Microsoft releases work-around tool for DLL loading vulnerability

Microsoft has posted an advisory that explains the “DLL preloading attacks” and offers a work-around tool that “allows customers to disable the loading of libraries from remote network or WebDAV shares. This tool can be configured to disallow insecure loading on a per-application or a global system basis.”

When an application loads a .dll file, but doesn’t name a full path name,Windows searches a pre-defined set of directories for it. Exploiting this, an intruder could social engineer a victim into loading a malicious .dll from a USB drive or from a network and execute arbitrary code.

Advisory here: Insecure Library Loading Could Allow Remote Code Execution

Tom Kelchner

Human factors: drunken employee blasts server with .45 handgun

Dude! Chill! EVERYBODY wants to shoot them!

A variety of news outlets are reporting an incident in Salt Lake City in which an employee of a mortgage company allegedly got drunk at a concert, returned to his office and put several .45 caliber bullets into a company server with a handgun. Damage was estimated at $100,000.

According to police, Joshua Lee Campbell, who worked for RANLife Home Loans, is facing charges of:
— felony criminal mischief (second-degree felony)
— carrying a dangerous weapon while under the influence (class B misdemeanor)
— providing false information to police (class B misdemeanor)

Police said Campbell told them he’d been beaten, robbed of his gun and given drugs by his attackers. When police interviewed Campbell’s friends, however, they said he had threatened to shoot the machine.

Most news outlets played the story straight, though some couldn’t resist the humor. RightPundits.com accompanied the story with a clip from the movie “Office Space” of three guys destroying a computer with a baseball bat.

KAKE TV in Wichita, Kan. Ran the headline: “Employee Tries To Reboot Computer With Gun”

Tom Kelchner

Fake Pokemon MMORPG chooses you, Pikachu

I’ve been seeing a lot of questions pop up in relation to a website involving a “free Pokemon MMORPG”.

Pokebar1
Click to Enlarge

Shall we take a look?

The site in question is (of course) pokemon(dot)awesomefreegames(dot)net. You’re promised an awesome MMORPG that involves PvP duels, hunting for Pokemon, trading, sea hunting, hidden locations “and more”.

Pokebar2
Click to Enlarge

Note the server indicator at the top, which claims there are 685/700 spots being used.

It all looks very nice:

Pokebar3
Click to Enlarge

Is this going to end in disaster? Why yes, it is.

Click any of the “Play Now” buttons and a prompt for Hotbar appears:

Pokebar4
Click to Enlarge

Notable: the minimum age to install is 18+…but how many over 18s play Pokemon? anyway, assuming the end-user installs Hotbar and any optional extras, they’re then taken to another page:

Pokebar5
Click to Enlarge

Amazingly (or not), the Hotbar install isn’t enough – they now want you to fill in a survey because “the game is hosted on a dedicated server”. I guess running a Pokemon game costs a lot of money! Again, given that the end-user may well be under 18 you probably don’t want them filling in any of that stuff.

Can we get to the download now?

Pokebar6

The “game” is available from two download locations. One of them is on free webhosting at Tiscali, and this one is a mess – many of the files inside the zip are password protected, and attempting to run the Exe will make your desktop look like this:

Pokebar7

Yes, your PC is pretty borked. Not because the file is malicious – probably because half the bits and pieces it needs to work are still locked away in the Zip. The other download works a lot better, installing the “Pokemon MMORPG” in one go.

So far, we’ve braved a Hotbar install, a bunch of random surveys and played Russian Roulette with download links that might bork your computer if you run the wrong one.

Awesome.

The best is yet to come, however. After all of the above messing around, this is what you end up with:

Pokebar8
Click to Enlarge

It’s very…uh…brown. Open up the help file, and you’ll probably realise you’ve just been fooled into installing programs and taking surveys to get your hands on…

Pokebar9
Click to Enlarge

…a very feature limited demo that looks absolutely nothing like the game advertised on the website. Did the website creator just grab a random (and unrelated) demo freely available elsewhere and build a nonsensical MMORPG website around it?

Yep, I think they did. Feel free to steer clear of this one.

Christopher Boyd

New Trojan offers a choice of rogue security products

You get to choose your poison.

A Trojan that pretends to be a Microsoft security function is popping up something new.

