Re: Fraudulent Files: https://code.google.com/p/anz-mobile/

2015-07-08 Thread FraudWatch Security
TAKEDOWN NOTICE PURSUANT TO THE DIGITAL MILLENNIUM COPYRIGHT ACT OF 1998 
Dear Sir or Madam, 
 
This is a notice in accordance with the Digital Millennium Copyright Act of 
1998 requesting that you cease to provide access to copyrighted material. 
 
The original material is located at the following URLs: 
https://play.google.com/store/apps/details?id=com.anz.mb.launch
https://play.google.com/store/apps/details?id=com.anz.android
https://play.google.com/store/apps/details?id=com.anz.android.gomoney
https://play.google.com/store/apps/details?id=nz.co.anz.android.mobilebanking
https://play.google.com/store/apps/details?id=com.anz.gamechanger
https://play.google.com/store/apps/details?id=com.anzspot.mobilet
https://market.android.com/details?id=com.anz.androidfeature=search_result
https://play.google.com/store/apps/details?id=com.anz.androidfeature=search_result
 

https://play.google.com/store/apps/details?id=com.anzspot.mobile.id
https://play.google.com/store/apps/details?id=com.anzspot.mobile
https://play.google.com/store/apps/details?id=au.com.saltgroup.fastpay
https://play.google.com/store/apps/details?id=com.anzspot.mobile.tw
https://play.google.com/store/apps/details?id=com.anzspot.mobile.sg
https://play.google.com/store/apps/details?id=enterprise.com.anz.shieldhl=en
https://play.google.com/store/apps/details?id=com.aprisma.product.primemobile.anz
 

 
 
 
The infringing material is located at the following URLs: 
https://code.google.com/p/anz-mobile/ 
 
Contact information: 
FraudWatch Security 
Mailing address: PO Box 311. Blackburn VIC 3130, Australia 
Telephone number: +61398876777 
Fax number: +61 3 8660 2688 
E-mail address: secur...@fraudwatchinternational.com 
 
Client information: 
ANZ Banking Group 
 
I have a good faith belief that the use of the described material in the 
manner complained of is not authorized by the copyright owner, its agent, 
or the law. 
 
I swear that the information in the notification is accurate and, under 
penalty of perjury, that I am the copyright owner or am authorized to act 
on behalf of the owner of an exclusive right that is allegedly infringed.

-- 
You received this message because you are subscribed to the Google Groups 
Project Hosting on Google Code group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to google-code-hosting+unsubscr...@googlegroups.com.
To post to this group, send email to google-code-hosting@googlegroups.com.
Visit this group at http://groups.google.com/group/google-code-hosting.
For more options, visit https://groups.google.com/d/optout.


[Incident#PTW-789365] Fraudulent App: https://code.google.com/p/anz-mobile/

2015-07-07 Thread FraudWatch Security
[Incident#PTW-789365]
Dear Google

The FraudWatch International Security Operations Centre 
(www.fraudwatchinternational.com) has received a report of a fraudulent Mobile 
App advertized on your website.

We act on behalf of our client, ANZ Australia. This Mobile App is not 
authorized by our client, nor is it genuine.

The Mobile App is attempting to appear legitimate, posing as a genuine App of 
our client. This could be used to unlawfully profit from sales, or to steal our 
client's customers login information.

App URL: https://code.google.com/p/anz-mobile/
Additional URL's:
http://anz-mobile.googlecode.com/git/research/ANZ_1.log

Brand Abused: ANZ Australia

*

On behalf of our client, we would greatly appreciate your assistance in:

a) Urgently Cleaning, closing or disallowing access to the App listed above as 
appropriate.

b) requesting the content owner to cease and desist in the illegal use of our 
client's trademarks,

*

If you are not the correct person to be dealing with this incident, please 
forward this request to the relevant person.

If you are already aware of this matter, we apologise for any inconvenience.

