Exploit for zero-day vuln in Firefox is for sale

Evgeny Legerov, founder of Intevydis in Moscow, has created an exploit that hits a previously unknown heap-corruption vulnerability in the Firefox browser. The code isn’t readily available though, since he’s put it in a module to the automated exploitation system he sells (reportedly at a considerable price.) Legerov has not provided information on the vulnerability to Mozilla.

The Intevydis site says: “Exploitation frameworks are not new on the market, but only we may offer you hundreds of CANVAS modules for unpatched and unknown vulnerabilities in highly popular software products.”

The exploit works against Firefox v 3.6 on Windows XP and VISTA.

If Legerov hasn’t given Mozilla details of the hack, as one would under the rules of responsible disclosure, it raises the question: “who does he sell his software to?”

There don’t seem to be any more details of the vulnerability available. Expectations are that the exploit will be more widely available in the wild shortly. Vulnerability research firm Secunia gives general sort of advice for users:

“Solution

“Do not visit untrusted websites or follow untrusted links.”

Story here.

0day vuln in Adobe Download Manager disclosed

Calc

First, make a note: after Adobe updates, restart your machine immediately to remove the Adobe Download Manger – it can be a vector for malcode.

Now, back to our story.

Aviv Raff has discovered a vulnerability with Adobe’s web site in combination with its Download Manager, an ActiveX script that is used to download updates for Reader and Flash. After a Reader or Flash update the download manager remains running on a user’s machine until it is rebooted. Malicious operators could exploit it to download their code of choice.

Raff demonstrated the flaw by using the download manager to download a copy of Windows calculator.

He has notified Adobe of the problem but not publically disclosed the finer details vulnerability.

Raff’s blog post here.

News story here.

Update 02/23:

Fixed: “Security update available for Adobe Download Manager” here.

Tom Kelchner

Antivirus NOT

“Dammed thieves. Stole our logo. I suppose we should be flattered, though.”
— A.E.

Old rogue, new package:

Ripoff

AntivirusProtectionCenter
av2009.exe :
crc6:7f3d73762762
crc8:003091628c68decc
md5:d71d1e303ab963fdae76936ba52a05b7

AMC.exe :
crc6:1d6922972762
crc8:003005cfbb91b729
md5:e5555754fd758fc2be1374796f9433e2

Hash’s different from their PersonalAntiMalware added 2/16/2010

opener_.exe :
crc6:8ee75c08081d
crc8:00dc55e5aaa82efa
md5:5bb290cd1eb419ca98ca1f31273f7219

“It’s the same gang that had the code saying ‘hello Sunbelt software’
They are watching us.”
— P.J.

Thanks Alex. Thanks Patrick. Thanks Bharath.

Tom Kelchner

Zeus botnet continues: 2,500 victims estimated

Herndon, Va., forensics firm NetWitness has said that the Zeus botnet has breached the networks of nearly 2,500 organizations in nearly 200 countries, including 10 U.S. federal agencies. NetWitness researchers said many victims are Fortune 500 companies in energy, finance and high tech sectors.

NetWitness based its conclusions on information from a 75-gigabyte collection of data that they intercepted. It was information the botnet had stolen in one month.

The Zeus botnet, which started in 2008, is believed to have 74,000 machines infected.

Researchers said the group behind Zeus also had machines infected with Waledac and had changed instructions in the botnet several times in order to find and steal different types of data.

The botnet controllers, using servers in Germany and the Netherlands, had breached networks in 196 countries including Egypt, Mexico, Saudi Arabia, Turkey, and the U.S.

Story here.

Tom Kelchner

30 percent of U.S. is totally safe from Internet threats

A survey of 54,000 households (129,000 people) commissioned by National Telecommunications and Information Administration (NTIA) last year found that 30 percent of U.S residents did not use the Internet at home or at work.

The study, based on Census Bureau work, found that 64 percent of households had connections. In 2007, only 51 did.

The NTIA researchers found that of those without connections, 38 percent said they didn’t need Internet and 26 percent said it was too expensive. In rural areas, 11 percent said they didn’t have any Internet access available. In urban areas, one percent said they couldn’t get it.

Story here.

Report here.

Tom Kelchner

The fakeout collection

Fake program trading is a popular way to spend time on hacking forums. An endless stream of wannabe hackers want to get even with somebody, or take over a specific account but don’t have the technical skills to create a convincing looking application and get the job done.