Basically, it mimics the idea of VirusTotal, ( http://www.virustotal.com/ ) a site which enables you to see how 40 legitimate security companies identify a sample of malicious code that you submit.

The Trojan copies files into multiple folders under different names. After five to 15 minutes they generate a fake alert pop-up window:

(click graphic to enlarge)

After you click ANY of the four buttons on the scary “Potential threat details” screen, it takes you to a web site that shows you how different anti-malware products allegedly identify the malware that is (not really) on your computer. It includes a long list of legitimate ones, which oddly enough find no infection on your machine.

However, the display shows that four of them (which are NOT legitimate security products) have identified malicious files. Just by coincidence, those are also the ones that have a “free install” button listed next to their names.

Four of those buttons lead to rogue downloads:
— Red Cross Antivirus
— Peak Protection 2010
— Major Defense Kit
— Pest Detector4.1 (lower on page, not shown in screen shot.)

And, of course, you know the drill. Although the installs are “free” they pop up scary warnings that your machine is infected, but don’t remove the threats until you pay.

(click graphic to enlarge)

Red Cross Antivirus is the third rogue in the FakeRean family (third generation.)

(click graphic to enlarge)

Peak Protection 2010 is the second rogue of the FakeRean family’s third generation:


Major Defense Kit

(click graphic to enlarge)

Pest Detector4.1 is the first rogue of the FakeRean family’s third generation:

(click graphic to enlarge)

The rogues install themselves as antispy.exe and tmp.exe in %local_settings%Temp and run. VIPRE detects them as Trojan.Win32.Generic.pak!cobra.

The install reboots your computer, kills Windows Explorer (which is what displays your desktop) and leaves you with no icons on your desktop. Using Task Manager, however, it is possible to launch Windows Explorer restore the icons to the desktop.

VIPRE identifies the initial fake alert as Trojan.Win32.FakeAlert.FakeAV-EI

Here is what the real Virus Total page looks like:

(click graphic to enlarge)

Thanks Patrick.

Tom Kelchner

Miss Universe SEO poisoning (surprise surprise)

Our alert analyst Adam found this one, although we don’t know why he was doing web searches for “Miss Universe 2010.” He clicked on one, expecting to see long legs. Instead, he saw this pop up:

(click image to enlarge)

VIPRE detects it as FraudTool.Win32.SecurityTool (v)

The really mangled English should have given that away – for native speakers, anyway.

Clicking “OK” lead to this rogue:

(click image to enlarge)

The rogue “Security Tool” has been around since last October. We posted it on the rogue blog here.

Thanks Adam

Tom Kelchner

Scammers let Facebook users take up the spam reigns

Here’s an odd collection of websites promising lots of free Facebook goodies, including “Free Texas Holdem Poker Chips” – one million chips, to be exact.

Sounds great, doesn’t it? Unfortunately, all we’re left with is proof positive that too many people will click anything put in front of them – no matter how silly the initial promise.

Here’s the website, located at starringmovie(dot)net/secretchips(dot)html:

FB Chips
Click to Enlarge

Underneath the blurb, we can see how many people have been jumping through hoops to obtain their free chips:

FB chips
Click to Enlarge

Facebook users are asked to paste a spam message “5 times anywhere on Facebook”. The spam reads “Omg it’s real, they just send me 1M chips for free – check it out [url removed] – you got nothing to lose”.

I particularly like the recommendation to plaster it all over the official Texas HoldEm page. “You got nothing to lose”? You have nothing to gain, either. 6,833 Facebook users have hit the “Like” button, and the two “Share” buttons are being put through their paces too with 4,165 users sharing the free chips page and 1,128 users sharing starringmovie(dot)net, which is a bunch of ripped movies streamed from various sources.

Once you’ve promoted both portals, they dangle a not-very-impressive splash page in front of you, finishing off with some underwhelming text.

Here’s the splash:

FB chips

And here’s the text:

FB chips

Yes, they want you to send them your Facebook Username and associated EMail address, which smacks of targeted marketing and lists you probably don’t want to be on.

For anyone holding onto the vague hope of chips arriving in your mailbox sometime soon, here is your wake up call. Please don’t get suckered into these kinds of deals – the only person that benefits from all the gruntwork you put in is the site owner themselves.

