/strong><br \/>\n<strong>gizosuxwpeujnykjye.ru<\/strong><br \/>\n<strong>jlkjsxdsvtkygouiix.ru<\/strong><br \/>\n<strong>nolwzyzsqkhjkqhomc.ru<\/strong><br \/>\n<strong>wbgguucrbkrkjftn.ru<\/strong><br \/>\n<strong>usepaxvulfdtnwiwwk.ru<\/strong><br \/>\n<strong>eoicszuwkjskhvki.ru<\/strong><br \/>\n<strong>mceglkuyhzvzjxbj.ru<\/strong><\/p>\n<p><strong>Historical OSINT on the name servers involved in the campaign, and the botnet&#8217;s infrastructure in general:<\/strong><\/p>\n<p><strong>ns1.girlsnotcryz.ru<\/strong> =&gt; 62.213.64.161<br \/>\n<strong>ns2.girlsnotcryz.ru<\/strong> =&gt; 85.214.204.32<br \/>\n<strong>ns3.girlsnotcryz.ru<\/strong> =&gt; 50.57.88.200<br \/>\n<strong>ns4.girlsnotcryz.ru<\/strong> =&gt; 184.106.189.124<br \/>\n<strong>ns5.girlsnotcryz.ru<\/strong> =&gt; 50.57.43.49<\/p>\n<p><strong>ns1.hamlovladivostok.ru<\/strong> =&gt; 62.213.64.161<br \/>\n<strong>ns2.hamlovladivostok.ru<\/strong> =&gt; 62.76.189.62<br \/>\n<strong>ns3.hamlovladivostok.ru<\/strong> =&gt; 85.214.204.32<br \/>\n<strong>ns4.hamlovladivostok.ru<\/strong> =&gt; 50.57.88.200<br \/>\n<strong>ns5.hamlovladivostok.ru<\/strong> =&gt; 41.66.137.155<br \/>\n<strong>ns6.hamlovladivostok.ru<\/strong> =&gt; 50.57.43.49<\/p>\n<p><strong>ns1.puleneprobivaemye.ru<\/strong> =&gt; 62.213.64.161<br \/>\n<strong>ns2.puleneprobivaemye.ru<\/strong> =&gt; 62.76.189.62<br \/>\n<strong>ns3.puleneprobivaemye.ru<\/strong> =&gt; 85.214.204.32<br \/>\n<strong>ns4.puleneprobivaemye.ru<\/strong> =&gt; 50.57.88.200<br \/>\n<strong>ns5.puleneprobivaemye.ru<\/strong> =&gt; 41.66.137.155<br \/>\n<strong>ns6.puleneprobivaemye.ru<\/strong> =&gt; 50.57.43.49<\/p>\n<p><strong>ns1.pushkidamki.ru<\/strong> =&gt; 62.213.64.161<br \/>\n<strong>ns2.pushkidamki.ru<\/strong> =&gt; 62.76.189.62<br \/>\n<strong>ns3.pushkidamki.ru<\/strong> =&gt; 85.214.204.32<br \/>\n<strong>ns4.pushkidamki.ru<\/strong> =&gt; 50.57.88.200<br \/>\n<strong>ns5.pushkidamki.ru<\/strong> =&gt; 41.66.137.155<br \/>\n<strong>ns6.pushkidamki.ru<\/strong> =&gt; 50.57.43.49<\/p>\n<p><strong>ns1.spbfotomontag.r<\/strong>u =&gt; 62.213.64.161<br \/>\n<strong>ns2.spbfotomontag.r<\/strong>u =&gt; 85.214.204.32<br \/>\n<strong>ns3.spbfotomontag.r<\/strong>u =&gt; 50.57.88.200<br \/>\n<strong>ns4.spbfotomontag.r<\/strong>u =&gt; 184.106.189.124<br \/>\n<strong>ns5.spbfotomontag.ru<\/strong> =&gt; 50.57.43.49<\/p>\n<p><strong>ns1.piloramamoskow.ru<\/strong> =&gt; 62.213.64.161<br \/>\n<strong>ns2.piloramamoskow.ru<\/strong> =&gt; 85.214.204.32<br \/>\n<strong>ns3.piloramamoskow.r<\/strong>u =&gt; 50.57.88.200<br \/>\n<strong>ns4.piloramamoskow.ru<\/strong> =&gt; 184.106.189.124<br \/>\n<strong>ns5.piloramamoskow.ru<\/strong> =&gt; 50.57.43.49<\/p>\n<p><strong>ns1.insomniacporeed.ru<\/strong> =&gt; 