This incident has been assigned an Incident Number, found in the subject line. 
We will be monitoring this incident, and tracking its progress to closure. 
Please use this incident code in the subject line of all correspondence 
relating to this Incident.

Please contact us should you require any clarification or assistance. We thank 
you for your urgent consideration of this request.


Regards,
Paul
Security Operations
FraudWatch International
Tel USA: +1 (415) 449 8800
Tel AUS: +613 9887 6777
Fax: +613 8660 2688
Email: secur...@fraudwatchinternational.com
http://www.fraudwatchinternational.com

-- 
You received this message because you are subscribed to the Google Groups 
Project Hosting on Google Code group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to google-code-hosting+unsubscr...@googlegroups.com.
To post to this group, send email to google-code-hosting@googlegroups.com.
Visit this group at http://groups.google.com/group/google-code-hosting.
For more options, visit https://groups.google.com/d/optout.


Fraudulent Files: https://code.google.com/p/anz-mobile/

2015-07-06 Thread FraudWatch Security
[Incident#PTW-789365]
The FraudWatch International Security Operations Centre 
(www.fraudwatchinternational.com) has received a report of a fraudulent 
files using google code.

We act on behalf of our client, ANZ Australia. This Mobile App is not 
authorized by our client, nor is it genuine.

The Mobile App is attempting to appear legitimate, posing as a genuine App 
of our client. This could be used to unlawfully profit from sales, or to 
steal our client's customers login information.

App URL: https://code.google.com/p/anz-mobile/
Additional URL's:
http://anz-mobile.googlecode.com/git/research/ANZ_1.log

Brand Abused: ANZ Australia

*

On behalf of our client, we would greatly appreciate your assistance in:

a) Urgently Cleaning, closing or disallowing access to the project listed 
above as appropriate.

b) requesting the content owner to cease and desist in the illegal use of 
our client's trademarks,

*

If you are not the correct person to be dealing with this incident, please 
forward this request to the relevant person.

If you are already aware of this matter, we apologise for any inconvenience.

This incident has been assigned an Incident Number, found in the subject 
line. We will be monitoring this incident, and tracking its progress to 
closure. Please use this incident code in the subject line of all 
correspondence relating to this Incident.

Please contact us should you require any clarification or assistance. We 
thank you for your urgent consideration of this request.


Regards,
Paul
Security Operations
FraudWatch International
Tel USA: +1 (415) 449 8800
Tel AUS: +613 9887 6777
Fax: +613 8660 2688
Email: secur...@fraudwatchinternational.com
http://www.fraudwatchinternational.com

-- 
You received this message because you are subscribed to the Google Groups 
Project Hosting on Google Code group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to google-code-hosting+unsubscr...@googlegroups.com.
To post to this group, send email to google-code-hosting@googlegroups.com.
Visit this group at http://groups.google.com/group/google-code-hosting.
For more options, visit https://groups.google.com/d/optout.


Malware Files needs removal

2015-05-25 Thread FraudWatch Security
[Incident#ONJ-615137]
Dear Web Host

The FraudWatch International Security Operations Centre 
(www.fraudwatchinternational.com) has received a report of a fraudulent 
financial web page (illegal Malware download / data collection) hosted on 
your network.

** Please be aware that clicking any link to an executable may harm your 
computer! We are providing these links to bring to your attention their 
existence so that you can take the appropriate action against this illegal 
activity. Also note that we have provided a malware scan report for your 
review **


IP Address: 74.125.198.137

URL: 
https://17103c2c-a-62cb3a1a-s-sites.googlegroups.com/site/senagclub/5/Comprovante.zip
Additional URL's:




** Malware Scan Report: 
https://www.virustotal.com/file/04c8042d7cdb41c4877780ecbe651d666227d1869f2872d29357d0403f2ea420/analysis/1432516419/

Client Brand Targeted: Santander Brasil (Banco Santander)

*

On behalf of our client, we would greatly appreciate your assistance in:

a) Urgently cleaning, closing or disallowing access to the site listed 
above as appropriate.

b) obtaining and providing to us additional information regarding this 
incident, for example relevant logs or files from the host,

*

If you are not the correct person to be dealing with this incident, please 
forward this request to the relevant person.