As a matter of fact, the above message is hosted elsewhere, at elite-slots(dot)com/chips(dot)html. That domain also has an “offer” for another Facebook application, located at elite-slots(dot)com/treasure(dot)html.

FB chips
Click to Enlarge

How many people shared this one?

Fb chips

Yes, that does say 16,000.

Worse, after clicking through to get my hands on the “reward”, I was dumped at another URL, shikoshlir(dot)com/facebook.

Fb chips
Click to Enlarge

Anyone entering their login information will be taken to a .php page hosted at the same site – we reported all of the above sites to Facebook, and all of them including the Login page have quickly been suspended and taken offline. If you or your friends have encountered Facebook logins related free prize websites, you may want to change your login details to be on the safe side.

I doubt we’ve seen the last of this one…

Christopher Boyd

TWot Bot attempts a headshot

The last few weeks, discussions have been bouncing around IRC in relation to a “guaranteed Twitter headshot”. While the downloads linked to were protected by a Sharecash gateway (think “useless survey”), it wasn’t too hard to find a version uploaded elsewhere. Depending on the mood of the individual controlling the infection file, you’ll either fall victim to a random annoyance or a few hours of face punching horror. Shall we take a look?

Presenting…the TWot Bot Builder.

Twotbot
Click to Enlarge

As you can see, these days it’s all about the Twitter. “TWot Bot” consists of a very straightforward builder that lets you enter your Twitter name, then hit the Create button. You’ll end up with a file called “Server.exe”, which contains the Twitter username you entered into the builder.

The file is sent to the victim(s), and assuming they run the executable the attacker simply has to fire up their Twitter account and send some instructions to the compromised PC.

Server.exe accepts just two commands – “Shutdown” and “Destroy”.

code

As you’ve probably guessed, Shutdown attempts to shutdown the PC. Destroy is rather nasty, attempting to delete the file hal.dll.

You don’t want to delete hal.dll.

If you don’t have a recovery CD, it could be a bit of a pain to get hold of your data and put it somewhere safe (you do have backups, right?)

Curiously, the infection file lists both your Twitter Username and one seemingly inactive Chinese account. While this account could theoretically take control of every infected machine, it is still sitting around doing nothing – not that I’m complaining!

Shall we take a look at detections? The infection file comes up as 5/42 on VirusTotal, which unfortunately is a bit on the low side. The Builder program shows as 1/42 (that would be us), so if you have someone playing around with it on your network it’ll be stomped into the ground. Keep your eyes peeled for Backdoor.Win32.Twotbot.A!

Christopher Boyd

Microsoft: drive-by Trojan preying on out-of-date Java installations

A piece by Marian Radu on Microsoft’s Technet Blog is warning that users who have failed to update the Java Runtime Environment (JRE) on their machines are vulnerable to drive-by downloads by a Trojan called Unruy. That Trojan has been associated with rogue security products. Radu said the vulnerability (which was patched in March) is being actively exploited.

Browsers running JRE versions up to version 6 update 18 are vulnerable. The current JRE version today is version 6, update 21.

Microsoft Technet blog piece here: “Unruy downloader uses CVE-2010-0094 Java vulnerability”

 Users can easily check their version of Java and download necessary updates here: http://www.java.com/en/download/manual.jsp

JavaUpdate_1

Tom Kelchner

 

Blogging: what do you call the bad guys?

How about “ass hats”

Yesterday in a computer security blog piece (which was taken down overnight), a writer referred to the person who launched malicious code as an “ass hat.” I kind of liked that. It’s a bit opinionated, but probably sums up what everybody thinks of them.

Every security writer struggles with the problem of what to call the “bad guys.” The struggle reflects the very wide and massively complicated field we work in. “Bad guys” is imprecise and informal, though. There are a lot of flavors of “bad guys.”

“Criminals” seems to cut through a lot of the linguistic haze. In a string search through all my blog pieces since 2009, I see that I’ve used that more than any other word. “Bad guys” came in second and “malicious operator” third.

The “white hat/black hat” distinction is useful in big, generalized discussions of computer security issues too. It captures the strange boundary that exists between activities like penetration testing and hacking a system for theft or malicious purposes. They both involve pretty much the same skill set and same work.

Another good phrase that’s useful in discussions of the big picture is “the dark side.” That’s got great Gnostic, philosophical sound to it. If the criminals are the “dark side” that means those of us in the security community are fighting on the side of “the forces of light.” (We need tee shirts!)