62.213.64.161<br \/>\n<strong>ns2.insomniacporeed.ru<\/strong> =&gt; 85.214.204.32<br \/>\n<strong>ns3.insomniacporeed.ru<\/strong> =&gt; 50.57.88.200<br \/>\n<strong>ns4.insomniacporeed.ru<\/strong> =&gt; 184.106.189.124<br \/>\n<strong>ns5.insomniacporeed.ru<\/strong> =&gt; 50.57.43.49<\/p>\n<p><strong>ns1.norilsknikeli.ru<\/strong> =&gt; 62.213.64.161<br \/>\n<strong>ns2.norilsknikeli.ru<\/strong> =&gt; 85.214.204.32<br \/>\n<strong>ns3.norilsknikeli.ru<\/strong> =&gt; 50.57.88.200<br \/>\n<strong>ns4.norilsknikeli.ru<\/strong> =&gt; 184.106.189.124<br \/>\n<strong>ns5.norilsknikeli.ru<\/strong> =&gt; 50.57.43.49<\/p>\n<p><strong>ns1.mazdaforumi.ru<\/strong> =&gt; 62.213.64.161<br \/>\n<strong>ns2.mazdaforumi.ru<\/strong> =&gt; 85.214.204.32<br \/>\n<strong>ns3.mazdaforumi.ru<\/strong> =&gt; 50.57.88.200<br \/>\n<strong>ns4.mazdaforumi.ru<\/strong> =&gt; 184.106.189.124<br \/>\n<strong>ns5.mazdaforumi.ru<\/strong> =&gt; 50.57.43.49<\/p>\n<p><strong>ns1.immerialtv.ru<\/strong> =&gt; 62.76.41.3<br \/>\n<strong>ns2.immerialtv.ru<\/strong> =&gt; 62.213.64.161<br \/>\n<strong>ns3.immerialtv.ru<\/strong> =&gt; 195.88.242.10<br \/>\n<strong>ns4.immerialtv.ru<\/strong> =&gt; 41.66.137.155<br \/>\n<strong>ns5.immerialtv.ru<\/strong> =&gt; 83.170.91.152<br \/>\n<strong>ns6.immerialtv.ru<\/strong> =&gt; 85.214.204.32<\/p>\n<p><strong>ns1.opimmerialtv.ru<\/strong> =&gt; 62.213.64.161<br \/>\n<strong>ns2.opimmerialtv.ru<\/strong> =&gt; 85.214.204.32<br \/>\n<strong>ns3.opimmerialtv.r<\/strong>u =&gt; 50.57.88.200<br \/>\n<strong>ns4.opimmerialtv.ru<\/strong> =&gt; 184.106.189.124<br \/>\n<strong>ns5.opimmerialtv.ru<\/strong> =&gt; 50.57.43.49<\/p>\n<p><strong>ns1.pokeronmep.ru<\/strong> =&gt; 62.76.41.3<br \/>\n<strong>ns2.pokeronmep.ru<\/strong> =&gt; 62.213.64.161<br \/>\n<strong>ns3.pokeronmep.ru<\/strong> =&gt; 195.88.242.10<br \/>\n<strong>ns4.pokeronmep.ru<\/strong> =&gt; 41.66.137.155<br \/>\n<strong>ns5.pokeronmep.r<\/strong>u =&gt; 83.170.91.152<br \/>\n<strong>ns6.pokeronmep.ru<\/strong> =&gt; 85.214.204.32<\/p>\n<p><strong>ns1.poluicenotgo.ru<\/strong> =&gt; 62.76.41.3<br \/>\n<strong>ns2.poluicenotgo.ru<\/strong> =&gt; 62.213.64.161<br \/>\n<strong>ns3.poluicenotgo.ru<\/strong> =&gt; 195.88.242.10<br \/>\n<strong>ns4.poluicenotgo.ru<\/strong> =&gt; 41.66.137.155<br \/>\n<strong>ns5.poluicenotgo.ru<\/strong> =&gt; 83.170.91.152<br \/>\n<strong>ns6.poluicenotgo.ru<\/strong> =&gt; 85.214.204.32<\/p>\n<p><strong>ns1.uiwewsecondary.ru<\/strong> =&gt; 62.76.41.3<br \/>\n<strong>ns2.uiwewsecondary.ru<\/strong> =&gt; 62.213.64.161<br \/>\n<strong>ns3.uiwewsecondary.ru<\/strong> =&gt; 195.88.242.10<br \/>\n<strong>ns4.uiwewsecondary.r<\/strong>u =&gt; 41.66.137.155<br \/>\n<strong>ns5.uiwewsecondary.r<\/strong>u =&gt; 83.170.91.152<br \/>\n<strong>ns6.uiwewsecondary.ru<\/strong> =&gt; 85.214.204.32<\/p>\n<p><strong>ns1.validatoronmee.r<\/strong>u =&gt; 62.213.64.161<br \/>\n<strong>ns2.validatoronmee.ru<\/strong> =&gt; 195.62.52.69<br \/>\n<strong>ns3.validatoronmee.ru<\/strong> =&gt; 62.76.191.172<br \/>\n<strong>ns4.validatoronmee.ru<\/strong> =&gt; 41.66.137.155<br \/>\n<strong>ns5.validatoronmee.ru<\/strong> =&gt; 83.170.91.152<br \/>\n<strong>ns6.validatoronmee.ru<\/strong> =&gt; 85.214.204.32<\/p>\n<p><strong>ns1.vitalitysomer.ru<\/strong> =&gt; 62.213.64.161<br \/>\n<strong>ns2.vitalitysomer.ru<\/strong> =&gt; 195.62.52.69<br \/>\n<strong>ns3.vitalitysomer.ru<\/strong> =&gt; 62.76.191.172<br \/>\n<strong>ns4.vitalitysomer.ru<\/strong> =&gt; 41.66.137.155<br \/>\n<strong>ns5.vitalitysomer.ru<\/strong> =&gt; 83.170.91.152<br \/>\n<strong>ns6.vitalitysomer.ru<\/strong> =&gt; 85.214.204.32<\/p>\n<p><strong>ns1.wiskonsintpara.ru<\/strong> =&gt; 62.76.41.3<br \/>\n<strong>ns2.wiskonsintpara.ru<\/strong> =&gt; 62.213.64.161<br \/>\n<strong>ns3.wiskonsintpara.ru<\/strong> =&gt; 195.62.52.69<br \/>\n<strong>ns4.wiskonsintpara.ru<\/strong> =&gt; 41.66.137.155<br \/>\n<strong>ns5.wiskonsintpara.ru<\/strong> =&gt; 83.170.91.152<br \/>\n<strong>ns6.wiskonsintpara.ru<\/strong> =&gt; 85.214.204.32<\/p>\n<p><strong>ns1.webmastaumuren.ru<\/strong> =&gt; 62.76.41.3<br \/>\n<strong>ns2.webmastaumuren.ru<\/strong> =&gt; 62.213.64.161<br \/>\n<strong>ns3.webmastaumuren.ru<\/strong> =&gt; 195.62.52.69<br \/>\n<strong>ns4.webmastaumuren.ru<\/strong> =&gt; 41.66.137.155<br \/>\n<strong>ns5.webmastaumuren.ru<\/strong> =&gt; 83.170.91.152<br \/>\n<strong>ns6.webmastaumuren.ru<\/strong> =&gt; 85.214.204.32<\/p>\n<p><strong>ns1.webmastersuon.ru<\/strong> =&gt; 62.76.41.3<br \/>\n<strong>ns2.webmastersuon.ru<\/strong> =&gt; 62.213.64.161<br \/>\n<strong>ns3.webmastersuon.ru<\/strong> =&gt; 195.62.52.69<br \/>\n<strong>ns4.webmastersuon.ru<\/strong> =&gt; 41.66.137.155<br \/>\n<strong>ns5.webmastersuon.ru<\/strong> =&gt; 83.170.91.152<br \/>\n<strong>ns6.webmastersuon.ru<\/strong> =&gt; 85.214.204.32<\/p>\n<p><strong>ns1.qvzhpiaswhqlswkjit.ru<\/strong> =&gt; 62.76.45.241<br \/>\n<strong>ns2.qvzhpiaswhqlswkjit.ru<\/strong> =&gt; 62.213.64.161<br \/>\n<strong>ns3.qvzhpiaswhqlswkjit.ru<\/strong> =&gt; 85.214.204.32<br \/>\n<strong>ns4.qvzhpiaswhqlswkjit.ru<\/strong> =&gt; 216.151.129.198<\/p>\n<p><strong>ns1.xspisokdomenidgmens.ru<\/strong> =&gt; 62.76.45.241<br \/>\n<strong>ns2.xspisokdomenidgmens.ru<\/strong> =&gt; 62.76.191.172<br \/>\n<strong>ns3.xspisokdomenidgmens.ru<\/strong> =&gt; 62.213.64.161<br \/>\n<strong>ns4.xspisokdomenidgmens.ru<\/strong> =&gt; 85.214.204.32<br \/>\n<strong>ns5.xspisokdomenidgmens.ru<\/strong> =&gt; 209.114.47.158<br \/>\n<strong>ns6.xspisokdomenidgmens.ru<\/strong> =&gt; 78.83.233.242<\/p>\n<p><strong>Go through related analysis on previously spamvertised malware-serving campaigns:<\/strong><\/p>\n<ul>\n<li><a href=\"http:\/\/blog.webroot.com\/2012\/06\/08\/spamvertised-dhl-package-delivery-report-emails-serving-malware\/\">Spamvertised \u2018DHL Package delivery report\u2019 emails serving malware<\/a><\/li>\n<li><a href=\"http:\/\/blog.webroot.com\/2012\/06\/07\/spamvertised-ups-delivery-notification-emails-serving-client-side-exploits-and-malware\/\">Spamvertised \u2018UPS Delivery Notification\u2019 emails serving client-side exploits and malware<\/a><\/li>\n<li><a href=\"http:\/\/blog.webroot.com\/2012\/05\/22\/spamvertised-bogus-online-casino-themed-emails-serving-adware\/\">Spamvertised bogus online casino themed emails serving adware<\/a><\/li>\n<li><a href=\"http:\/\/blog.webroot.com\/2012\/03\/31\/spamvertised-scan-from-a-hewlett-packard-scanjet-emails-lead-to-client-side-exploits-and-malware\/\">Spamvertised \u2018Scan from a Hewlett-Packard ScanJet\u2019 emails lead to client-side exploits and malware<\/a><\/li>\n<li><a href=\"http:\/\/blog.webroot.com\/2012\/05\/30\/spamvertised-careerbuilder-themed-emails-serving-client-side-exploits-and-malware\/\">Spamvertised CareerBuilder themed emails serving client-side exploits and malware<\/a><\/li>\n<li><a href=\"http:\/\/blog.webroot.com\/2012\/03\/29\/spamvertised-verizon-themed-your-bill-is-now-available-emails-lead-to-zeus-crimeware\/\">Spamvertised Verizon-themed \u2018Your Bill Is Now Available\u2019 emails lead to ZeuS crimeware<\/a><\/li>\n<li><a href=\"http:\/\/blog.webroot.com\/2012\/04\/03\/spamvertised-us-airways-themed-emails-serving-client-side-exploits-and-malware\/\">Spamvertised \u2018US Airways\u2019 themed emails serving client-side exploits and malware<\/a><\/li>\n<li><a href=\"http:\/\/blog.webroot.com\/2012\/03\/23\/spamvertised-linkedin-notifications-serving-client-side-exploits-and-malware\/\">Spamvertised LinkedIn notifications serving client-side exploits and malware<\/a><\/li>\n<li><a href=\"http:\/\/blog.webroot.com\/2012\/05\/11\/spamvertised-pizzeria-order-details-themed-campaign-serving-client-side-exploits-and-malware\/\">Spamvertised \u2018Pizzeria Order Details\u2019 themed campaign serving client-side exploits and malware<\/a><\/li>\n<li><a href=\"http:\/\/blog.webroot.com\/2012\/03\/22\/spamvertised-your-tax-return-appeal-is-declined-emails-serving-client-side-exploits-and-malware\/\">Spamvertised \u2018Your tax return appeal is declined\u2019 emails serving client-side exploits and malware<\/a><\/li>\n<li><a