At 7:21 PM -0500 3/18/07, Gadi Evron wrote:
>I realize .hk is a problem, but a few suggestions:
>1. Can we have a third party rather than CastleCops try to contactthem and
>see if they are willing to cooprate?

Just got another form letter this AM.

>2. Is the .hk situation worse than .info or .biz?

According to my current DB, absolutely

Tom

>If both of these have been answered, there is some pressure to be applied,
>both privately and publicly.
>
>       Gadi.
>
>On Sun, 18 Mar 2007, Gary Warner wrote:
>
>>  -----BEGIN PGP SIGNED MESSAGE-----
>>  Hash: SHA1
>>
>>  Friends,
>>
>>  I am ready to declare that we are having a Crisis situation with HKDNR
>>  and their unwillingness or failure to de-register domain names which
>>  have been registered for purpose of fraudulent activity.
>>
>>  At CastleCops PIRT Squad we are observing that SEVERAL fraud categories
>>  are now hosting almost exclusively on ".hk" domains because they are
>>  realizing there is a pattern of refusal to follow their own guidelines
>>  and eliminate these domains.
>>
>>  Of the 380 phishing reports that our team has published so far in June,
>>  58 of these reports were related to a ".hk" domain.  Of these, at least
>>  40 remain "live" at this time.  These are the longest-lived rock phish
>>  we have seen in more than six months, and they will remain live until we
>>  get cooperation from HKDNR to terminate these domains.
>>
>>  HKDNR sends back nice form letters that say that they are working with
>>  the HKCERT and HK Police, but they don't actually stop the fraud.
>>  HKCERT sends back nice form letters saying they have alerted the
>>  appropriate ISPs, but they also don't do anything to encourage HKDNR to
>>  deregister the fraudulent domains.
>>
>>  As an anti-phishing group, our primary concern is the Rock Phish group
>>  has begun hosting almost exclusively on .hk domains, but I want to
>>  mention that pill spammers and mule recruiters (who may actually be the
>>  same criminal enterprise) are also hosting there as the perception that
>>  .hk domains stay live a long time spreads throughout the cybercrime world.
>>
>>  Here are some sample .hk domains used by the rock phisher:
>>
>>  05MAR07 - TERMINATED - PIRT#160518 - ti2l.hk
>>  05MAR07 - TERMINATED - PIRT#160525 - techid.hk
>>  05MAR07 - TERMINATED - PIRT#160420 - dllisap.hk
>>  06MAR07 - LIVE       - PIRT#160819 - itdo.hk
>>  06MAR07 - TERMINATED - PIRT#161109 - trenit.hk
>>  06MAR07 - TERMINATED - PIRT#161116 - ident2.hk
>>  06MAR07 - LIVE       - PIRT#161130 - ident1.hk
>>  06MAR07 - TERMINATED - PIRT#161138 - it-cl.hk
>>  06MAR07 - LIVE       - PIRT#160856 - ident.hk
>>  06MAR07 - LIVE       - PIRT#161144 - stackdr.hk
>>  07MAR07 - TERMINATED - PIRT#161380 - idllc.hk
>>  07MAR07 - LIVE       - PIRT#161837 - jdllid.hk
>>  07MAR07 - LIVE       - PIRT#161835 - tokretweb.hk
>>  08MAR07 - TERMINATED - PIRT#161371 - itprodll.hk
>>  08MAR07 - TERMINATED - PIRT#161390 - idname.hk
>>  08MAR07 - LIVE       - PIRT#161625 - idisop.hk
>>  08MAR07 - LIVE       - PIRT#161789 - idissp.hk
>>  08MAR07 - LIVE       - PIRT#161706 - idisor.hk
>>  08MAR07 - LIVE       - PIRT#160842 - idusers.hk
>>  09MAR07 - TERMINATED - PIRT#160517 - custid.hk
>>  09MAR07 - LIVE       - PIRT#161708 - idisap.hk