“Malcode writer/distributor” is a good, precise handle for people who do that. Malcode writing kits have been around for a while and the specialization in the world of organized crime, however, mean that the one distributing malcode may not be the one who created it.

“Botnet operator” describes people who run botnets. Again, they may or may not be the actual people who write the malicious bot code since crime-ware kits can automate that.

“Malicious operator” isn’t that great, but, hey, you have to call them something and sometimes nothing else really works.

“Spammers” are, well, the original ass hats in most people’s thinking. Again, they’re specialized, although there’s a cross-over with “botnet operators.”

A former colleague of mine, who began his career as an Army security officer, often used “miscreant” and “actor.” Both are great English words, but they seem a bit formal.

“Intruder” works when you’re talking about somebody exploiting vulnerabilities and running code on somebody else’s machine or downloading data from a poorly secured network or machine. “Intruder” also sidesteps the huge controversy over the word “hacker,” which you simply can’t use any more.

“Hacker” is waaaaay too loaded to use in any circumstance. It began life years ago with a wonderful idealistic, romantic aura. For a while, “hackers” were smart, clever and tireless young explorers who tracked down the arcane details of those new computers. Every kid who learned Basic wanted to be one. There were movies that portrayed them as picaresque heroes, bringing down the hostile alien space craft by hacking its network (which inferred 1. bad password security even in outer space and 2. a strange compatibility between Mac laptops and the AlienOS.)

That romantic image crashed suddenly. I remember the day when the above-mentioned colleague, wrote about the discovery that “hackers” were working with organized crime groups, largely in Eastern Europe, to make money. He wrote something like “hacking is no longer for fun, it’s for money. Hacker = criminal. Get over it.” It was a sad end-of-innocence moment but a lot of people want to cling to that romantic image. So, it’s best to simply not use the word.

Decent kids interested in computer security and on their way to CISSP certifications are still “hacking” of course, but the name was tarnished beyond all recognition. We can just hope that more join the forces of light than join the forces of darkness.

Tom Kelchner

Feds will not bring charges in Pa. school webcam spying case

Philadelphia news radio station KYW is reporting that U.S. Attorney Zane Memeger has announced that no federal criminal charges will be brought against officials of the Lower Merion School District near Philadelphia in Pennsylvania, in a much discussed webcam spying investigation.

The FBI investigated after it was revealed that district personnel had switched on the web cams on school-issued laptop computers and took tens of thousands of webcam images of students in their homes.

The district used the remote management capability to track down lost and stolen computers. In earlier stories it was reported that investigators found that in many cases, the district IT personnel neglected to turn the monitoring system off and the system stored tens of thousands of webcam photos. There was no record that anyone had ever viewed the stored photos, they said.

Two lawsuits have been brought against the district in connection with the webcam recordings.

Story here: “No Federal Charges in Lower Merion “Spycams” Case”

We reported on this on the Sunbelt blog here “Lower Merion spyware case: details emerge”

And here: “FBI will investigate Pa. school district webcam spying”

Tom Kelchner

The bad guys are going after the Pirates

File-sharing organization Pirate Bay has been controversial for a long time, like maybe the length of its entire existence. It’s been in the news recently because a number of governments are trying to shut it down. That’s a situation ripe for social engineering.

Our analyst Matthew Mesa found this scheme this morning: a number of typo-squatting sites carrying the following. (Note: the REAL Pirate Bay site is thepiratebay.org.) What would lead a victim to this? The phony site piratebay.com (below) comes up as the third result on a Google search for “piratebay” or fourth for “pirate bay.”

PirateBayFake_1
(click to enlarge)

The phony sites we found were:

http://htepiratebay.org/
http://piatebay.org/
http://www.piratesbay.org/
http://piratesbay.com/
http://piratebay.com/
http://thepriatebay.org/
http://thpiratebay.org/
http://thepiratesbay.org/
http://thepirateby.org/
http://www.thepiratbay.org/
http://videobay.com/
http://piratebay.com/

OK, we thought we see click the download button (kids, don’t try this at home) and see if the software really is “. . . safe and keeps me protected.”

PirateBayFake_AdwareAlert

(Click to enlarge)

Short answer: “no.”

