Blog for hpHosts, and whatever else I feel like writing about ....

Wednesday, 30 January 2013

ALERT: Wonga phish

Strange choice of companies to impersonate in a phishing scam if you ask me, but never the less, this just arrived in my inbox;

Customer Satisfaction Survey 2013
At, we sincerely value your opinions.
As part of our continuous improvement process, we're conducting a survey to benchmark the opinions of our customers.

We will use the resulting information to better serve the needs of
our customers.

We kindly ask you to take part in our quick and easy 3 questions customer survey. In return, we won't charge you ANY INTEREST on your next loan application!

Here is how you proceed:
• Download your personal survey attached to this email.
• Select the desired answers on your survey.
• Log in to your account to validate your survey.
We thank you in advance for your time and effort in making Wonga the best payday lender in the United Kingdom.

Sincerely, Customer Service
Message ID:

This came with an attachment that housed the phish itself;

With the stolen details being sent to;

URL: hxxp://

Email headers:

Return-Path: <>
Delivered-To: [REMOVED]
X-Spam-Flag: YES
X-Spam-Score: 2.937
X-Spam-Level: **
X-Spam-Status: Yes, score=2.937 tagged_above=-9999 required=1.3
tests=[BAYES_00=-1.9, HTML_IMAGE_ONLY_16=1.092, HTML_MESSAGE=0.001,
T_OBFU_HTML_ATTACH=0.01] autolearn=no
Received: from ( [])
by [REMOVED] (Postfix) with ESMTP id 45B043598600
for <[REMOVED]>; Thu, 31 Jan 2013 06:26:44 +0000 (GMT)
Received: from ([]) by with MailEnable ESMTP; Thu, 31 Jan 2013 06:26:30 +0000
From: "" <>
Subject: [SPAM] Customer Satisfaction Survey for [REMOVED]
Date: 31 Jan 2013 03:26:38 -0300
Message-ID: <>
MIME-Version: 1.0
Content-Type: multipart/mixed;

Owner of the IP housing the phish has been notified, as have the owners of the IPs the email originated from (Telefonica) and went through (Dataflame Internet Services Ltd)

Microsoft Toolkit: Download Toolkit to Disable Automatic Delivery of Internet Explorer 10

To help our customers become more secure and up-to-date, Microsoft will distribute Windows Internet Explorer 10 as an important update through Automatic Updates for Windows 7 SP1 and higher for x64 and x86 and Windows Server 2008 R2 SP1 and higher for x64.This Blocker Toolkit is made available to those who would like to block automatic delivery of Internet Explorer 10 to machines in environments where Automatic Updates is enabled. The Blocker Toolkit will not expire.

  1. For computers running Windows 7 or Windows Server 2008 R2, the Blocker Toolkit prevents the machine from receiving Internet Explorer 10 via Automatic Updates on the Windows Update and Microsoft Update sites.
  2. The Blocker Toolkit will not prevent users from manually installing Internet Explorer 10 from the Microsoft Download Center, or from external media.
  3. Organizations do not need to deploy the Blocker Toolkit in environments managed with an update management solution such as Windows Server Update Services or Systems Management Server 2003. Organizations can use those products to fully manage deployment of updates released through Windows Update and Microsoft Update, including Internet Explorer 10, within their environment.
  4. Even if you used the Blocker Toolkit to block Internet Explorer 8 or Internet Explorer 9 from being installed as a high-priority or important update, you will still need to use the Internet Explorer 10 version of the Blocker Toolkit to block Internet Explorer 10 from being installed. There are different registry keys used to block or unblock automatic delivery of Internet Explorer 8, Internet Explorer 9 and Internet Explorer 10.
See the "Additional Information" section on the page linked to below for detailed instructions on configuring and deploying the Blocker Toolkit. The same information is also provided in the Help file included in the download.

Download Toolkit to Disable Automatic Delivery of Internet Explorer 10 from Official Microsoft Download Center:

Misleading marketing: whack-a-mole

Yep, yet another round of misleading marketing, and yep, also via (not entirely their fault), with the exception of one, that was via Google.

We'll do the Google one first. This was found advertised on (owned by a friend, will be dropping him an email about it);

And where does it lead to? Well, let's take a walk through the redirection path shall we;

1. hxxp://

2. hxxp://
3. hxxp://
4. hxxp://

The download you get will vary, but will typically be one of the following (and nope, you're not seeing things, some of those are actually Symantec products)


Needless to say, you don't want any of them, or indeed, anything from *

And the one? well, this is what I like to call whack-a-mole, due to the fact, all you've got to do is change one letter/number, at the end of the URL, and you'll be served yet another misleading advert of one description or another. This time, it was;

And the redirection path?