What do they do?

Trawl around on forums looking out for “fake program collections”. These collections take the form of ready-made (fake) programs, designed to fool the end-user into thinking they’re doing something useful. In reality, the program will just infect the user and send their data back to base / lurk in the background / cause a small fire that becomes the biggest story of the year on local TV.

The difference between these programs and those already out in the wild is that they come free of any infection – it’s up to the recipient to add that malicious aspect further down the line. Think of the fake program collection makers as artists, plying their trade in return for forum reputation points instead of a nice exhibit in a gallery somewhere.

The problem is, these things are so widespread now that every wannabe on the block can now have their shiny looking infection file made to order. Some hackers have effectively “retired” from infecting people and spend their days making fake programs for reputation points and the occasional sum of cash. Does this increase the number of people getting involved in infection spreading? Possibly – it certainly doesn’t help reduce that total, at any rate.

Previously dumps of fake collections I’ve seen tended to pan out at around ten to twenty fake programs in a bundle, max. Today I came across a huge haul of around 150 fake programs, ready and waiting to be bound to something nasty.

Fake_programs1

As you can see, there’s something for everyone in there. Fake Xbox point generators, lots of videogame keygens, “cracked” versions of editing / multimedia software – even something that fails to load but still manages to play the Super Mario Bros theme tune in the background. As you might expect, the “convince me” factor of some of these programs leaves a lot to be desired but these three particularly stand out for various reasons.

The Good:

Fake_p2

Well, that’s pretty convincing. Numerous (recent) movies highlighted, a tab bar going back to 2007, volume and control buttons at the top….someone desperate to see a film may well fall for this.

The Bad:

Fake_p3
Well, this is underwhelming. The supposed “TV” aspect consists of two static photographs that you can flip back and forth – I’m not sure anybody would bother to bind anything to this apart from a self destruct switch but you never know.

The…er…wait, what is this?

Fake_p4

You just can’t get away from that film, can you?

Chris Boyd (PaperGhost)

Are the threats to gamers being taken seriously?

Computer games have been gaining in popularity probably at an exponential rate since the invention of the Etch-A-Sketch. The release of the next Xbox version or Nintendo model is headline news. And we all know people who spend more time in the virtual reality of World of Warcraft than they do in this world.

It’s easy to think of on-line games and the games played from consoles as, well, just games. That changed some time ago. That little (now very big) world has at least as many serious malware and social engineering threats as the other parts of the Internet.

Chris Boyd (AKA PaperGhost) the UK security researcher that Sunbelt Software just hired, made an hour-long video of a presentation he gave at a SecTor.ca conference: “Game Over Man, Gamers under Fire.” (link to the video is halfway down page.)

He goes into quite a bit of detail about game console networks, payment systems, malicious software, denial-of-service attacks, cheats and social engineering. He also stresses the often overlooked point — where consoles are concerned – that although logins are still ultimately lost via phishing, there are sophisticated and blended attacks on the console and online gaming environment to reach that stage of trust in the first place.

Also, many companies now drop consoles onto their network via recreation rooms, with no inkling that the wrong move in an online gaming session could potentially open up players to targeted distributed denial-of-service attacks — not a good thing for a corporate network to attract!

Boyd lists the safe practices for gamers:

— NEVER give someone your system logins in exchange for ANYTHING.
— Don’t buy cheats, many sellers are malicious.
— Avoid the game cheats and other things that are sold on Youtube videos.
— If you have an account with a gaming company, remove your credit card number from the account if at all possible and don’t sign up for automatic renewal.
— Use pre-paid cards to pay for accounts rather than your credit card.
— Use aliases when you sign up for accounts.

He concludes in the video: “These [games] aren’t as safe and secure as people will try to make out that they are.”

The video is a good way for gamers to get up to speed on the huge number of threats out there.

Nice work PaperGhost.

Tom Kelchner

What is the “Cloud” anyway?

Rob VandenBrink at SANS has done the world a GREAT service. He’s put together a blog piece that breaks down the different types of services that are commonly referred to as “the cloud.”

