Source of amusement for a monday evening

Update 24-Dev-2007: One of the site owner listed below contacted me and asked me to remove their personal information which was contained in the site registration. I complied.
I have not checked whether or not their system is still an attack host. It is very important that people with good intentions protect their systems before placing them on the net. It is generally very hard to do this for windows, and fairly easy to do this for linux. For linux, look at the Firestarter package to make setting up a firewall fairly trivial.
[end of update]
Alrighty. I am sitting here fighting with a now mostly functional diskless SuSE 10.2 installation, when an email arrives. In my spam box. I check that about 4 times a day. Clean it out once a month or so. Usually with 8-9000 spam. Going to have to stop looking at it …
Ok, back to the story. So I get this email. It did something no other spam has done in a while. It got my attention.
Here is a snapshot.

Nice huh? Wakes you up for a second. Note the spelling errors. One would not expect that official US government email would come complete with spelling and grammatical errors. Ok, so the grammar may not be in error, but it is not what one might expect out of a native American english speaker. Nor would one assume that US government email would be used as a vehicle for notification of a legal issue. The US government is wedded to paper. A real issue would arrive via snail mail.
Well, for maybe more than a second, I didn’t know what I was looking at. Racked my brain for all of 10 seconds trying to remember a customer by the name of George Hanson.
Then I thought, well, its likely in my spam box for a reason. Lets go look at the links. No, not clicking the links, look at them.
Before we do, its worth defining a useful operation from mathematics. This operation is called projection. Think of it as the shadow one vector makes on another. A vector could be pencil in this case. A value close to 1 for a set of unit length (e.g. length equals 1) vectors is probably a close match, and they point to very nearly the same thing. A value close to 0 indicates that the vectors point in different directions.
So why am I telling you this?
You can tell whether or not something is a phishing scam by inspection (e.g. looking at it), if you can see if the link in the href aligns with and is the same as or nearly the same as the link in the text. Both are vectors. Both point you somewhere.
In this case, the critical link was indicating in text that it pointed to, but really it pointed to…
Hmmm… Not They have a projection of about 0.

landman@lightning:~/Desktop$ whois
Whois Server Version 2.0
Domain names in the .com and .net domains can now be registered
with many different competing registrars. Go to
for detailed information.
   Domain Name: MODHGIL.COM
   Registrar: ENOM, INC.
   Whois Server:
   Referral URL:
   Name Server: NS0.PROVIDER-ONE.NET
   Name Server: NS1.PROVIDER-ONE.NET
   Name Server: NS2.PROVIDER-ONE.NET
   Name Server: NS3.PROVIDER-ONE.NET
   Status: ok
   Updated Date: 04-apr-2007
   Creation Date: 01-apr-2005
   Expiration Date: 01-apr-2009
>>> Last update of whois database: Mon, 29 Oct 2007 22:27:00 UTC < <<
Domain name:
Registrant Contact:
   [deleted at request of site owner]

Ok, I am snickering now. I ran over to the FTC's site to see if they had any news of this, and sure enough, on the first page

Don't Open Bogus Email that Claims to Come From the FTC
Email That States It's From the FTC's 'Fraud Department' Has Virus Attached
A bogus email is circulating that says it is from the Federal Trade Commission, referencing a 'complaint' filed with the FTC against the email's recipient. The email includes links and an attachment that download a virus. As with any suspicious email, the FTC warns recipients not to click on links within the email and not to open any attachments.
The spoof email includes a phony sender's address, making it appear the email is from '' and also spoofs the return-path and reply-to fields to hide the email's true origin. While the email includes the FTC seal, it has grammatical errors, misspellings, and incorrect syntax. Recipients should forward the email to and then delete it. Emails sent to that address are kept in the FTC's spam database to assist with investigations.

For laughs, lets see if this is a compromised machine.

Starting Nmap 4.20 ( ) at 2007-10-29 18:29 EDT
Interesting ports on (
Not shown: 1684 filtered ports
21/tcp   open  ftp
22/tcp   open  ssh
25/tcp   open  smtp
53/tcp   open  domain
80/tcp   open  http
106/tcp  open  pop3pw
110/tcp  open  pop3
143/tcp  open  imap
443/tcp  open  https
465/tcp  open  smtps
993/tcp  open  imaps
995/tcp  open  pop3s
8443/tcp open  https-alt

Well, it looks like someone has a few too many open ports, but it could just be part of the ruse.
The email itself seems to have come from This could be forged though. Remember when whois used to give you range information for IPs? Ahhh the good old days. Now we just see this address.
Well, for laughs, lets ping the Yup, the IP address maps back into is what is in the mail header.
There is a real web site there. It looks like a real business.
The problem is that the headers may have been forged.
So we know the email is a fraud, took about 10 seconds to figure that out. What did my automated tagging pipeline say (all mails traverse this):

	*  5.0 BOGOFILTER Bogosity:  bogofilter thinks this mail is crap
	*  1.5 HTML_IMAGE_ONLY_20 BODY: HTML: images with 1600-2000 bytes of words
	*  0.0 HTML_MESSAGE BODY: HTML included in message
	*  0.0 BAYES_50 BODY: Bayesian spam probability is 40 to 60%
	*      [score: 0.5000]
	*  1.9 MIME_HTML_ONLY BODY: Message only has text/html MIME parts
	*  1.2 MIME_HEADER_CTYPE_ONLY 'Content-Type' found without required MIME
	*      headers

Yup, I think Bogofilter summed it up nicely.

2 thoughts on “Source of amusement for a monday evening”

  1. This site is being listed under a search on my name.
    can you please do me a favor? if you still find that is causing grief online and is compromised, please do let me know. if you think has been sorted out (which I think I have), may i request you to close this post as this shows my personal details (personally identifiable information).
    regards, punit

  2. I removed the personal details. I think the post is certainly still relevant, it shows an attack vector.
    Given the nature of the attempt to defraud us, I am all too happy to expose both the attack and method of attack so that anyone googling for it may in fact find it.
    I do sincerely hope that you were merely an innocent victim, and that your servers were somehow unfortunately compromised. If so, I hope you have locked them down, hard, and they are only serving/transporting content you personally approve of.
    The defrauding attempt was easy to see through, took all of a few seconds of my time to notice most of the problems, and further note that this is not how the government actually works here.
    I will continue to expose all fraud attempts I see against us (ignoring the hundreds of emails I get each day about ebay and related).

Comments are closed.