If you are already aware of this matter, we apologise for any 
inconvenience. If possible, we would still appreciate a copy of any 
relevant files from the host, including logs and any php files relevant to 
the malware site, which may indicate where the stolen login credentials are 
being sent.

This incident has been assigned an Incident Number, found in the subject 
line. We will be monitoring this incident, and tracking its progress to 
closure. Please use this incident code in the subject line of all 
correspondence relating to this Incident.

Please contact us should you require any clarification or assistance. We 
thank you for your urgent consideration of this request.


Regards,
Security Operations
FraudWatch International
Tel USA: +1 (415) 449 8800
Tel AUS: +613 9887 6777
Fax: +613 8660 2688
Email: secur...@fraudwatchinternational.com
http://www.fraudwatchinternational.com

-- 
You received this message because you are subscribed to the Google Groups 
Project Hosting on Google Code group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to google-code-hosting+unsubscr...@googlegroups.com.
To post to this group, send email to google-code-hosting@googlegroups.com.
Visit this group at http://groups.google.com/group/google-code-hosting.
For more options, visit https://groups.google.com/d/optout.


[Incident#MXT-012497] Malware Site: https://cadastramentosnx.googlecode.com/svn/cadax/dake/wel/

2015-04-08 Thread FraudWatch Security
[Incident#MXT-012497]
Dear Google Code Hosting

The FraudWatch International Security Operations Centre 
(www.fraudwatchinternational.com) has received a report of a fraudulent 
financial web page (illegal Malware download / data collection) hosted on your 
network.

** Please be aware that clicking any link to an executable may harm your 
computer! We are providing these links to bring to your attention their 
existence so that you can take the appropriate action against this illegal 
activity. Also note that we have provided a malware scan report for your review 
**


IP Address: 74.125.198.82

URL: https://cadastramentosnx.googlecode.com/svn/cadax/dake/wel/
Additional URL's:
https://cadastramentosnx.googlecode.com/svn/cadax/dake/wel/bbb
https://cadastramentosnx.googlecode.com/svn/cadax/dake/wel/bcadastro
https://cadastramentosnx.googlecode.com/svn/cadax/dake/wel/lgbx
https://cadastramentosnx.googlecode.com/svn/cadax/dake/wel/r1/
https://cadastramentosnx.googlecode.com/svn/cadax/dake/wel/parte.txt
https://cadastramentosnx.googlecode.com/svn/cadax/dake/wel/webox
https://cadastramentosnx.googlecode.com/svn/cadax/dake/wel/r1/mcadastro.e
https://cadastramentosnx.googlecode.com/svn/cadax/dake/wel/r1/parte.txt


** Malware Scan Report: 
https://malwr.com/analysis/ZjdhMWQzYTUxZTQ0NDZiNGEwNmJkYzc4ZDRjODJjM2M/
https://malwr.com/analysis/N2FiYzg5YTA1Y2Y1NGIzODk0ZTVlMWY1ZTFlMGYyYjM/
https://malwr.com/analysis/NGJmMWUzMGU2ZTYzNGI5YjkxMzRjMGI3OTNiNDFkN2M/



Client Brand Targeted: Santander Brasil (Banco Santander)

*

On behalf of our client, we would greatly appreciate your assistance in:

a) Urgently cleaning, closing or disallowing access to the site listed above as 
appropriate.

b) obtaining and providing to us additional information regarding this 
incident, for example relevant logs or files from the host,

*

If you are not the correct person to be dealing with this incident, please 
forward this request to the relevant person.

If you are already aware of this matter, we apologise for any inconvenience. If 
possible, we would still appreciate a copy of any relevant files from the host, 
including logs and any php files relevant to the malware site, which may 
indicate where the stolen login credentials are being sent.