They include:

— Colocation Services
— Host as a Service (HaaS) / Infrastructure as a Service (IaaS)
— Computer as a Service (CaaS) or Desktop as a Service (DaaS)
— Platform as a Service (Paas)
— Software as a Service (SaaS)
— Private Clouds

It’s a very nice, quick read:

Defining Clouds – ” A Cloud by any Other Name Would be a Lot Less Confusing”

Tom Kelchner

Omegle users targeted by rogue URL spreaders

Omegle.com is a one-to-one anonymous chat service that continues to grow in popularity. While you can find numerous tales of non malicious AI botschatting” with Omegle users, here we have an example of how that same concept can be applied in a rather more malicious fashion.

From around January of this year, a number of individuals on various forums have been creating Omegle Chat Spreader tools. These programs have been specifically designed to send malicious URLs to Omegle users in chat sessions with what they believe to be a real person.

As you can see from the screenshot:

Omegle 1

…there are numerous options where your spam messages are concerned – along with the intended infection URL, you can use the default messages that appear on entering, during and leaving the conversation:
“Download this sliedshow of me f*****g my self”
“check out this sexy pic of me”
“enjoy the slide show byee”

…or you can add up to six custom messages of your own, and (cleverly) also watch the spambot in real time via the browser window on the right. If you think your spambot isn’t performing well, you can adjust performance on the fly, either by altering the messages or the timing of the messages to make your bot look more like a real person. In the above screenshot, you can see how the tool combines your name and age as a chat message to the victim.

In this next screenshot, you can see it sending whatever infection link the attacker has placed in the “Download URL” box, complete with interaction from the victim (in red):

Omegle 2

The program has been designed as a “fire and forget” package, which means the attacker can simply set it up and leave it running on their PC. Does it get victims?

You bet. A random shot from a hacking forum – there are many more like this:

Omegle 3

“I went to the shop and when I returned I had at least five to ten people”?

Oh dear. Be careful what you click on in Omegle land, as this type of package is sure to become more popular as the weeks pass by.

Chris Boyd (PaperGhost)

U.S. FTC shuts down “work from home” scammers

The U.S. Federal Trade Commission (FTC) today announced actions against nearly 70 work-at-home and job-placement scammers by federal and state agencies. The commission is calling the combined investigations “Operation Bottom Dollar.”

The FTC filed seven cases against scammers and said there were actions in four older scam cases. The Department of Justice brought 43 criminal actions. A number of them involved help from the U.S. Postal Inspection Service. The Postal Inspection Service brought one civil action and state attorneys general brought 18.

The actions were announced at an FTC press conference today that included officials from the FTC’s Bureau of Consumer Protection, a federal assistant attorney general for the civil division of the department of justice and Ohio’s attorney general.

In one of the cases, scanners victimized more than 100,000 people. FTC obtained a court order temporarily barring operators from continuing their deceptive, tactics and froze their assets pending a court order that would allow the agency to try to return money to victims. Authorities executed search warrants and arrested the two operators of one business.

At the press conference the FTC announced actions against:

Government Careers Inc. (action in U.S. District Court for the District of Arizona) which ran ads on Web sites and charged victims $119 for study materials to help them obtain federal government jobs which never materalized.

Real Wealth, Inc. (U.S. District Court for the Western District of Missouri) conned more than 100,000 people by selling booklets that told how they could earn money by applying for government grants and working from home mailing postcards and envelopes.

Darling Angel Pin Creations (U.S. District Court for the Middle District of Florida, Tampa Division) claimed on the Internet and in newspaper advertisements that by purchasing a starter kit for $22-$45 they could earn up to $500 per week assembling angel pins. Those buying into the scam were required to have one of their assembled angel pins approved by the company before they could make any money. The company, however, rejected nearly all the angel pins consumers submitted.

Abili-Staff, Ltd., (U.S. District Court for the Western District of Texas, San Antonio Division) sold work-at-home opportunities online and pre-screened lists of jobs, telling consumers they could access the lists after paying a fee ranging from $29.98 to $89.99.

Entertainment Work, Inc. (U.S. District Court for the Southern District of Florida) sold memberships in a Web site that was supposed to list jobs as movie extras, jobs on television, or jobs in print media. Trial memberships cost $19.95 to $24.95, and automatically converted into annual memberships for an additional fee of $80. The company failed to disclose that to cancel their membership, people would have to pay an additional fee or undertake a burdensome process.

Independent Marketing Exchange, Inc. (U.S. District Court in the District of New Jersey) sold a variety of work-at-home scams including envelope, postcard and mystery shopper.