It tries to download a file called “eMuleSetup.exe” from a site registered to Hotbar, Inc. VIPRE detects it as “Pinball Corporation. (v)”

The real Pirate Bay site is NOT posting any warnings.

RealPirateBay

Thanks Matthew and Adam.

Tom Kelchner

Imitation: the worst form of flattery

In the last week or so, an interesting situation has popped up in console land as scammers continue to exploit trusted names in the gaming industry.

A video for the multiplayer of upcoming title “Call of Duty: Black Ops” displayed ingame footage, and (of course) the usernames of the developers taking part.

Where this gets interesting is that the footage itself isn’t from the XBox Live network – it takes place on something called PartnerNet, which is where Betas are usually tested. As PartnerNet stands alone from XBox Live (in the sense that it is a Developer only network, not taking place on the “main” XBox Live network) you can create any username you want while playing the game even if that name has been registered by another user on XBox Live.

The flipside is that any usernames seen in a video such as the one above may not exist yet on XBox Live, and so could be registered by a scammer to do bad deeds.

You can see where this is going, right?

Reports started to spring up that an individual using a name from the above video (“DJVahn”) was now on XBox Live claiming to be a Treyarch developer. From the forum posts we’ve seen, it appears they were offering up “Beta access” in return for Paypal funds. Checking out the DJVahn account on XBox Live shows it is now flagged as being in Code of Conduct violation:

gamertag

This isn’t the first time game developers have been impersonated on XBox Live, and it won’t be the last. NEVER hand over login details to anyone you encounter in gaming sessions, or through random messages sent your way. Information displayed on profiles can be tampered with, scammers have found ways to change gamertags in gaming sessions and phishes sent by direct message are as popular as ever.

Christopher Boyd

soooooo whats up dude?

WoW account login phishing blitz, that’s what!

An avid World of Warcraft player we know has been the target of a phishing attack that’s turned into a blitz krieg – 28 phishing emails in two days. All of them trying to appear as though they were from “The World of Warcraft Support Team Blizzard Entertainment”

Blizzard phish

(click to enlarge)

Links in the emails (which are different than the URL’s displayed in the text) lead to a site obviously intended to steal passwords (see our earlier blog piece “Battle Net password troll campaign (in Engrish)”)

BattleNetPhish

(click to enlarge)
The 20 URLs we checked:

— were set up between June 6 through August 12
— appeared to have been set up by as many as 14 people (similar types of  contact and address data)
— were registered in China (16), India (2), none given (1) and Pompano Beach, Fla.

All ending with “soooooo whats up dude?”

WoW players should be aware there is a serious campaign on to steal their login information and should be especially aware of the URLs in emails that appear to be from Blizzard Entertainment.  Hold the mouse cursor over any URLs in an e-mail and check the REAL URL in the status bar at the bottom of the screen. To further check, do a who-is check (http://whois.domaintools.com/) of the domain name (see list below for some phony ones.)

AUTHENTIC Blizzard Entertainment URLs:
battle.net
us.battle.net
worldofwarcraft.com
worldofwarcraft.worldofwarcraft.com
us.blizzard.com

Registrant: Blizzard Entertainment
   PO Box 18979
   Irvine, CA 92623-8979
   US

Phony look-alike URLs we’ve seen include:

blizzard-wowaccount-battle.net
battle-blizzard-battle.net
blizzard-wowadmin-battle.net
wowbattle-review.com
eu.blizzard.restoreaccess.us
us.blizzard.accountsecurity.us
battrlie.net
us.braittle.net
wowaccount-survey.com
us-battlewowaccounte.net
batt1e.org
battle-wow-battle.net
us.support.blizzard.accountsecurity.eu
wowbattle-automatic-detection.com
wowbattle-group.com
wow-world.battle-account.info
blizzard-wowlogin-battle.net
beta-cataclysmbeta-blizzard.net
wow-battle-cataclysmbeta.com
wow-battle-cataclysmbeta.net

Example of look-alike URL: batt1e.org (note the number one is used for an “L”)

Domain Name:BATT1E.ORG
Created On:11-Jul-2010 15:26:50 UTC
Last Updated On:05-Aug-2010 07:15:07 UTC
Expiration Date:11-Jul-2011 15:26:50 UTC
Sponsoring Registrar:Jiangsu Bangning Science and technology Co. Ltd. (R1829-LROR)
Status:CLIENT HOLD
Status:TRANSFER PROHIBITED
Registrant ID:a73d9472-d793-4
Registrant Name:meilixu
Registrant Organization:xumeili
Registrant Street1:heilongjiang
Registrant Street2:
Registrant Street3:
Registrant City:heilongjiang
Registrant State/Province:heilongjiang
Registrant Postal Code:161000
Registrant Country:CN

Thanks Wendy, Thanks Douglas.