>>  09MAR07 - LIVE       - PIRT#161963 - troniekweb.hk
>>  09MAR07 - TERMINATED - PIRT#161310 - userdtt.hk
>>  09MAR07 - LIVE       - PIRT#162969 - troniek.hk
>>  09MAR07 - LIVE       - PIRT#161855 - idisup.hk
>>  10MAR07 - LIVE       - PIRT#162968 - tokret.hk
>>  10MAR07 - LIVE       - PIRT#161855 - idisup.hk
>>  10MAR07 - LIVE       - PIRT#161824 - toptenret.hk
>>  10MAR07 - LIVE       - PIRT#163165 - idissp.hk (duplicate of 161789)
>>  10MAR07 - LIVE       - PIRT#161354 - hktech.hk
>>  10MAR07 - TERMINATED - PIRT#162663 - lloydslsb.hk (not rock. Fast Flux)
>>  10MAR07 - TERMINATED - PIRT#161384 - lltco.hk
>>  11MAR07 - LIVE       - PIRT#162545 - techhk.hk
>>  11MAR07 - TERMINATED - PIRT#163995 - lloydstsd.hk (not Rock)
>>  13MAR07 - LIVE       - PIRT#165204 - dllsid.hk
>  > 14MAR07 - LIVE       - PIRT#165271 - kletro.hk
>>  14MAR07 - LIVE       - PIRT#165309 - coit.hk
>>  14MAR07 - LIVE       - PIRT#165936 - erw3d.hk
>>  14MAR07 - LIVE       - PIRT#165196 - hkpermanent.hk
>>  14MAR07 - LIVE       - PIRT#165947 - glor.hk
>>  14MAR07 - LIVE       - PIRT#166027 - sjuxu.hk
>>  15MAR07 - LIVE       - PIRT#165195 - dllsdk.hk
>>  15MAR07 - LIVE       - PIRT#166036 - kddrm.hk
>>  15MAR07 - TERMINATED - PIRT#166064 - vlot.hk
>>  15MAR07 - LIVE       - PIRT#166103 - louf3.hk
>>  15MAR07 - LIVE       - PIRT#166121 - hsa.hk
>>  15MAR07 - LIVE       - PIRT#166127 - ere4.hk
>>  15MAR07 - LIVE       - PIRT#166134 - ddibb.hk (not worked yet)
>>  16MAR07 - LIVE       - PIRT#166596 - tenret.hk
>>  16MAR07 - LIVE       - PIRT#161824 - toptenret.hk (duplicate of 161824)
>>  16MAR07 - LIVE       - PIRT#166079 - seem.hk
>>  16MAR07 - LIVE       - PIRT#165430 - file7.hk
>>  16MAR07 - LIVE       - PIRT#160819 - itdo.hk
>>  17MAR07 - LIVE       - PIRT#166131 - dsjue3.hk
>>  17MAR07 - LIVE       - PIRT#167820 - sdjsa.hk
>>  17MAR07 - LIVE       - PIRT#167581 - themkdu.tw
>>  17MAR07 - LIVE       - PIRT#167581 - xlopec.hk used as nameserver
>>  18MAR07 - LIVE       - PIRT#166078 - serkft.hk
>>
>>
>>  In Rock Phish, many brands of phish are all present on each server.  We
>>  can show they are related by replacing the "directory" portion of the
>>  URL.  The current "live" rock phish are:
>>
>  > Fifth Third Bank = /r1/cbdir/
>>  Bank of America = /update/default/
>>  BB&T = /bbtc
>>  BB&T = /cbus
>>  BB&T = /update/K1/sb_login.jsp
>>  Nordea = /widecarea.aspx
>>  Sparkasse = /update/banking.cgi/index.html
>>  US Bank = /client.cfm
>>
>>  If you are aware of others WHICH ARE LIVE please send them back to me.
>>  Some recently live (but not current) paths include:
>>
>>  Volksbank = /vr
>>  Sparkasse = /kund.id
>>  Citibank.de = /anmelden.cgi
>>
>>
>>
>>  What is MOST IMPORTANT is that HKDNR provide to CastleCops and other
>>  security professional their preferred channel to receive such alerts,
>>  and that they ACTUALLY BEGIN TERMINATING FRAUD DOMAINS!!!
>>
>>  Contacts for CastleCops regarding this situation:
>>
>>  #1. PIRT Team Leader - Robin Laudanski - [EMAIL PROTECTED]
>>  #2. PIRT Handler     - Gary Warner     - [EMAIL PROTECTED]
>>
>>  One of our other Handlers is leading our rock phish efforts.  We will
>>  make appropriate introductions to parties who can help.
>>
>>  Some of the "Money Mule" domains at .hk include:
>>
>>  radgrup.hk
>>  radgrp.hk
>>  radiusgrp.hk