Preferred Platinum Services Network (U.S. District Court for the District of New Jersey) sold a work-from-home scheme in which victims were charged an enrollment fee of $80-$90 so they could earn money by labeling postcards describing a “mortgage accelerator” which did not exist. Criminal authorities served search warrants on the business and arrested the husband-and-wife team running it, charging them with mail fraud.

Since last summer, the FTC also has settled or litigated four law enforcement actions stemming from employment and work-at-home scams:

Job Safety USA. Principal Wagner Ramos Borges (U.S. District Court for the District of Maryland Greenbelt Division) offered phony jobs to people seeking maintenance and cleaning work.

Career Hotline, Inc. (U.S. District Court for the Middle District of Florida) took money from job seekers after guaranteeing them jobs that paid at least $25,000 per year.

Penbrook Productions (U.S. District Court for the Central District of California) enticed consumers to become “certified” rebate processors making $225 per hour.

International Marketing and principal Zolio Cruz Carrion (U.S. District Court for the District of Puerto Rico) was cited for contempt for failing to comply with a 2008 order in a scam in which he promised Spanish-speaking consumers substantial income for stuffing envelopes. “The court granted the FTC’s motion to hold Cruz in contempt for failing to comply with an earlier order and briefly jailed him for contempt. It also prohibited him from marketing any business, employment, investment or work-at-home opportunity,” the FTC said.

The commission also announced partnerships with Monster.com, Microsoft’s Bing and Craigslist. Those groups will provide information to help job seekers recognize job scams.

The FTC has produced a consumer education video in English and Spanish are available at
http://www.ftc.gov/jobscams and http://www.youtube.com/ftcvideos.

FTC account here: “FTC Cracks Down on Con Artists Who Target Jobless Americans”

It’s pretty obvious that if somebody wants money from you before he will hire you, there is a really good chance it’s a scam (or not much of a job.)

Tom Kelchner

UK researcher joins Sunbelt

Boyd5

Chris Boyd (left) with Sunbelt Software CEO Alex Eckelberry at RSA 2008

Chris Boyd (AKA Paperghost), a spyware and privacy researcher based in the UK, has joined the Sunbelt Software research team and will be contributing to the Sunbelt Blog. Chris is a Web 2.0 security specialist with a significant background in the exploits and hacks in online computer games.

He was the former Director of Malware Research at Facetime, a Belmont, Calif.-based Web 2.0 and unified communications security firm. He is a five-time Microsoft MVP, CNET Top 100 Blogger and has been responsible for numerous discoveries in security. He has spoken at computer security conferences including RSA, ASC and InfoSec Europe.

He has specialized in investigating the scams of adware vendors such as Direct Revenue and Zango. Evidence he uncovered was used in the 2006 New York Attorney General v. Direct Revenue case.

He has presented his research on his web site Vitalsecurity.org since 2004.

When Boyd isn’t researching security issues he’s listening to Mahler and indulging his interests in videogames, anything Batman related, collecting old consoles and watching Hong Kong cinema on which he did a dissertation for his BA(Hons) in fine art.

Tom Kelchner

The top 25 most dangerous programming errors

The Common Weakness Enumeration Compatibility and Effectiveness Program has just posted its annual “2010 CWE/SANS Top 25 Most Dangerous Programming Errors.”

Just as the title says, it’s an attempt to pin down the software errors that are the most dangerous. The code is where all the vulnerabilities we deal with start. A vast number of attacks are successful because of security weaknesses in the operating systems and applications we use. Failure to patch is one of the chief ways to make yourself a victim to malcode.

The page focuses on different groups who may use its data and has suggestions for:

— Programmers new to security
— Programmers who are experienced in security
— Software project managers
— Software Testers
— Software customers
— Educators
— Users of the 2009 Top 25

“The 2010 CWE/SANS Top 25 Most Dangerous Programming Errors is a list of the most widespread and critical programming errors that can lead to serious software vulnerabilities. They are often easy to find, and easy to exploit. They are dangerous because they will frequently allow attackers to completely take over the software, steal data, or prevent the software from working at all.”

The list has been put together by the SANS Institute, MITRE and many top software security experts in the US and Europe.

Here at Sunbelt Software, we pay close attention to it.

Tom Kelchner

Cyclist Floyd Landis wanted for computer hacking in France

A judge in Nanterre near Paris has issued a warrant for U.S. Cyclist Floyd Landis who had his 2006 Tour de France title revoked after he tested positive for performance-enhancing drugs.

