[nsp-sec] Yahoo phising account
Joel Rosenblatt
joel at columbia.edu
Fri May 23 14:46:25 EDT 2008
Hi,
I'm checking my mail system now for bounces from this list, but I never saw the email with the question in it .. Seth - did you not send this through the NSP
list - we are filtering this phishing stuff very aggressively, but stuff from NSP passes through unfiltered.
Thanks,
Joel
--On Friday, May 23, 2008 12:05 AM -0400 Seth Hall <seth at net.ohio-state.edu> wrote:
>
> On May 22, 2008, at 5:46 PM, Smith, Donald wrote:
>
>> Joel were the compromised accounts being exploited from 196.207.3.10?
>> We have seen that ip abusing the drake webmail service to send spam
>> that
>> matches Serge's spam.
>
> We've been seeing that one since the 17th. The user-agent we saw for it was:
> Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0; Avant Browser; SLCC1; .NET CLR 2.0.50727; Media Center PC 5.0; .NET CLR 3.0.04506; Tablet PC 2.0)
>
> Here are the addresses we've seen the attackers come from with the associated browser user-agents we've seen if I logged it (multiple user agents are
> separated with pipes):
> 162.114.40.32
> 196.207.0.227 Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; Crazy Browser 3.0.0 Beta2)
> 196.207.10.102
> 196.207.15.10
> 196.207.15.201 Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; Avant Browser) "
> 203.55.231.100
> 209.59.56.0 Opera/9.22 (Windows NT 5.1; U; en)|Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; .NET CLR 1.1.4322; .NET CLR 2.0.50727; .NET CLR
> 3.0.04506.30)
> 211.3.203.107 Opera/9.25 (Windows NT 5.1; U; en)
> 213.160.129.51 Opera/9.25 (Windows NT 5.1; U; en)
> 213.185.118.201
> 217.21.79.166
> 38.99.101.129
> 38.99.101.130
> 38.99.101.132
> 41.204.224.37 Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)
> 41.204.224.39 Opera/9.20 (Windows NT 6.0; U; en)|Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0; SLCC1; .NET CLR 2.0.50727; Media Center PC 5.0; .NET CLR
> 3.0.04506; Crazy Browser 2.0.1)|Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8.1.14) Gecko/20080404 Firefox/2.0.0.14|Mozilla/4.0 (compatible; MSIE
> 6.0; Windows NT 5.1)|Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; Crazy Browser 1.0.5; Acoo Browser)|Opera/9.25 (Windows NT 5.1; U; en)
> 41.204.224.41
> 41.211.246.2
> 41.220.70.3 Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; Acoo Browser)|Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; .NET CLR 1.1.4322;
> Crazy Browser 3.0.0 Beta2)|Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 6.0; en) Opera 8.51|Mozilla/5.0 (Windows; U; Windows NT 6.0; en-US; rv:1.8.1.13)
> Gecko/20080311 Firefox/2.0.0.13
> 41.249.33.142
> 58.97.1.24
> 64.214.231.140
> 64.72.85.62
> 65.98.28.226
> 74.85.13.51
> 74.85.13.60 Opera/9.21 (Windows NT 5.1; U; en);afcid=Wea289eb35e42ade541968291f83df1b3|Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; Mozilla/4.0
> (compatible; MSIE 6.0; Windows NT 5.1; SV1) ; .NET CLR 1.1.4322; Seekmo 10.0.406.0; .NET CLR 2.0.50727; FDM);afcid=Wea289eb35e42ade541968291f83df1b3
> 77.73.186.83
> 80.78.18.18
> 80.88.133.12
> 80.89.176.35
> 81.199.149.88
> 81.199.176.221 Opera/9.25 (Windows NT 5.1; U; en)|Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; Crazy Browser 2.0.1)
> 81.199.176.222
> 81.199.177.14
> 81.199.62.48
> 81.199.63.41
> 81.199.63.42 Opera/9.25 (Windows NT 5.1; U; en)
> 81.199.63.44
> 81.199.63.45 Opera/9.26 (Windows NT 5.1; U; en)|Opera/9.25 (Windows NT 5.1; U; en)
> 81.199.63.46 Opera/9.10 (Windows NT 5.1; U; en)|Opera/9.26 (Windows NT 5.1; U; en)|Opera/9.25 (Windows NT 5.1; U; en)|Opera/9.24 (Windows NT 5.1; U;
> en)|Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; FDM)
> 81.199.63.51
> 81.199.84.146
> 81.199.88.131
> 81.199.88.8
> 81.199.89.49
> 86.96.226.15
>
> Now, here's where it gets interesting. I started logging http headers that would indicate if the remote host is a proxy a while ago and it turns out that a
> number of these addresses are actually proxies (or at least were at the time)...
>
> 41.204.224.41 Via: 1.1 netcacheus (NetCache NetApp/6.0.4)
> 81.199.88.8 Via: 1.1 proxy:3124 (squid/2.5.STABLE11)
> 81.199.63.42 Via: 1.1 proxy:8080 (squid/2.5.STABLE11)
> 81.199.63.51 Via: 1.1 proxy:8080 (squid/2.5.STABLE11)
> 212.100.250.230 Via: 1.1 nickel.onspeed.com:3128 (squid/2.6.STABLE18)
> 162.114.40.32 Via: 1.0 NC6200-2 (NetCache NetApp/6.0.5DEBUG4)
> 148.233.159.58 Via: 1.0 cache-mex-roma-2 (NetCache NetApp/5.6.2)
>
> Even more interesting than that though, is the one address which didn't identify itself as a proxy. The attackers would use to login to the account first,
> then we'd see multiple logins from other addresses that did indicate themselves as proxies. If anyone has visibility on it, it might be worthwhile to poke
> around at 74.85.13.60 and find out what else it's up to.
>
> 32035 | 74.85.13.60 | US | arin | CCDT-AS - Telekenex
>
> .Seth
>
> ---
> Seth Hall
> Network Security - Office of the CIO
> The Ohio State University
> Phone: 614-292-9721
>
>
>
>
Joel Rosenblatt, Manager Network & Computer Security
Columbia Information Security Office (CISO)
Columbia University, 612 W 115th Street, NY, NY 10025 / 212 854 3033
http://www.columbia.edu/~joel
More information about the nsp-security
mailing list