Security Blog

Chris Larsen's picture
Written by
Chris Larsen

I've been meaning to write about a particular PUS (Potentially Unwanted Software) network that I looked at a couple of weeks ago, but there's been a considerably high number of meetings lately (the bane of an engineer's existence)...

Background:

Chris Larsen's picture
Written by
Chris Larsen

Under my Twitter handle (@bc_malware_guy), I post an occasional "Shady Domain Name of the Day" tweet, featuring my favorite oddball domain names that the Bad Guys create to further their nefarious schemes. (Recent favorites include names like faintheartedsharkoil.info, macadamianutdogma.org, and practicebundlingredbreastedsapsucker.org....)

Chris Larsen's picture
Written by
Chris Larsen

For part of this week, I've been poking into an attack we blocked last weekend (Saturday, 6/06), and while parts of it were pretty standard, the variety of attack vectors was interesting...

First, the "standard stuff":

Chris Larsen's picture
Written by
Chris Larsen

(...and they've added audio!)

 

This is essentially Part Two of yesterday's post on phony tech support scams. (For those too lazy to click, a hat tip to @malekal_morte for his tweets yesterday about these attacks.)

Chris Larsen's picture
Written by
Chris Larsen

This is a post to support the excellent work of another researcher (@malekal_morte), who posted several screenshots from his research today, focusing on Tech Support Scams. (His main site is here, if you read French.)

Chris Larsen's picture
Written by
Chris Larsen

Earlier this month (May 17th, to be precise), a new ad site appeared in our traffic logs: waframedia1.com. This domain had been registered several weeks before it began to be used, likely in an attempt to allay suspicions. It was hosted on a variety of Google cloud service IP addresses -- either for the sake of convenience, or as a further effort to look normal.