{"id":13200,"date":"2018-08-25T16:17:02","date_gmt":"2018-08-26T00:17:02","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2018\/08\/25\/news-6967\/"},"modified":"2018-08-25T16:17:02","modified_gmt":"2018-08-26T00:17:02","slug":"news-6967","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/08\/25\/news-6967\/","title":{"rendered":"Who&#8217;s Behind the Screencam Extortion Scam?"},"content":{"rendered":"<p><strong>Credit to Author: BrianKrebs| Date: Sat, 25 Aug 2018 23:35:40 +0000<\/strong><\/p>\n<p>The <a href=\"https:\/\/krebsonsecurity.com\/2018\/07\/sextortion-scam-uses-recipients-hacked-passwords\/\" target=\"_blank\" rel=\"noopener\">sextortion email scam last month<\/a> that invoked a real password used by each recipient and threatened to release embarrassing Webcam videos almost certainly was not the work of one criminal or even one group of criminals. Rather, it&#8217;s likely that additional spammers and scammers piled on with their own versions of the phishing email after noticing that some recipients were actually paying up. The truth is we may never find out who&#8217;s responsible, but it&#8217;s still fun to follow some promising early leads and see where they take us.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-44412\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2018\/07\/sextortion.png\" alt=\"\" width=\"520\" height=\"93\" \/><\/p>\n<p>On Aug. 7, 2018 &#8212; <em>five days<\/em> before <a href=\"https:\/\/krebsonsecurity.com\/2018\/07\/sextortion-scam-uses-recipients-hacked-passwords\/\" target=\"_blank\" rel=\"noopener\">my story about the sextortion scam innovation<\/a> went viral &#8212; a user <a href=\"https:\/\/www.hmailserver.com\/forum\/viewtopic.php?f=7&amp;p=205651\" target=\"_blank\" rel=\"noopener\">on the forum of free email service hMailServer<\/a> posted a copy of the sextortion email he received, noting that it included a password he&#8217;d formerly used online.<\/p>\n<p>Helpfully, this user pasted a great deal of information from the spam email message, including the domain name from which it was sent (<strong>williehowell-dot-com<\/strong>) and the Internet address of the server that sent the message (46.161.42.91).<\/p>\n<p>A look at the other domain names registered to this IP address block 46.161.42.x reveals some interesting patterns:<\/p>\n<p>46.161.42.51 mail25.uscourtsgov[.]com<br \/> 46.161.42.52 mail24.uscourtsgov[.]com<br \/> 46.161.42.53 mail23.uscourtsgov[.]com<br \/> 46.161.42.54 mail22.uscourtsgov[.]com<br \/> 46.161.42.55 mail21.uscourtsgov[.]com<br \/> 46.161.42.56 mail20.uscourtsgov[.]com<br \/> 46.161.42.57 mail19.uscourtsgov[.]com<br \/> 46.161.42.58 mail18.uscourtsgov[.]com<br \/> 46.161.42.59 mail17.uscourtsgov[.]com<br \/> 46.161.42.60 mail16.uscourtsgov[.]com<br \/> 46.161.42.61 mail15.uscourtsgov[.]com<br \/> 46.161.42.62 mail14.uscourtsgov[.]com<br \/> 46.161.42.63 mail13.uscourtsgov[.]com<br \/> 46.161.42.64 mail12.uscourtsgov[.]com<br \/> 46.161.42.65 mail11.uscourtsgov[.]com<br \/> 46.161.42.66 mail10.uscourtsgov[.]com<br \/> 46.161.42.67 mail9.uscourtsgov[.]com<br \/> 46.161.42.68 mail8.uscourtsgov[.]com<br \/> 46.161.42.69 mail7.uscourtsgov[.]com<br \/> 46.161.42.70 mail6.uscourtsgov[.]com<br \/> 46.161.42.71 mail5.uscourtsgov[.]com<br \/> 46.161.42.72 mail4.uscourtsgov[.]com<br \/> 46.161.42.73 mail3.uscourtsgov[.]com<br \/> 46.161.42.74 mail2.uscourtsgov[.]com<br \/> 46.161.42.75 mail1.uscourtsgov[.]com<br \/> 46.161.42.76 mail[.]commarysmith[.]com<br \/> 46.161.42.77 mail.joancooper[.]com<br \/> 46.161.42.78 mail.florencewoods[.]com<br \/> 46.161.42.79 mail.ednawest[.]com<br \/> 46.161.42.80 mail.ethelwebb[.]com<br \/> 46.161.42.81 mail.eleanorhunt[.]com<br \/> 46.161.42.82 mail.sallypierce[.]com<br \/> 46.161.42.83 mail.reginaberry[.]com<br \/> 46.161.42.84 mail.junecarroll[.]com<br \/> 46.161.42.85 mail.robertaharper[.]com<br \/> 46.161.42.86 mail.reneelane[.]com<br \/> 46.161.42.87 mail.almaaustin[.]com<br \/> 46.161.42.88 mail.elsiekelley[.]com<br \/> 46.161.42.89 mail.vickifields[.]com<br \/> 46.161.42.90 mail.ellaoliver[.]com<br \/> 46.161.42.91 mail.williehowell[.]com<br \/> 46.161.42.92 mail.veramccoy[.]com<br \/> 