This incident has been assigned an Incident Number, found in the subject line. 
We will be monitoring this incident, and tracking its progress to closure. 
Please use this incident code in the subject line of all correspondence 
relating to this Incident.

Please contact us should you require any clarification or assistance. We thank 
you for your urgent consideration of this request.


Regards,
Jack
Security Operations
FraudWatch International
Tel USA: +1 (415) 449 8800
Tel AUS: +613 9887 6777
Fax: +613 8660 2688
Email: secur...@fraudwatchinternational.com
http://www.fraudwatchinternational.com

-- 
You received this message because you are subscribed to the Google Groups 
Project Hosting on Google Code group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to google-code-hosting+unsubscr...@googlegroups.com.
To post to this group, send email to google-code-hosting@googlegroups.com.
Visit this group at http://groups.google.com/group/google-code-hosting.
For more options, visit https://groups.google.com/d/optout.


[Incident#UAQ-426012] Malware Site: https://nota-fiscal-2015.googlecode.com/svn/NF-eN0008546526EXML7737257.rar

2015-03-18 Thread FraudWatch Security
[Incident#UAQ-426012]
Dear Google Code Hosting 

The FraudWatch International Security Operations Centre 
(www.fraudwatchinternational.com) has received a report of a fraudulent 
financial web page (illegal Malware download / data collection) hosted on your 
network.

** Please be aware that clicking any link to an executable may harm your 
computer! We are providing these links to bring to your attention their 
existence so that you can take the appropriate action against this illegal 
activity. Also note that we have provided a malware scan report for your review 
**


IP Address: 64.233.180.82

URL: https://nota-fiscal-2015.googlecode.com/svn/NF-eN0008546526EXML7737257.rar 
Additional URL's:


** Malware Scan Report:
https://www.virustotal.com/en/file/3d69bd5426a3d78926db0f0685cc9dbe3f0ccdcb98ed8a96955c048da595/analysis/


Client Brand Targeted: Santander Brasil (Banco Santander)

*

On behalf of our client, we would greatly appreciate your assistance in:

a) Urgently cleaning, closing or disallowing access to the site listed above as 
appropriate.

b) obtaining and providing to us additional information regarding this 
incident, for example relevant logs or files from the host,

*

If you are not the correct person to be dealing with this incident, please 
forward this request to the relevant person.

If you are already aware of this matter, we apologise for any inconvenience. If 
possible, we would still appreciate a copy of any relevant files from the host, 
including logs and any php files relevant to the malware site, which may 
indicate where the stolen login credentials are being sent.

This incident has been assigned an Incident Number, found in the subject line. 
We will be monitoring this incident, and tracking its progress to closure. 
Please use this incident code in the subject line of all correspondence 
relating to this Incident.

Please contact us should you require any clarification or assistance. We thank 
you for your urgent consideration of this request.


Regards,
Jack
Security Operations
FraudWatch International
Tel USA: +1 (415) 449 8800
Tel AUS: +613 9887 6777
Fax: +613 8660 2688
Email: secur...@fraudwatchinternational.com
http://www.fraudwatchinternational.com

-- 
You received this message because you are subscribed to the Google Groups 
Project Hosting on Google Code group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to google-code-hosting+unsubscr...@googlegroups.com.
To post to this group, send email to google-code-hosting@googlegroups.com.
Visit this group at http://groups.google.com/group/google-code-hosting.
For more options, visit https://groups.google.com/d/optout.


malware http://sites.google.com/site/downl oadbrasil2014/Boleto_0014 7548_PDF.zip

2014-11-30 Thread Fraudwatch Security

http://sites.google.com/site/downl   oadbrasil2014/Boleto_0014 
7548_PDF.zip
** Malware Scan Report: 
https://www.virustotal.com/file/b05a27508377bc7196b14925c432d9de4c189a71fbfda46feac508582fe5c727/analysis/1417002408/

Please get rid of spaces on the URL to visit URL

-- 
You received this message because you are subscribed to the Google Groups 
Project Hosting on Google Code group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to google-code-hosting+unsubscr...@googlegroups.com.
To post to this group, send email to google-code-hosting@googlegroups.com.
Visit this group at http://groups.google.com/group/google-code-hosting.
For more options, visit https://groups.google.com/d/optout.