Tom Kelchner

My “friend” has invited me “to Twitter!”

Month-old W32.Ackantta.F@mm still circulating as email attachment

“What are you doing?
“To join or to see who invited you, check the attachment.”

Twitter_invite_1

Hmmm. That looked interesting. After I clicked on it (in virtual environment), Yahoo renamed the attachment from “Invitation+Card.zip” to “Neutral.gif” and gave a warning:

Yahoo detection

Nice work Yahoo.

VIPRE detects it as W32.Ackantta.F@mm — a generic worm detection.

Tom Kelchner

Apple pushes iOS 4.0.2 update for iPhone and iPod touch

Apple has updated the iOS on iPhones and iPods through its iTunes service to fix two vulnerabilities, including the widely discussed .pdf security problem that made headlines earlier this month.

That hole (CVE-2010-1797) made it possible for a malicious PDF document with specially crafted embedded fonts to execute code on the devices. This was the same vulnerability that enabled a web site (jailbreakme.com) to jail break iPhones – a story that also made the news recently.

The patch also fixes a second weakness (CVE-2010-2973), which is in the handling of IOSurface properties that could allow an intruder to run malicious code as the user and get system privileges.

Update notice on Apple Support page here.

Tom Kelchner

Fake MSRT “suggests” you purchase a rogue

Rogue deception techniques continue to evolve

The unpleasant folks who make their living selling useless rogue security products continue to refine their techniques for deception.

The latest imitator is a new variant of the Fake Microsoft Software Removal Tool rogue that is popping up these days (literally) recommending that users purchase “Shield EC AV.”

FakeMSRT
(click to enlarge)

(graphic credit sUBs @ MR)

On the ShieldEC Antivirus purchase page, we even find a mono-color imitation of Microsoft’s Windows “flag” logo:

ShieldEC
(click to enlarge)

Vipre detects the threat as Trojan.Win32.Generic!BT

In two years, we’ve seen the rogue creators move from a simple “technical” look of their graphic interfaces and purchase web sites to imitations of anti-virus products then on to the names and looks of more technical security applications.

The first rogues: create an official aura

Their first “demographic” seemed to be inexperienced Internet users who had heard about anti-virus products, but weren’t really that checked out on them (and certainly hadn’t purchased one.) The first rogues had names like Astrum Antivirus Pro (Dec. 2008), MalwareBell (Jan. 2009) and XP-Police Antivirus  (Jan. 2009). They projected an image of “anti-virus – security – very technical.”

Wave two: imitate the name or look of legitimate AV products

Soon, however, knowledge of the rogue security product phenomena became widespread and the rogue makers began naming their creations after legitimate anti-virus products in order to fool Internet users who might know a bit about security products:

Antivirus360 (Jan. 2010) was obviously an attempt to confuse a victim with Norton 360, Symantec’s popular anti-virus product.

A rogue that surfaced in February, named “Security Anti-Virus Suite” extensively plagiarized the umbrella logo and look of the web site of the legitimate Avira anti-virus product

In May, a rogue that called itself ByteDefender” was obviously picking up on the name of the legitimate product “BitDefender” .

Wave three: imitate the name and look of security tools used by administrators

The latest twist to the rogue GUI “look and feel” is an imitation of the names and design of more sophisticated security applications – those that might be used by system administrators or IT professionals. Home users, even knowledgeable ones, probably wouldn’t be familiar with these.

Last week we blogged about a rogue that called itself “Wireshark Antivirus.”
That’s clearly an attempt to confuse a victim who might do a Web search to check on the legitimacy of what is before him. Wireshark is a popular network analysis tool.

In June, Microsoft posted information about a rogue “SysInternals Antivirus” which obviously is trying to suck reputation from Microsoft’s SysInternals security suite.

Thanks Bharath.

