{"id":5879,"date":"2017-01-18T22:53:22","date_gmt":"2017-01-18T22:53:22","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/01\/18\/news-84\/"},"modified":"2017-01-18T22:53:22","modified_gmt":"2017-01-18T22:53:22","slug":"news-84","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/01\/18\/news-84\/","title":{"rendered":"Tech support scams, stolen data, and botnets"},"content":{"rendered":"<p><em>NOTE: thanks to the Wack0lian for research contributions<\/em><\/p>\n<p>&nbsp;<\/p>\n<p>It would seem that scams as a service are a growth business model.\u00a0<a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2016\/10\/scamming-as-a-service-seriously\/\" target=\"_blank\">Last time<\/a>, we looked at inboundpopaps[.]info, a slick scam in a box designed to get even the most technically illiterate criminals up and running and stealing from you. Today we\u2019ve found something a little more interesting \u2013 a scam in a box company that also offers intelligence leads. That is, they\u2019ll sell you the scam and point you at the most vulnerable targets first.<\/p>\n<p>In July of 2014, someone posting under the name BPO Resources posted the following on an outsourced IT services forum.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-15525\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/11\/bpofirstpost-600x578.png\" alt=\"bpofirstpost\" width=\"600\" height=\"578\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/11\/bpofirstpost-600x578.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/11\/bpofirstpost-300x289.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/11\/bpofirstpost.png 1506w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>Typically tech support callers are noted for not knowing the slightest thing about the people they call, so targeted leads for specific company customers was interesting. Almost identical verbiage appears on bpoexpertsglobal.blogspot.com.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-15526\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/11\/bpositepost-600x381.png\" alt=\"bpositepost\" width=\"600\" height=\"381\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/11\/bpositepost-600x381.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/11\/bpositepost-300x191.png 300w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>This time though, the threat actor also has on offer the personal data of elderly customers of ISPs as well. This was less surprising, as scammers of all sorts prefer to victimize the elderly. Given that this guy appears to be diversifying his crime verticals, what might he be offering more recently? Searching for BPO Experts Global provided a <a href=\"https:\/\/www.youtube.com\/channel\/UC2l1F1DRwnsgR27JAQJRaIQ\" target=\"_blank\">Youtube channel<\/a>\u00a0of the same name where the scammer is kind enough to demonstrate his screen locker that\u2019s currently for sale. (We\u2019ve written about these lockers<a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2016\/05\/tech-support-scammers-using-winlogon\/\" target=\"_blank\"> here<\/a>). If you\u2019ve been hit by this sort of thing, be sure to check out our forums for removal guides. Let\u2019s allow the scammer to speak for himself for a minute:<\/p>\n<div id=\"attachment_15527\" style=\"width: 610px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-15527 size-large\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/11\/BPOlockericon-600x259.png\" alt=\"bpolockericon\" width=\"600\" height=\"259\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/11\/BPOlockericon-600x259.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/11\/BPOlockericon-300x130.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/11\/BPOlockericon-195x85.png 195w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/11\/BPOlockericon.png 796w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p class=\"wp-caption-text\">\u201cthis is the software which I have created\u201d<\/p>\n<\/div>\n<div id=\"attachment_15537\" style=\"width: 610px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-15537 size-large\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/11\/serverrdp-600x285.jpg\" width=\"600\" height=\"285\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/11\/serverrdp-600x285.jpg 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/11\/serverrdp-300x143.jpg 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/11\/serverrdp.jpg 694w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p class=\"wp-caption-text\">&#8220;Going now to the secure, bulletproof server&#8221;<\/p>\n<\/div>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-15538 size-large\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/11\/triggerpanel-600x481.jpg\" width=\"600\" height=\"481\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/11\/triggerpanel-600x481.jpg 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/11\/triggerpanel-300x240.jpg 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/11\/triggerpanel.jpg 1226w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>Here\u2019s the back end login panel, with a fun graphic when you enter an incorrect password.<\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-15539 size-large\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/11\/panel-600x306.jpg\" width=\"600\" height=\"306\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/11\/panel-600x306.jpg 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/11\/panel-300x153.jpg 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/11\/panel.jpg 1254w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>And here we have the panel itself, where the author brags about being able to trigger popups, invisible URLS, and download an execute exes on the victim\u2019s machine, all without any UAC alerts on a Windows machine. A botnet, in other words. So we have a threat actor progressing from selling leads, to selling stolen data, to selling screen lockers in support of other scammers. But who is this guy and how does he have Dell customer data? Lets start with where he is.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-15540 size-large\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/11\/location-600x239.jpg\" width=\"600\" height=\"239\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/11\/location-600x239.jpg 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/11\/location-300x120.jpg 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/11\/location.jpg 1238w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>While infecting himself with his own product, he forgot to blank out his own IP, which is registered to a broadband company in Bangalore. The footnote at the bottom of the panel says \u201cAccelerit Solutions\u201d, which yields a homepage of systemnetworksecure.com.