Malware hosted on google code hosting

2014-08-26 Thread Fraudwatch Security
https://informesw.googlecode.com/svn/Boletim.zip


See 
https://www.virustotal.com/file/870714c368e2b620370cf8a49883f319902220cd074d35bae194305be461/analysis/1405431354/


Can anyone remove this please?

-- 
You received this message because you are subscribed to the Google Groups 
Project Hosting on Google Code group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to google-code-hosting+unsubscr...@googlegroups.com.
To post to this group, send email to google-code-hosting@googlegroups.com.
Visit this group at http://groups.google.com/group/google-code-hosting.
For more options, visit https://groups.google.com/d/optout.


Malware detected on http://wiki.parcela009.googlecode.com/hg/DOC21082014.zip

2014-08-22 Thread Fraudwatch Security
[Incident#CWV-628855]
Dear Web Host

The FraudWatch International Security Operations Centre 
(www.fraudwatchinternational.com) has received a report of a fraudulent 
financial web page (illegal malware download / data collection) hosted on 
your network.

** Please be aware that clicking any link to an executable may harm your 
computer! We are providing these links to bring to your attention their 
existence so that you can take the appropriate action against this illegal 
activity. Also note that we have provided a malware scan report for your 
review **


IP Address: 74.125.25.82

URL: http://wiki.parcela009.googlecode.com/hg/DOC21082014.zip
Additional URL's:

**Malware scan report:
https://www.virustotal.com/en/file/9d21ea2d80379c72101c5d3731d8d512b85f1c8d43bf813deea977ce81307841/analysis/1408666964/

Client Brand Targeted: Santander Brasil (Banco Santander)

*

On behalf of our client, we would greatly appreciate your assistance in:

a) Urgently cleaning, closing or disallowing access to the site listed 
above as appropriate.

b) obtaining and providing to us additional information regarding this 
incident, for example relevant logs or files from the host,

*

If you are not the correct person to be dealing with this incident, please 
forward this request to the relevant person.

If you are already aware of this matter, we apologise for any 
inconvenience. If possible, we would still appreciate a copy of any 
relevant files from the host, including logs and any php files relevant to 
the malware site, which may indicate where the stolen login credentials are 
being sent.

This incident has been assigned an Incident Number, found in the subject 
line. We will be monitoring this incident, and tracking its progress to 
closure. Please use this incident code in the subject line of all 
correspondence relating to this Incident.

Please contact us should you require any clarification or assistance. We 
thank you for your urgent consideration of this request.


Regards,
Security Operations
FraudWatch International
Tel USA: +1 (415) 449 8800
Tel AUS: +613 9887 6777
Fax: +613 8660 2688
Email: secur...@fraudwatchinternational.com
http://www.fraudwatchinternational.com

-- 
You received this message because you are subscribed to the Google Groups 
Project Hosting on Google Code group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to google-code-hosting+unsubscr...@googlegroups.com.
To post to this group, send email to google-code-hosting@googlegroups.com.
Visit this group at http://groups.google.com/group/google-code-hosting.
For more options, visit https://groups.google.com/d/optout.


Malware Site: https://notafiscalproduto94728.googlecode.com/svn/notafiscalproduto.pdf.zip

2014-07-16 Thread Fraudwatch Security
Hello,

We have discovered some malware on your network and were hoping that you 
might be able to assist us in removing the content?