>>  luxcap.hk
>>  luxcatl.hk
>>  luxcaptl.hk
>>  luxcapi.hk
>>  luxcapit.hk
>>  finconsinter.hk
>>  interfic.hk
>>  interfinconsult.hk
>>
>>
>>  Some of the pillspam domains (International Legal RX in this case) include:
>>
>>  amhhcl.topjujuq.hk
>>  asdapw.mikia.hk
>>  svofrt.iizz.hk
>>  ukfspw.mikia.hk
>>
>>
>>
>>  =========================
>>  Sample reply from HKDNR follows:
>>
>>  (I have 28 copies of this form email received between March 5 and March
>>  12.  In most of the 28 cases, the fraudulent domain is still online.
>>  Apparently after March 12 they decided to stop answering our emails at
>>  all, since we are no longer even getting the form letter replies.  They
>>  just block the email and let the fraud continue.)
>>
>>  =========================
>>
>>  Dear customer,
>>
>>  Thank you for your email. As we would work together with HKCERT and Hong
>>  Kong Police to make Hong Kong and the Internet a safe place for
>>  business, do you mind if we can also forward your email to Hong Kong
>>  Police and HKCERT for investigation? In the meantime, you can consider
>>  to report the case to your local law enforcement authority.
>>
>>  Should you have any queries, please feel free to contact us.
>>
>>  Best regards,
>>
>>  Customer Service Department
>>  Hong Kong Domain Name Registration Company Limited
>>  Unit 2002-2005, 20/F ING Tower, 308 Des Voeux Road Central,
>>  Sheung Wan, Hong Kong
>>  Phone No.: +852 2319 1313
>>  Fax No.: +852 2319 2626
>>  Email: [EMAIL PROTECTED]
>>
>>  ======================================
>>  Here is a sample email from HKCERT:
>>  ======================================
>>
>>  Dear Sir/Madam,
>>
>>  Thank for your report on [ [10368290-553350] Fraudulent Domain Name used
>>  in Phishing Scheme (ident1.hk)] dated [14Mar
>  > 07].
>>
>>  Hong Kong Computer Emergency Response Team Coordination Centre (HKCERT)
>>  have passed your case to the corresponding ISP/Parties to follow up.
>>
>>  Please refer to our case no for ongoing follow up.
>>  HKCERT Case No: 20070274
>>  First Report Date: 14 Mar 07
>>
>>  Regards,
>>  HKCERT
>>  Tel: +852-81056060
>>  E-mail: [EMAIL PROTECTED]
>>
>>  =========================
>>  -----BEGIN PGP SIGNATURE-----
>>  Version: GnuPG v1.4.4 (MingW32)
>>  Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
>>
>>  iD8DBQFF/aXWg79eYCOO6PsRAruXAJ9LZU0eN4nuSOsIukWsbsyBdJMdxQCcC01o
>>  CimTVB259YyucCE6g3r0PP0=
>>  =JZDh
>>  -----END PGP SIGNATURE-----
>>  _______________________________________________
>>  phishing mailing list
>>  phishing@whitestar.linuxbox.org
>>  http://www.whitestar.linuxbox.org/mailman/listinfo/phishing
>>
>
>_______________________________________________
>phishing mailing list
>phishing@whitestar.linuxbox.org
>http://www.whitestar.linuxbox.org/mailman/listinfo/phishing


-- 

Tom Shaw - Chief Engineer, OITC
<[EMAIL PROTECTED]>, http://www.oitc.com/
US Phone Numbers: 321-984-3714, 321-729-6258(fax), 
321-258-2475(cell/voice mail,pager)
Text Paging: http://www.oitc.com/Pager/sendmessage.html
AIM/iChat: [EMAIL PROTECTED]
Google Talk: [EMAIL PROTECTED]
skype: trshaw
_______________________________________________
phishing mailing list
phishing@whitestar.linuxbox.org
http://www.whitestar.linuxbox.org/mailman/listinfo/phishing

Reply via email to