46.161.42.93 mail.agnesbishop[.]com<br \/> 46.161.42.94 mail.tanyagilbert[.]com<br \/> 46.161.42.95 mail.mattiehoffman[.]com<br \/> 46.161.42.96 mail.hildahopkins[.]com<br \/> 46.161.42.97 beckymiles[.]com<br \/> 46.161.42.98 mail.fayenorris[.]com<br \/> 46.161.42.99 mail.joannaleonard[.]com<br \/> 46.161.42.100 mail.rosieweber[.]com<br \/> 46.161.42.101 mail.candicemanning[.]com<br \/> 46.161.42.102 mail.sherirowe[.]com<br \/> 46.161.42.103 mail.leticiagoodman[.]com<br \/> 46.161.42.104 mail.myrafrancis[.]com<br \/> 46.161.42.105 mail.jasminemaxwell[.]com<br \/> 46.161.42.106 mail.eloisefrench[.]com<\/p>\n<p>Search Google for\u00a0<a href=\"https:\/\/scamwarners.com\/forum\/viewtopic.php?f=9&amp;p=371314\" target=\"_blank\" rel=\"noopener\">any of those two-name domains above<\/a> (e.g., fayenorris-dot-com) and you&#8217;ll see virtually all of them were used in these sextortion emails, and most were registered at the end of May 2018 through domain registrar <strong>Namecheap<\/strong>.<\/p>\n<p>Notice the preponderance of the domain <strong>uscourtsgov-dot-com <\/strong>in the list above. <em>All of those two-name domains used <a href=\"https:\/\/www.geeksforgeeks.org\/dns-domain-name-server\/\" target=\"_blank\" rel=\"noopener\">domain name servers<\/a> (DNS servers) from uscourtsgov-dot-com at the time these emails were sent<\/em>. In early June 2018, uscourtsgov-dot-com was associated with <a href=\"https:\/\/blog.comodo.com\/pc-security\/subpoena-new-variant-of-sigma-ransomware\/\" target=\"_blank\" rel=\"noopener\">a Sigma ransomware scam delivered via spam<\/a>.\u00a0Victims who wanted their files back had to pay a bitcoin ransom.<\/p>\n<p>In the months just before either the password-laced sextortion scam or the uscourtsgov-dot-com ransomware scam, uscourtsgov-com was devoid of content, aside from a message promoting the spamming services of the web site <strong>mtaexpert-dot-info<\/strong>. Uscourtsgov-dot-com is now offline, but it was active as of two weeks ago. Here&#8217;s what its homepage looked like:<\/p>\n<div id=\"attachment_44828\" style=\"width: 605px\" class=\"wp-caption aligncenter\"><a class=\"lightbox\" href=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2018\/08\/uscourtsgov4-18.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-44828\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2018\/08\/uscourtsgov4-18.png\" alt=\"\" width=\"595\" height=\"97\" \/><\/a><\/p>\n<p class=\"wp-caption-text\">The domain uscourtsgov-dot-com was redirecting visitors to mtaexpert-dot-info for many months up to and including the sextortion email campaign. Image: Domaintools.com<\/p>\n<\/div>\n<p>Interestingly, this same message promoting mtaexpert-dot-info appeared on the homepages of many other two-name domain names mentioned above (including fayenorris-dot-com):<\/p>\n<div id=\"attachment_44830\" style=\"width: 603px\" class=\"wp-caption aligncenter\"><a class=\"lightbox\" href=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2018\/08\/fayenorris.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-44830\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2018\/08\/fayenorris.png\" alt=\"\" width=\"593\" height=\"60\" \/><\/a><\/p>\n<p class=\"wp-caption-text\">Like uscourtsgov-dot-com, Fayenorris-dot-com also urged visitors to go to mtaexpert-dot-info.<\/p>\n<\/div>\n<p><span id=\"more-44825\"><\/span>In the email delivery space, MTA stands for mail transfer agent, and this MTA Expert company is essentially an anonymous spamming service. The screen shot below is from an Internet Archive <a href=\"https:\/\/web.archive.org\/web\/20180212055137\/http:\/\/www.mtaexpert.info:80\/\" target=\"_blank\" rel=\"noopener\">cached copy of mtaexpert-dot-info<\/a>:<\/p>\n<div id=\"attachment_44829\" style=\"width: 604px\" class=\"wp-caption aligncenter\"><a class=\"lightbox\" href=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2018\/08\/mtaexpert.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-44829\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2018\/08\/mtaexpert.png\" alt=\"\" width=\"594\" height=\"218\" \/><\/a><\/p>\n<p class=\"wp-caption-text\">Mtaexpert-dot-info, as it appeared in Feb 2018. Source: Archive.org.