IP Address: 74.125.28.82

URL: 
https://notafiscalproduto94728.googlecode.com/svn/notafiscalproduto.pdf.zip

** malware scan report
https://www.virustotal.com/en/file/052f2977b7341fa0efce78c6e7e51d1f1df45ae19f599d8917f40801c34f035b/analysis/1405484673/
https://malwr.com/analysis/ZjE5MTQxMTQyMDJmNDM0ODg3MTRkNjk1ZjQyODcwYmE/

Regards,
Security Operations
FraudWatch International

-- 
You received this message because you are subscribed to the Google Groups 
Project Hosting on Google Code group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to google-code-hosting+unsubscr...@googlegroups.com.
To post to this group, send email to google-code-hosting@googlegroups.com.
Visit this group at http://groups.google.com/group/google-code-hosting.
For more options, visit https://groups.google.com/d/optout.


malwares

2014-06-29 Thread Fraudwatch Security
https://dowloadgty.googlecode.com/svn/Anexo.zip
** malware scan report
https://www.virustotal.com/en/file/b11d6a08cd99fcd8272157e941ca729f4580edd5667202df1c7424d0780cd9e9/analysis/
https://malwr.com/analysis/OTg5MTllOTczZmI4NGE1YWI5MDVlZjI5N2E4NzQ4YmU/


https://docs.google.com/uc?id=0B809n5kKDcs1LUtVSVdnNllCNmM
** malware scan report
https://www.virustotal.com/en/file/21ca7230989ed8abe48097f92092fdc652e7ca5c30c7069004bb42562ba8e86f/analysis/1402018974/
https://malwr.com/analysis/YTg5MTA3NTlmZDFhNDI0Y2FiZGJkNDgzYzBlNmVhMWY/

-- 
You received this message because you are subscribed to the Google Groups 
Project Hosting on Google Code group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to google-code-hosting+unsubscr...@googlegroups.com.
To post to this group, send email to google-code-hosting@googlegroups.com.
Visit this group at http://groups.google.com/group/google-code-hosting.
For more options, visit https://groups.google.com/d/optout.


malwares on googledrive

2014-06-24 Thread Fraudwatch Security
https://googledrive.com/host/0B_2zvjbSDcHUcTdTUFR2UDhGaDA/vj/model.jpg
** malware scan report
https://www.virustotal.com/en/file/7b18345db24dd092411ae8ce8c96efb8fa144f1c0f72ab48ecf6de0418d42939/analysis/1403655661/
https://malwr.com/analysis/NGU1ZjI1ZDE2MmI1NDE0Yzg4Y2MwOTEwYTM3MjExOGE/


https://googledrive.com/host/0B_2zvjbSDcHUcTdTUFR2UDhGaDA/j1/player.jpg
** malware scan report
https://www.virustotal.com/en/file/fb556e3ed90633e70e9acb8970e4d042c409747066e42f7cbfe1aef4d0a8bd12/analysis/1403656967/
https://malwr.com/analysis/YjMxMzkwOTg1MjFjNGE2ZDgyZTU1ZmNhZTI0YjQ0M2M/

-- 
You received this message because you are subscribed to the Google Groups 
Project Hosting on Google Code group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to google-code-hosting+unsubscr...@googlegroups.com.
To post to this group, send email to google-code-hosting@googlegroups.com.
Visit this group at http://groups.google.com/group/google-code-hosting.
For more options, visit https://groups.google.com/d/optout.


malwares on googleapis.com

2014-06-23 Thread Fraudwatch Security
http://storage.googleapis.com/project2014/Recado_de_Voz.zip
http://storage.googleapis.com/project2014/Intimacao.zip
http://storage.googleapis.com/project2014/Install_Setup.cpl
** malware scan report
https://www.virustotal.com/en/file/56660dfd9def8537aaec56f25272c4b1076d2a9f502f8adc4ba6e8dcf33fbc99/analysis/
https://malwr.com/analysis/MWIzYjY3YWE3ZTc4NDM1MmJhYWM0NTMzYzY0ZTc4M2E/