1. hxxp://,eJytjc1uwjAQhJ-GW0CxE1NHVg8OJBUVtqBYbcPNzq8LTiLk1rRP34RUPEFHq53Rpx0tCIiCMlIBjGSpZIWgT0CQ4wJWUuHC8wkhIQjxEvkhijz9-T1PDvmOO.r-0OCYjmJu9VLTSTfPprzD407SSi1f9xNaPceK.o-Mc91f3Nz-1mtM57L--hAuvl-tN4j9nE.MZP5WHDV721sm0jPToMkMQ1uRh0fBNReJ408M8frefPS8xtp-FtAZTIe5gqgtresup0XemQFczHXEtmyLwXVrF33T.wLLHGGV,
2. hxxp://,eJytjc1uwjAQhJ-GW0CxE1NHVg8OJBUVtqBYbcPNzq8LTiLk1rRP34RUPEFHq53Rpx0tCIiCMlIBjGSpZIWgT0CQ4wJWUuHC8wkhIQjxEvkhijz9-T1PDvmOO.r-0OCYjmJu9VLTSTfPprzD407SSi1f9xNaPceK.o-Mc91f3Nz-1mtM57L--hAuvl-tN4j9nE.MZP5WHDV721sm0jPToMkMQ1uRh0fBNReJ408M8frefPS8xtp-FtAZTIe5gqgtresup0XemQFczHXEtmyLwXVrF33T.wLLHGGV,
3. hxxp://,eJxLjfIqKg1yzMqNCA1Lj0j0z.ZwqYqILPK0TEwuy6.wiDBJ19UFAPDEDJk=&dp3=U
4. hxxp://

which brings you to;

This serves up adware via;

-> hxxp://

And you've guessed it - you don't want that either. for those wondering, is owned by

Registered through:, LLC (
Created on: 20-Sep-12
Expires on: 20-Sep-14
Last Updated on: 20-Sep-12

Grupo Blidoo S.L.
Av. Maresme 44-46 2-6
Badalona, Barcelona 08918

Administrative Contact:
Castillo, German
Grupo Blidoo S.L.
Av. Maresme 44-46 2-6
Badalona, Barcelona 08918

Technical Contact:
Castillo, German
Grupo Blidoo S.L.
Av. Maresme 44-46 2-6
Badalona, Barcelona 08918

Domain servers in listed order:

I'm still working on identifying the rest of the domains and IPs they've got, but in the meantime, you'll want to block

Tuesday, 22 January 2013

IAC Toolbars and Traffic Arbitrage in 2013

Beginning in 2005, I flagged serious problems with IAC/ toolbars -- including installations through security exploits and through bundles that nowhere sought user consent, installations targeting kids, rearranging users' browsers to invite unintended searches, and showing a veritable onslaught of ads. IAC's practices have changed in various respects, but the core remains as I previously described it: IAC's search advertising business exists not to solve a genuine user need or provide users with genuine assistance, but to prey on users who -- through inattention, inexperience, youth, or naivete -- stumble into IAC's properties.

Crucially, IAC remains substantially dependent on Google for monetization of IAC's search services. A rigorous application of Google's existing rules would put a stop to many of IAC's practices, and sensible updated rules -- following the stated objective of Google's existing policies -- would end much of the rest.

In this piece I examine current IAC toolbar installation practices (including targeting kids and soliciting installations when users are attempting to install security updates), the effects of IAC toolbars once installed (including excessive advertising and incomplete uninstall), and IAC's search arbitrage business. I conclude by flagging advertisements with impermissibly large clickable areas (for both toolbars and search arbitrage), and I call on Google to put an end to Ask's practices.

Read more


Misleading marketing: SparkTrust has a go

Malwarebytes Unpacked: Misleading advertising

Comodo replace malware with err - malware?

Twitter spam: IAC WebFetti

IAC: Still not stopping "rogue affiliates"

Mindspark/IAC: Misleading marketing (again)

Misleading marketing: Fake IM advert - Déjà Vu

IAC/MindSpark: Scamming with a twist

Symantec - we knew they weren't trustworthy, but this is a new low

Thursday, 17 January 2013

Misleading marketing: SparkTrust has a go

Seems on the subject of misleading marketing, that SparkTrust is having a go at using misleading marketing methods.

First was the advert found on Google;

Let's start with this. Firstly, it's not a fix for the Windows Installer, and not "3 steps", and definitely not "highly recommended" (not by anyone other than SparkTrust anyway), as it claims, and finally - IT'S NOT EVEN CLOSE TO BEING FREE!!

Then on to the page it leads you to;

See anywhere here where it mentions the fact it's not free? Oh hang on, it says "free download", so it must be free - WRONG. It's just the download that is free, NOT the software itself.

And to add insult to injury, just with previously mentioned software of its ilk, this one;

1. Once installed and launched, the software started scanning automatically, leaving the user no choice as far as seeing what was to be scanned, or the option of changing settings to for example, reduce F/P's, or stop it scanning areas it has no business scanning
2. Scanned the entire system in 10 seconds flat
3. Decided it had found 268 "problems" on a clean install of Windows 7 SP1 in those 10 seconds
4. Decided one of them was "critical" (absolute rubbish), and 2 were "serious" (absolute rubbish)
5. When going to have such issues "fixed", ONLY THEN, do you find out it is a demo, and you need to pay for the software
6. Finally, at no time, was an option provided for the user to create a log of such items found, so they could have the so-called "problems" verified by anyone.

In short, this is blatant scareware, and highly misleading marketing, bundled with unethical practices in the software itself.

Sunday, 13 January 2013

Java 0day: CVE 2013-0422

Patch is finally out folks. Personally, I'd recommend you rip Java out of your systems entirely (highly unlikely you'll ever need it), but in the meantime, get updating asap;