The court wants to question Landis about a 2006 hacking incident in which a Trojan was installed in the computers of the Châtenay-Malabry lab which did the urine tests that resulted in Landis losing the 2006 Tour title and being barred from cycling for two years.

During the aftermath of the doping scandal, Landis launched a very shrill media campaign against the lab, questioning its testing procedures.

The Châtenay-Malabry lab filed a complaint in 2006 charging that its computer data had been stolen. The information was used in Landis’s defense, sent to other labs and given to news outlets. An investigation at the lab found a Trojan had installed a back door that gave someone access to the system. Investigators believe the Trojan arrived in an e-mail sent to the lab from a computer using the same IP address as Landis’ coach Arnie Baker.

Baker and Landis deny the charges.

Story here.

Tom Kelchner

Google takes flak for sloppy privacy protection in Buzz

Shortly after Google introduced its Buzz social media tool last week the security community lit up about its disastrous lack of privacy controls. Setting up an account opened up your contacts and everyone could see who you’d been in frequent contact with.

More than one commentator was shocked that Google would structure a product with so little concern for security. A piece in InfoWorld, entitled “Why Google Has Become Microsoft’s Evil Twin,” was especially hard hitting. Robert X. Cringely wrote: “The backlash over Google Buzz reveals an even bigger problem: The people behind the people’s search engine are deeply out of touch.”

“When you first go into Google Buzz, it automatically sets you up with followers and people to follow. … The problem is that — by default — the people you follow and the people that follow you are made public to anyone who looks at your profile. In other words, before you change any settings in Google Buzz, someone could go into your profile and see the people you email and chat with most …” he wrote.

Cringely also said that people he knew at Google were completely dumbfounded at the criticism.

By last Saturday Google had made some fixes and Todd Jackson, Product Manager of Gmail and Google Buzz wrote on the Official Gmail Blog:

“We’ve heard your feedback loud and clear, and since we launched Google Buzz four days ago, we’ve been working around the clock to address the concerns you’ve raised. Today, we wanted to let you know about a number of changes we’ll be making over the next few days based on all the feedback we’ve received.”

By Thursday Google had made changes:

— They made the Buzz checkbox for choosing not to display personal information easier to find,
— replaced the auto-follow model (Buzz automatically sets users up to follow people they email and chat with) to an auto-suggest model,
— removed the automatic connection for public Picasa Web Albums and Google Reader shared items and
— added a tab to Gmail Settings to make it possible to hide Buzz from Gmail or disable it.

We commonly hear the “home user” criticized for being oblivious to security and privacy measures (failure to update, clicking on links and attachments in spam, poor password selection, posting personal information in public places and on, and on, and on.) You’d think that all the smart people at Google would have been more conscious of the problem. It’s great that they immediately made the fixes needed, but, it was shocking that it happened in the first place.

Generally, most people have a warm and fuzzy feeling about Google, or did. This episode is just one more wake-up call. We are all responsible for our own online security. We all have to keep up with current threats and can’t trust big institutions like Microsoft and now Google, to be some kind of parent figure.

Tom Kelchner

Second guess your AV scanner with SANS’ whitelist database

SANS tool

The clever folks at SANS have made public the beta version of a whitelist hash database that enables you to look up the MD5 or SHA1 hash of a file to see it has been checked as NOT malcode by a reliable authority. The tool is based on the “National Software Reference Library” from the National Institute of Standards and Technology (NIST). The NSRL database normally comes as a download or CD and isn’t as convenient as a web site lookup.

Among other uses, this could be pressed into service to check a file that might be part of a standard package or a system file that has been tagged as malicious by a malcode scanner if you suspect a false positive. Or, if you’re simply suspicious of a file that isn’t detected by your anti-malware scanner this could be a check.

You can also put in a file name to find its whitelisted MD5 hash.

Windows 7 files are not in the database as of this writing, according to Dr. Johannes Ullrich at SANS.

Tool here: http://isc.sans.org/tools/hashsearch.html

SANS description here.

Tom Kelchner

Social media expands: LinkedIn hits 60M

LinkedIn 60 m

A new user in the Netherlands became the 60 millionth person to sign up with LinkedIn, the professional social networking site.

Facebook says it has 400 million users of whom half log in every day.