<\/p>\n<\/div>\n<p>Mtaexpert-dot-info doesn&#8217;t disclose who owns the site, and current WHOIS registration records for the domain are obscured by privacy services. But thanks to a historic WHOIS record lookup at <a href=\"https:\/\/www.domaintools.com\" target=\"_blank\" rel=\"noopener\">Domaintools.com<\/a> [full disclosure: Domaintools is an advertiser on this site], we can see that for about a week in May 2018 the WHOIS privacy veil briefly dropped off and revealed the following record:<\/p>\n<p>Registrant Name: HICHAM AALLAM<br \/> Registrant Organization: investissonsorg<br \/> Registrant Street: RED ANASS BLOC 26 N 3 ROUTE DE TETOUANE<br \/> Registrant City: TANGER<br \/> Registrant State\/Province: Tanger-Tetouan<br \/> Registrant Postal Code: 90001<br \/> Registrant Country: MA<br \/> Registrant Phone: +212.626280317<br \/> Registrant Phone Ext:<br \/> Registrant Fax:<br \/> Registrant Fax Ext:<br \/> Registrant Email: hicham.aallam60@gmail.com<\/p>\n<p>Who is <strong>Hicham Aallam<\/strong>? According to <a href=\"https:\/\/www.linkedin.com\/in\/hicham-aallam-264271a7\/\" target=\"_blank\" rel=\"noopener\">his LinkedIn page<\/a>, he is an email marketer living in Morocco and working for a company called <strong>Active Sun Network<\/strong>. His resume says he also works for <strong>AdGenics<\/strong>, which according to anti-spam group <a href=\"https:\/\/en.wikipedia.org\/wiki\/The_Spamhaus_Project\" target=\"_blank\" rel=\"noopener\">Spamhaus<\/a> is a well-known spamming operation with a long, sordid history. AdGenics, a.k.a. <strong>Cabo Networks<\/strong> a.k.a <strong>SIFT Logic<\/strong>, is <a href=\"https:\/\/www.spamhaus.org\/rokso\/evidence\/ROK10200\/adgenics-cabo-networks\/main-info\" target=\"_blank\" rel=\"noopener\">currently Number Six<\/a> on Spamhaus&#8217; <a href=\"https:\/\/www.spamhaus.org\/statistics\/spammers\/\" target=\"_blank\" rel=\"noopener\">Top Ten Worst Spammers list.<\/a><\/p>\n<p>Contacted via LinkedIn, Aallam said he was unaware that his email service was used in the either the sextortion or ransomware campaigns linked to the above-mentioned domains. He said an ad for Mtaexpert-dot-info automatically gets shown on the home page of any site that is configured to use his email-sending scripts.<\/p>\n<p>Aallam says he charges customers to use these scripts, but that he only had one semi-recent customer: A person who contacted him using the Skype name &#8220;brian.ortega_4&#8221; paid roughly $250 worth of the cryptocurrency <strong>Ethereum<\/strong> (ETH) on Apr. 3, 2018 for a license to MTA Experts&#8217; mailing script. <a href=\"https:\/\/etherscan.io\/tx\/0x49bd964caa6cce2049785fe51118323d2e7881a937211f5672322e4a68f53f38\" target=\"_blank\" rel=\"noopener\">Here is a record of that transaction<\/a>. All of the ETH transactions attributed to and from that account can be seen <a href=\"https:\/\/etherscan.io\/txs?a=0x2e30c1cc487b7de18784fec20c1190920e92ce63\" target=\"_blank\" rel=\"noopener\">here<\/a>.<\/p>\n<p>Okay, so we still might not know who&#8217;s responsible for sending some of these sextortion emails, and it could well be one of Aallam&#8217;s other clients behind these two schemes. Nevertheless, it&#8217;s always fascinating to see how far one can get just by following a few breadcrumbs.<\/p>\n<p>One final breadcrumb to follow: The Internet address space occupied by the uscourtsgov-dot-com and the sextortion-related domains &#8212; 46.161.42.0\/24. In May 2018, <strong>RiskIQ<\/strong> published <a href=\"https:\/\/cdn.riskiq.com\/wp-content\/uploads\/2018\/05\/MEWKit-Cryptotheft-Newest-Weapon-RiskIQ-Research.pdf\" target=\"_blank\" rel=\"noopener\">a detailed report<\/a>\u00a0(PDF)\u00a0about a complex phishing scheme that used <a href=\"https:\/\/mailman.nanog.org\/pipermail\/nanog\/2018-April\/095105.html\" target=\"_blank\" rel=\"noopener\">an address adjacent to uscourtsgov-dot-com<\/a> in a bid to steal Ethereum from <a href=\"https:\/\/www.myetherwallet.com\/\" target=\"_blank\" rel=\"noopener\">MyEtherWallet<\/a> users.