Malware botnet controller located at 20.226.20.129 on port 80 (using HTTP POST):
hXXp://iofajfioshnguiosfui.from-pa.com/novidades/inspecionando.php
$ dig +short iofajfioshnguiosfui.from-pa.com
20.226.20.129
Referencing malware binaries (MD5 hash):
3030d0b1335357da24960cd99e54ef02 — AV detection: 3 / 59 (5.08)
Malware botnet controller located at 3.83.129.253 on port 4747 TCP:
$ telnet 3.83.129.253 4747
Trying 3.83.129.253…
Connected to 3.83.129.253.
Escape character is ‘^]’
$ nslookup 3.83.129.253
ec2-3-83-129-253.compute-1.amazonaws.com
Referencing malware samples (MD5 hash):
d3b411350e9ef770aeb358856d002cf7 — AV detection: 26 / 70 (37.14%)
Malware botnet controller at 176.9.148.153 on port 443.
$ telnet 176.9.148.153 443
Trying 176.9.148.153…
Connected to 176.9.148.153.
Escape character is ‘^]’
Malicious domains observed at this IP address:
amazinginvezt.org. 60 IN A 176.9.148.153
btc-es.net. 60 IN A 176.9.148.153
btc-es.org. 60 IN A 176.9.148.153
btcbill.net. 60 IN A 176.9.148.153
btcbill.org. 60 IN A 176.9.148.153
crypt-invezt.net. 60 IN A 176.9.148.153
gas-invest.com. 60 IN A 176.9.148.153
gazivest.net. 60 IN A 176.9.148.153
investgas.net. 60 IN A 176.9.148.153
nbk-invest.org. 60 IN A 176.9.148.153
obszhee-delo.org. 60 IN A 176.9.148.153
plan2-live.org. 60 IN A 176.9.148.153
pr-invest.org. 60 IN A 176.9.148.153
success-finance.org. 60 IN A 176.9.148.153
ultra-signals.com. 60 IN A 176.9.148.153
Malware botnet controller located at 192.95.0.200 on port 6768 TCP:
$ telnet 192.95.0.200 6768
Trying 192.95.0.200…
Connected to 192.95.0.200.
Escape character is ‘^]’
$ nslookup 192.95.0.200
ip200.ip-192-95-0.net
Referencing malware samples:
MD5 e47a72f1a4ba1732f4a227f7569215c3
MD5 ea7d9d499457f32afcb7dafe3b3bb81c
ArkeiStealer botnet controller located at 116.202.1.195 on port 80 (using HTTP GET):
hXXp://116.202.1.195/
$ nslookup 116.202.1.195
static.195.1.202.116.clients.your-server.de
Referencing malware binaries (MD5 hash):
ad1b502b6714c0a374b055332018974b — AV detection: 26 / 69 (37.68)
From: aidsmap bulletins <[email protected]>
Subject: aidsmap news: CoronaVac shows weaker response in people with HIV, 19 April 2022
Problem description
============================
Spammers signed up for the bulk email service using the victim’s email address. As a result, the victim is being «listbombed» with transactional messages and bulk email campaigns.
Problem resolution
============================
In order to resolve this spam problem (and have this SBL listing removed), the affected sender must take the folloing actions:
a) Implementing CAPTCHA to prevent automated subscriptions
b) Implementing Confirmed Opt In (COI) if not already done so
c) Clean up their email address list (e.g. sending out a permission pass / COI)
Further reading
============================
Further information can be found on the referenced links below.
Subscription Bombing: COI, CAPTCHA, and the Next Generation of Mail Bombs:
https://www.spamhaus.org/news/article/734/
Mailing Lists -vs- Spam Lists:
https://www.spamhaus.org/whitepapers/mailinglists/
Confirmed Opt In — A Rose by Any Name:
https://www.spamhaus.org/news/article/635
Spamhaus Marketing FAQ:
https://www.spamhaus.org/faq/section/Marketing%20FAQs
DCRat botnet controller located at 82.146.59.136 on port 80 (using HTTP GET):
hXXp://82.146.59.136/_/datalife45/TrackProcessDle/JavascriptUpdateGeneratordlelocal.php
$ nslookup 82.146.59.136
nolove209.fvds.ru
Referencing malware binaries (MD5 hash):
bc43cff296c2977a382f6569ed0db331 — AV detection: 40 / 65 (61.54)
f11f7beeba496e39707fe4bb580c1dd8 — AV detection: 28 / 70 (40.00)
Socelars botnet controller located at 207.180.250.246 on port 80 (using HTTP POST):
hXXp://www.fpsbw.com/
$ dig +short www.fpsbw.com
207.180.250.246
$ nslookup 207.180.250.246
vmi856029.contaboserver.net
Referencing malware binaries (MD5 hash):
d30ce538b6b7734b1bd287a42550674a — AV detection: 51 / 69 (73.91)
Smoke Loader botnet controller located at 95.213.216.204 on port 80 (using HTTP POST):
hXXp://ejeana.co.ug/index.php
ejeana.co.ug. 600 IN A 95.213.216.204
Referencing malware binaries (MD5 hash):
623ef5cd7c56c96132336938466c9c16 — AV detection: 13 / 63 (20.63)
Malware botnet controller at 198.244.224.87 on port 443.
$ telnet 198.244.224.87 443
Trying 198.244.224.87…
Connected to 198.244.224.87.
Escape character is ‘^]’
Malicious domains observed at this IP address:
shibaswapbeax.com. 600 IN A 198.244.224.87
Related malicious domains observed at this IP address:
98.244.224.87|illuviumfiren.com|2022-04-19
198.244.224.87|illuviumpiper.com|2022-04-19
198.244.224.87|illuviumquar.com|2022-04-19
198.244.224.87|illuviumtiru.com|2022-04-19
198.244.224.87|illuviumveiar.com|2022-04-19
198.244.224.87|stepnonli.com|2022-04-19