Tom Kelchner

 

Battle Net password troll campaign (in Engrish)

Scammers who don’t appear to be native speakers of English, are trolling for Battle.net passwords with a spam campaign. The spam emails contain messages that appear to be invitations to an “event.”

Battle.net is Blizzard Entertainment’s online service on which vast numbers of members play Starcraft and World of Warcraft. These are games in which characters have teeth like 400 pound Shih Tzus, VERY improbably hair styles and weapons that make top-level Pentagon officials salivate. Blizzard has been saying World of Warcraft has “more than 11 million” monthly subscribers for about two years now.

BraittleNet spam
(click to enlarge)

“Blizzard billing Cataclysm will support in the near future, thanks for users of Blizzard, we have an event as long as you participate in the opportunity to participate in the Cataclysm CDKEY use Activation, you use the following link to obtain the user login…”

Ok. Well, that isn’t the way you use commas in real English (or words either), but we’ll follow the link anyway. (Kids, don’t try this at home.)

Braittle_net
(click to enlarge)

Ah yes, just a few letters off from the real thing:

Battle_net
(click to enlarge)

And the phony Battle.net site domain was set up when? Oh! Today!

Whois Record

Registrant Contact:
Ji XiaoWei
xiaowei ji
+86.5787245132 fax: +86.5787245132
LiShui Dengtalu 25
LiShui Zhejiang 323700
cn
. . .
DNS:
ns1.4everdns.com
ns2.4everdns.com
Created: 2010-08-11
Expires: 2011-08-11

A spam troll using a similar site using “battrlie.net” was blacklisted several days ago.

Domain name: battrlie.net

Registrant Contact:
Ji XiaoWei
xiaowei ji
+86.5787245132 fax: +86.5787245132
LiShui Dengtalu 25
LiShui Zhejiang 323700
cn

. . .

DNS:
ns1.4everdns.com
ns2.4everdns.com

Created: 2010-08-06
Expires: 2011-08-06

And if you don’t have a real Battle.net account, the “create account” button on the phony site takes you to the REAL Battle.net site so you can set up a REAL account and THEN the scammers can steal it.

Thanks Douglas. Thanks Wendy.

Tom Kelchner

Battle Net password troll campaign (in Engrish)

Scammers who don’t appear to be native speakers of English, are trolling for Battle.net passwords with a spam campaign. The spam emails contain messages that appear to be invitations to an “event.”

Battle.net is Blizzard Entertainment’s online service on which vast numbers of members play Starcraft and World of Warcraft. These are games in which characters have teeth like 400 pound Shih Tzus, VERY improbably hair styles and weapons that make top-level Pentagon officials salivate. Blizzard has been saying World of Warcraft has “more than 11 million” monthly subscribers for about two years now.

BraittleNet spam
(click to enlarge)

“Blizzard billing Cataclysm will support in the near future, thanks for users of Blizzard, we have an event as long as you participate in the opportunity to participate in the Cataclysm CDKEY use Activation, you use the following link to obtain the user login…”

Ok. Well, that isn’t the way you use commas in real English (or words either), but we’ll follow the link anyway. (Kids, don’t try this at home.)

Braittle_net
(click to enlarge)

Ah yes, just a few letters off from the real thing:

Battle_net
(click to enlarge)

And the phony Battle.net site domain was set up when? Oh! Today!

Whois Record

Registrant Contact:
Ji XiaoWei
xiaowei ji
+86.5787245132 fax: +86.5787245132
LiShui Dengtalu 25
LiShui Zhejiang 323700
cn
. . .
DNS:
ns1.4everdns.com
ns2.4everdns.com
Created: 2010-08-11
Expires: 2011-08-11

A spam troll using a similar site using “battrlie.net” was blacklisted several days ago.

Domain name: battrlie.net

Registrant Contact:
Ji XiaoWei
xiaowei ji
+86.5787245132 fax: +86.5787245132
LiShui Dengtalu 25
LiShui Zhejiang 323700
cn

. . .

DNS:
ns1.4everdns.com
ns2.4everdns.com

Created: 2010-08-06
Expires: 2011-08-06

And if you don’t have a real Battle.net account, the “create account” button on the phony site takes you to the REAL Battle.net site so you can set up a REAL account and THEN the scammers can steal it.

Thanks Douglas. Thanks Wendy.

Tom Kelchner