<\/p>\n<p>The registered owner of the Internet address space is a &#8220;<strong>Barbarich_Viacheslav_Yuryevich<\/strong>,&#8221; which is the same name as the owner of the network <a href=\"https:\/\/bgp.he.net\/AS41995#_whois\" target=\"_blank\" rel=\"noopener\">AS41995<\/a>, a.k.a. <strong>web-shield-dot-biz<\/strong>. <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-44845\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2018\/08\/webshield.png\" alt=\"\" width=\"598\" height=\"231\" \/><\/p>\n<p>A different block of addresses that we can see in the graphic above assigned to Web-Shield &#8212; 146.185.241.0\/24 &#8212; contains a metric truckload of domains involved in selling stolen credit cards.<\/p>\n<p><a class=\"lightbox\" href=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2018\/08\/websiteshosted.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-44847\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2018\/08\/websiteshosted.png\" alt=\"\" width=\"598\" height=\"281\" \/><\/a><\/p>\n<p>Loyal readers of this site will notice a familiar domain there: <strong>Rescator<\/strong>. It belongs to a seasonsed cybercriminal by the same name who has been <a href=\"https:\/\/krebsonsecurity.com\/2013\/12\/whos-selling-credit-cards-from-target\/\" target=\"_blank\" rel=\"noopener\">closely linked to the Target<\/a> and <a href=\"https:\/\/krebsonsecurity.com\/2015\/05\/deconstructing-the-2014-sally-beauty-breach\/\" target=\"_blank\" rel=\"noopener\">Sally Beauty breaches<\/a>, among many others. To this day &#8212; almost four years after the Target breach &#8212; the home page to Rescator&#8217;s stolen card shop includes a picture of Yours Truly as a postage stamp that reads, &#8220;As advertised by Brian Krebs.&#8221;<\/p>\n<p><a class=\"lightbox\" href=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2018\/08\/rescator.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-44846\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2018\/08\/rescator.png\" alt=\"\" width=\"592\" height=\"227\" \/><\/a><\/p>\n<p>KrebsOnSecurity would like to thank security researcher <a href=\"https:\/\/www.twitter.com\/bad_packets\" target=\"_blank\" rel=\"noopener\">Troy Mursch<\/a> and anti-spam crusader\u00a0<a href=\"https:\/\/krebsonsecurity.com\/tag\/ron-guilmette\/\" target=\"_blank\" rel=\"noopener\">Ron Guilmette<\/a> for their assistance in this research.<\/p>\n<p><a href=\"https:\/\/krebsonsecurity.com\/2018\/08\/whos-behind-the-screencam-extortion-scam\/\" target=\"bwo\" >https:\/\/krebsonsecurity.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2018\/07\/sextortion.png\"\/><\/p>\n<p><strong>Credit to Author: BrianKrebs| Date: Sat, 25 Aug 2018 23:35:40 +0000<\/strong><\/p>\n<p>The sextortion email scam last month that invoked a real password used by each recipient and threatened to release embarrassing Webcam videos almost certainly was not the work of one criminal or even one group of criminals. Rather, it&#8217;s likely that additional spammers and scammers piled on with their own versions of the phishing email after noticing that some recipients were actually paying up. The truth is we may never find out who&#8217;s responsible, but it&#8217;s still fun to follow some promising early leads and see where they take us.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10643,10642],"tags":[16740,19303,19304,19305,16695,19306,19307,19308,11659,12031,19309,11277,19310,19311],"class_list":["post-13200","post","type-post","status-publish","format-standard","hentry","category-independent","category-krebs","tag-a-little-sunshine","tag-active-sun-network","tag-adgenics","tag-barbarich_viacheslav_yuryevich","tag-breadcrumbs","tag-cabo-networks","tag-hicham-aallam","tag-mtaexpert","tag-rescator","tag-ron-guilmette","tag-sift-logic","tag-spamhaus","tag-uscourtsgov","tag-web-shield"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13200","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=13200"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13200\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=13200"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=13200"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=13200"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}