\u00a0 The site and its phone number show up in extensive comment spam and various tech support scam pitches, but does not offer up any personal details. Searching directly on the company name is more interesting.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-15541 size-large\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/11\/gplus-503x600.jpeg\" width=\"503\" height=\"600\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/11\/gplus-503x600.jpeg 503w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/11\/gplus-252x300.jpeg 252w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/11\/gplus.jpeg 1062w\" sizes=\"auto, (max-width: 503px) 100vw, 503px\" \/><\/p>\n<p>He apparently also doesn\u2019t play nice with his customers, as we can see in reference to a previous iteration of his site. If you&#8217;ll recall, BPOresources was the name of the account that made the original forums posting in 2014.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-15544 size-large\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/11\/metascam-copy-600x486.jpeg\" width=\"600\" height=\"486\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/11\/metascam-copy-600x486.jpeg 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/11\/metascam-copy-300x243.jpeg 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/11\/metascam-copy.jpeg 1394w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>And lastly, he\u2019s a member of a Facebook group that openly sells pre-fab tech support scam pages.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-15534\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/11\/fb-441x600.png\" alt=\"fb\" width=\"441\" height=\"600\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/11\/fb-441x600.png 441w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/11\/fb-221x300.png 221w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/11\/fb.png 978w\" sizes=\"auto, (max-width: 441px) 100vw, 441px\" \/><\/p>\n<p>So we have a pretty good idea of who\u2019s behind BPO Experts Global. But how did they get the Dell customer data? Well, possibly several ways. Back in January,<a href=\"http:\/\/arstechnica.com\/security\/2016\/01\/latest-tech-support-scam-stokes-concerns-dell-customer-data-was-breached\/\" target=\"_blank\"> Ars technica<\/a>\u00a0wrote about a wave of tech support scam calls targeting Dell customers with apparently accurate purchase information. That article referenced a vulnerability disclosed 11\/25\/2015 <a href=\"https:\/\/lizardhq.rum.supply\/2015\/11\/25\/dell-foundation-services.html\" target=\"_blank\">here<\/a>\u00a0(followup <a href=\"https:\/\/rum.supply\/2015\/12\/01\/dell-foundation-services.2.html\" target=\"_blank\">here<\/a>)\u00a0involving a vulnerable preinstalled certificate that can be used to leak a Dell owner\u2019s service tag. Brian Krebs <a href=\"https:\/\/krebsonsecurity.com\/2016\/02\/dell-to-customers-report-service-tag-scams\/\" target=\"_blank\">followed up <\/a>citing the same vulnerability, and referencing an ongoing Dell investigation.<\/p>\n<p>Mr. X\u00a0didn\u2019t necessarily have to make use of the vulnerability himself. Tech support scammers are renowned for their quick sharing of TTPs and presumably once one scammer gained access to Dell customer data, he quickly sold and resold it to others. Given that the original forum post was dated 2014, its likely that the data cache is widely available on the underground in India. Although, as we\u2019ve seen above, scammers largely feel free to conduct their business in the open, on US social media and in English.<\/p>\n<p>Mr. X&#8217;s\u00a0tech support botnet is not the first we\u2019ve seen. He falls into a trend we\u2019ve observed recently of the more enterprising scammers adapting to changing search engine policies banning remote tech support listings and upgrading their techniques to more sophisticated, more damaging methods that closely resemble established malware. As the less technically adept criminals get squeezed out, it\u2019s reasonable to expect that we\u2019ll see the remaining scammers improve, adapt, and overcome.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2016\/12\/tech-support-scams-stolen-data-and-botnets\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2016\/12\/tech-support-scams-stolen-data-and-botnets\/' title='Tech support scams, stolen data, and botnets'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/06\/money-card-business-credit-card-feature-large.jpeg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>We\u2019ve found a scam in a box company that also offers intelligence leads. That is, they\u2019ll sell you the scam and point you at the most vulnerable targets first.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/threat-analysis\/criminals\/\" rel=\"category tag\">Criminals<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/threat-analysis\/\" rel=\"category tag\">Threat analysis<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/botnet\/\" rel=\"tag\">botnet<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/bpo-experts-global\/\" rel=\"tag\">BPO Experts Global<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/bporeserouces\/\" rel=\"tag\">BPOreserouces<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/dell\/\" rel=\"tag\">Dell<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/scams-as-a-service\/\" rel=\"tag\">scams as a service<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/tech-support\/\" rel=\"tag\">tech support<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/tech-support-scam\/\" rel=\"tag\">tech support scam<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/tss\/\" rel=\"tag\">TSS<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/winlogon\/\" rel=\"tag\">winlogon<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2016\/12\/tech-support-scams-stolen-data-and-botnets\/' title='Tech support scams, stolen data, and botnets'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[10410,10580,10581,3108,10582,10583,10536,10544,10494,10545,10584],"class_list":["post-5879","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-botnet","tag-bpo-experts-global","tag-bporeserouces","tag-criminals","tag-dell","tag-scams-as-a-service","tag-tech-support","tag-tech-support-scam","tag-threat-analysis","tag-tss","tag-winlogon"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/5879","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=5879"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/5879\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=5879"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=5879"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=5879"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}