Author Topic: Fake PayPal site  (Read 2192 times)

0 Members and 1 Guest are viewing this topic.

REDACTED

  • Guest
Fake PayPal site
« on: June 10, 2017, 06:01:23 PM »
I scanned this on VirusTotal, did found something on there as few.
As here: https://virustotal.com/fi/url/2568044e4f8b4026f2e141d554fdb972a3d3a71e4e4b081b369594c9c1a4f2bc/analysis/1497104826/

I saw this on email, as this came today on the mail. As so, here is what i found:



As what i found was a fake email, that was not on blocked email list for some reason, Avast didn't block it, for some reason. Firefox did found that its bad site.
This is when i clicked the link on the email:



I just sending it here to know, that i saw this on now ;D

Offline Asyn

  • Avast Überevangelist
  • Certainly Bot
  • *****
  • Posts: 76035
    • >>>  Avast Forum - Deutschsprachiger Bereich  <<<
Re: Fake PayPal site
« Reply #1 on: June 10, 2017, 06:02:55 PM »
You can report a URL here: https://www.avast.com/report-a-url.php
W8.1 [x64] - Avast Free AV 23.3.8047.BC [UI.757] - Firefox ESR 102.9 [NS/uBO/PB] - Thunderbird 102.9.1
Avast-Tools: Secure Browser 109.0 - Cleanup 23.1 - SecureLine 5.18 - DriverUpdater 23.1 - CCleaner 6.01
Avast Wissenswertes (Downloads, Anleitungen & Infos): https://forum.avast.com/index.php?topic=60523.0

Offline polonus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 33925
  • malware fighter
Re: Fake PayPal site
« Reply #2 on: June 10, 2017, 08:12:55 PM »
Dear BlueCloudy,

Good find, and I will explain to you why. Abused at iodc.dk hoster in Denmark.
See how they wrought it with a free self signed letsencrypt certificate and a nameserver with a self signed one!
and for  unknown AS (actually AS8502) and unknown location (Denmark),
see : http://urlquery.net/report.php?id=1497114416143

alerted as PHISHING from an abusing iodc.dk_Apache server on a provider in Denmark at Hvidovre, Hovedstaden:
http://toolbar.netcraft.com/site_report?url=185.121.173.199

Nameserver brought us this info:
commonName=server.kamubisaja.info & ISC BIND 9.9.4 & DNS:cpanel.dataupdated.me &
Service Info: OS: Red Hat Enterprise Linux 7; CPE: cpe:/o:redhat:enterprise_linux:7
For that nameserver: http://toolbar.netcraft.com/site_report?url=server.kamubisaja.info
Nemeserver has a self-signed certificate installed, which is a big no-no security-wise and otherwise also.
No best practices: Warnings
Root installed on the server.
For best practices, remove the self-signed root from the server.

Evasive organisation working here, because Certificate status:
 Unknown
Revocation check method:
 Not available
Certificate Transparency:
 Not embedded in certificate  Only a serial number given and key size and Algoritm Type.

That's all folks, and it is not cheering us up, name of the game a PHISH and a FRAUD.

polonus (volunteer website security analyst and website error-hunter)
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!

REDACTED

  • Guest
Re: Fake PayPal site
« Reply #3 on: June 10, 2017, 11:21:52 PM »
Alright, thank you polonus! ;)

Offline polonus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 33925
  • malware fighter
Re: Fake PayPal site
« Reply #4 on: June 11, 2017, 01:56:34 AM »
Interesting resources. Anti-Hash - his service allows you to search for collisions to MD5 and SHA1 hashes, and thus restore with some probability hidden phrases. Also, there is an active search for collisions with the help of a small distributed computing network. Already know collisions to 2'939 different hashes are known.

You can enter an MD5 or SHA1 hash to search for their collisions, or vice versa, enter any word or phrase to calculate hashes for it.

See: http://fadedead.org/unhash 

polonus
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!