Both are fabulous tools for communications and socializing, but making members’ identities and personal information so easily available carries some big risks. Our good friends at Sophos have pointed out that information can be harvested from LinkedIn for spear phishing. The site can contain enough information to be a virtual company directory.

There are unexpected exposures too. Imagine linking to a recruiter you’re having conversations with and being able to see the other people he or she is linked to – like your subordinates – or your boss! That spills just a bit too much info on all of us.

LinkedIn story here.

Tom Kelchner

Social networking revolution brewing: the anti-“villes”

Villes 4

A lot of Facebook members are becoming fans of “I don’t care about your farm, or your fish, or your park, or your mafia!!”

This is basically a privacy issue I suppose.

Villes

Shortly after noon today there were about 4,000 Facebook members joining every 10 minutes!

Villes2

Villes3

If the surge continues it might become a Facebook denial-of-service issue!

http://www.facebook.com/pages/I-dont-care-about-your-farm-or-your-fish-or-your-park-or-your-mafia/207382931457?ref=nf

Update:

The Wall Street Journal reported on this last night about 10 p.m. At that point they said 2,000 people were joining per minute.

“Backlash Against Social Games Brews On Facebook”

Tom Kelchner

Wi-Fi sensitivity results in Santa Fe lawsuit

When you spend your day scouring the Internet (and Sunbelt labs) for news about computer security topics you cover a lot of territory. Once in a while you just have a weird day. You run into a lot of strange stuff. Today is one of those days.

Yahoo’s tech blog is carrying a story about a man in Santa Fe, New Mexico, who is suing because he has “electromagnetic sensitivity” and can’t live in his own home because of the radiation from his neighbor’s wi-fi network.

He says in his suit that her cell phone, fluorescent lights and dimmer switches also cause “life-threatening reactions, which include heart arrhythmia.”

I hope nobody tells him that people use Wi-fii to log onto to the Internet and everybody knows that’s full of viruses and bots. And there’s no frost in Santa Fe to kill the bots either.

And don’t get me started about the deadly flux fields from those refrigerator magnets.

“Wi-fi ‘sensitivity’ draws lawsuit from next-door neighbor”

Update:

Whoa boy! There some history there. Plaintiff Arthur Firstenberg has been at this for a while.

http://en.wikipedia.org/wiki/Arthur_Firstenberg

Tom Kelchner

Interview with a Nigerian 419 scammer

Bruce Schneier, in his blog Schneier on Security http://www.schneier.com/ drew attention to this great interview with an ex-Nigerian-419 scammer on the Scam-Detective site.

It’s a fairly long piece and gives a pretty good view of the Nigerian scam industry run by organized crime, how it sucks in young people who have good computer and English skills and pays them a huge amount of money ($75,000 per year in this case) to scam victims they view as white, greedy and rich.

I’ll just quote one section and the conclusion of the three-part interview:

Scam-Detective: How did you find victims for your scams?

John: First you need to understand how the gangs work. At the bottom are the “foot soldiers”, kids who spend all of their time online to find email addresses and send out the first emails to get people interested. When they receive a reply, the victim is passed up the chain, to someone who has better English to get copies of ID from them like copies of their passport and driving licenses and build up trust. Then when they are ready to ask for money, they are passed further up again to someone who will pretend to be a barrister or shipping agent who will tell the victim that they need to pay charges or even a bribe to get the big cash amount out of the country. When they pay up, the gang master will collect the money from the Western Union office, using fake ID that they have taken from other scam victims.

. . .

Scam-Detective: Can you give our readers any tips about how they can avoid getting scammed?


John:
The biggest thing I can say is to delete the emails and never to reply. Once you reply your email address will be put on a list and sold to other gangs, even if you never reply again. It just tells them that the address is real and that somebody reads email going to that address. If they can’t get you with 419 (advance fee fraud) they will try phishing or viruses to get your banking details and take your money that way.

I used lots of different stories to get people to send money. I used the dying widow story a lot, saying that I was an old lady dying of cancer and had fallen out with my children. I wanted to give my money to charity and didn’t trust them to carry out my wishes, so was looking for someone outside of the country to make sure it went to the right place. So whatever the story is, make sure you delete the email, because you can be sure it is a scam.

Another thing is not to put email addresses anywhere on the internet. If it is on a guestbook or message board, or on a website anywhere then the foot soldiers will find it and put it on their list.

Tom Kelchner