href=\"http:\/\/blog.webroot.com\/2012\/03\/09\/spamvertised-your-accountant-license-can-be-revoked-emails-lead-to-client-side-exploits-and-malware\/\">Spamvertised \u2018Your accountant license can be revoked\u2019 emails lead to client-side exploits and malware<\/a><\/li>\n<li><a href=\"http:\/\/blog.webroot.com\/2012\/02\/25\/spamvertised-termination-of-your-cpa-license-campaign-serving-client-side-exploits\/\">Spamvertised \u2018Termination of your CPA license\u2019 campaign serving client-side exploits<\/a><\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.webroot.com\/us\/en\/home\/products\/complete\"><strong>Webroot SecureAnywhere<\/strong><\/a> users are proactively protected from this threat.<\/p>\n<p>Meanwhile, users are advised to ensure that they are not running outdated versions of their <a href=\"http:\/\/secunia.com\/products\/consumer\/psi\/\"><strong>third-party software<\/strong><\/a> and <a href=\"http:\/\/www.mozilla.org\/en-US\/plugincheck\/\"><strong>browser plugins<\/strong><\/a> in an attempt to mitigate the risks posed by web malware exploitation kits exploiting outdated and already patched vulnerabilities.<\/p>\n<p><em>You can find more about Dancho Danchev at his <strong><a href=\"http:\/\/nl.linkedin.com\/in\/danchodanchev\">LinkedIn Profile<\/a><\/strong>. You can also <a href=\"http:\/\/www.twitter.com\/danchodanchev\"><strong>follow him on \u00a0Twitter<\/strong><\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Everyone uses Amazon!\u00a0At least\u00a0that&#8217;s what the cybercriminals are hoping. \u00a0Cybercriminals are currently spamvertising millions of emails impersonating Amazon.com Inc. in an attempt to trick end and corporate users into clicking on the malicious links found in the emails. More details:<\/p>\n","protected":false},"author":65,"featured_media":17048,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[],"yst_prominent_words":[22929,22931,22925,22927,11235,10907,10897,3871,9563,10103,11229,11227,10109,10297,10625,11233],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/7142"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/65"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=7142"}],"version-history":[{"count":2,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/7142\/revisions"}],"predecessor-version":[{"id":25353,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/7142\/revisions\/25353"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/17048"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=7142"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=7142"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=7142"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=7142"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}