Update 24-Dev-2007: One of the site owner listed below contacted me and asked me to remove their personal information which was contained in the site registration. I complied.
I have not checked whether or not their system is still an attack host. It is very important that people with good intentions protect their systems before placing them on the net. It is generally very hard to do this for windows, and fairly easy to do this for linux. For linux, look at the Firestarter package to make setting up a firewall fairly trivial.
[end of update]
Alrighty. I am sitting here fighting with a now mostly functional diskless SuSE 10.2 installation, when an email arrives. In my spam box. I check that about 4 times a day. Clean it out once a month or so. Usually with 8-9000 spam. Going to have to stop looking at it …
Ok, back to the story. So I get this email. It did something no other spam has done in a while. It got my attention.
Here is a snapshot.
Nice huh? Wakes you up for a second. Note the spelling errors. One would not expect that official US government email would come complete with spelling and grammatical errors. Ok, so the grammar may not be in error, but it is not what one might expect out of a native American english speaker. Nor would one assume that US government email would be used as a vehicle for notification of a legal issue. The US government is wedded to paper. A real issue would arrive via snail mail.
Well, for maybe more than a second, I didn’t know what I was looking at. Racked my brain for all of 10 seconds trying to remember a customer by the name of George Hanson.
Then I thought, well, its likely in my spam box for a reason. Lets go look at the links. No, not clicking the links, look at them.
Before we do, its worth defining a useful operation from mathematics. This operation is called projection. Think of it as the shadow one vector makes on another. A vector could be pencil in this case. A value close to 1 for a set of unit length (e.g. length equals 1) vectors is probably a close match, and they point to very nearly the same thing. A value close to 0 indicates that the vectors point in different directions.
So why am I telling you this?
You can tell whether or not something is a phishing scam by inspection (e.g. looking at it), if you can see if the link in the href aligns with and is the same as or nearly the same as the link in the text. Both are vectors. Both point you somewhere.
In this case, the critical link was indicating in text that it pointed to http://ftc.gov/fraud/complaints/24_oct_2007_george_hanson.doc, but really it pointed to modhgil.com/1maverick//media/…
Hmmm… modhgil.com. Not ftc.gov. They have a projection of about 0.
landman@lightning:~/Desktop$ whois modhgil.com Whois Server Version 2.0 Domain names in the .com and .net domains can now be registered with many different competing registrars. Go to http://www.internic.net for detailed information. Domain Name: MODHGIL.COM Registrar: ENOM, INC. Whois Server: whois.enom.com Referral URL: http://www.enom.com Name Server: NS0.PROVIDER-ONE.NET Name Server: NS1.PROVIDER-ONE.NET Name Server: NS2.PROVIDER-ONE.NET Name Server: NS3.PROVIDER-ONE.NET Status: ok Updated Date: 04-apr-2007 Creation Date: 01-apr-2005 Expiration Date: 01-apr-2009 >>> Last update of whois database: Mon, 29 Oct 2007 22:27:00 UTC < << ... Domain name: modhgil.com Registrant Contact: MODHGIL.COM [deleted at request of site owner] GB
Ok, I am snickering now. I ran over to the FTC's site to see if they had any news of this, and sure enough, on the first page
Don't Open Bogus Email that Claims to Come From the FTC
Email That States It's From the FTC's 'Fraud Department' Has Virus Attached
A bogus email is circulating that says it is from the Federal Trade Commission, referencing a 'complaint' filed with the FTC against the email's recipient. The email includes links and an attachment that download a virus. As with any suspicious email, the FTC warns recipients not to click on links within the email and not to open any attachments.
The spoof email includes a phony sender's address, making it appear the email is from 'firstname.lastname@example.org' and also spoofs the return-path and reply-to fields to hide the email's true origin. While the email includes the FTC seal, it has grammatical errors, misspellings, and incorrect syntax. Recipients should forward the email to email@example.com and then delete it. Emails sent to that address are kept in the FTC's spam database to assist with investigations.
For laughs, lets see if this is a compromised machine.
nmap modhgil.com Starting Nmap 4.20 ( http://insecure.org ) at 2007-10-29 18:29 EDT Interesting ports on p1host5-shared.provider-noc.net (18.104.22.168): Not shown: 1684 filtered ports PORT STATE SERVICE 21/tcp open ftp 22/tcp open ssh 25/tcp open smtp 53/tcp open domain 80/tcp open http 106/tcp open pop3pw 110/tcp open pop3 143/tcp open imap 443/tcp open https 465/tcp open smtps 993/tcp open imaps 995/tcp open pop3s 8443/tcp open https-alt
Well, it looks like someone has a few too many open ports, but it could just be part of the ruse.
The email itself seems to have come from s20.80code.com. This could be forged though. Remember when whois used to give you range information for IPs? Ahhh the good old days. Now we just see this address.
Well, for laughs, lets ping the s20.80code.com. Yup, the IP address maps back into is what is in the mail header.
There is a real web site there. It looks like a real business.
The problem is that the headers may have been forged.
So we know the email is a fraud, took about 10 seconds to figure that out. What did my automated tagging pipeline say (all mails traverse this):
X-Spam-Report: * 5.0 BOGOFILTER Bogosity: bogofilter thinks this mail is crap * 1.5 HTML_IMAGE_ONLY_20 BODY: HTML: images with 1600-2000 bytes of words * 0.0 HTML_MESSAGE BODY: HTML included in message * 0.0 BAYES_50 BODY: Bayesian spam probability is 40 to 60% * [score: 0.5000] * 1.9 MIME_HTML_ONLY BODY: Message only has text/html MIME parts * 1.2 MIME_HEADER_CTYPE_ONLY 'Content-Type' found without required MIME * headers
Yup, I think Bogofilter summed it up nicely.