-- 
You received this message because you are subscribed to the Google Groups 
Project Hosting on Google Code group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to google-code-hosting+unsubscr...@googlegroups.com.
To post to this group, send email to google-code-hosting@googlegroups.com.
Visit this group at http://groups.google.com/group/google-code-hosting.
For more options, visit https://groups.google.com/d/optout.


malware on googlecode.com

2014-06-02 Thread Fraudwatch Security
We have found malware on below URL

https://dowload erfs .googlecode.com/svn/ Detalhes.zip   please remove 
all spaces on the URL

**malware scan report:
https://www.virustotal.com/file/325d67b9c77151e103e04fb0153d76ee44f71f3fd47d5465eda38636621244de/analysis/1401419567/

Please remove binary ASAP.

Thanks.

-- 
You received this message because you are subscribed to the Google Groups 
Project Hosting on Google Code group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to google-code-hosting+unsubscr...@googlegroups.com.
To post to this group, send email to google-code-hosting@googlegroups.com.
Visit this group at http://groups.google.com/group/google-code-hosting.
For more options, visit https://groups.google.com/d/optout.


Malware Site: https://projeto-atualizacao-seguranca-2k14.googlecode.com/svn/cli1.zaz

2014-05-21 Thread Fraudwatch Security
[Incident#EJA-438092]
Dear Web Host

The FraudWatch International Security Operations Centre 
(www.fraudwatchinternational.com) has received a report of a fraudulent 
financial web page (illegal malware download / data collection) hosted on 
your network.

** Please be aware that clicking any link to an executable may harm your 
computer! We are providing these links to bring to your attention their 
existence so that you can take the appropriate action against this illegal 
activity. Also note that we have provided a malware scan report for your 
review **


IP Address: 74.125.28.82

URL: https://projeto-atualizacao-seguranca-2k14.googlecode.com/svn/cli1.zaz
Additional URL's:



** The above URL has been found to have sufficient connection with Malware 
that may be located on: 


** Malware Scan Report: 
https://www.virustotal.com/en/file/7400cfdc380871b0c270425e4b40f697a905ebeced6b2e1c88a9b7b57718558a/analysis/
https://malwr.com/analysis/MzBlMDFiZjc3NGIzNGM1MjlhZGMzNTBmYWY5YTdmYjI/
http://10.1.1.56:8080/view/18

Client Brand Targeted: Santander Brasil (Banco Santander)

*

On behalf of our client, we would greatly appreciate your assistance in:

a) Urgently cleaning, closing or disallowing access to the site listed 
above as appropriate.

b) obtaining and providing to us additional information regarding this 
incident, for example relevant logs or files from the host,

*

If you are not the correct person to be dealing with this incident, please 
forward this request to the relevant person.

If you are already aware of this matter, we apologise for any 
inconvenience. If possible, we would still appreciate a copy of any 
relevant files from the host, including logs and any php files relevant to 
the malware site, which may indicate where the stolen login credentials are 
being sent.

This incident has been assigned an Incident Number, found in the subject 
line. We will be monitoring this incident, and tracking its progress to 
closure. Please use this incident code in the subject line of all 
correspondence relating to this Incident.

Please contact us should you require any clarification or assistance. We 
thank you for your urgent consideration of this request.


Regards,
Security Operations
FraudWatch International
http://www.fraudwatchinternational.com

-- 
You received this message because you are subscribed to the Google Groups 
Project Hosting on Google Code group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to google-code-hosting+unsubscr...@googlegroups.com.
To post to this group, send email to google-code-hosting@googlegroups.com.
Visit this group at http://groups.google.com/group/google-code-hosting.
For more options, visit https://groups.google.com/d/optout.


Abuse Report - Malware

2014-03-11 Thread Fraudwatch Security
Malware Found:
http://fotos-camera.googlecode.com/svn/FOTO-0176.zip

-- 
You received this message because you are subscribed to the Google Groups 
Project Hosting on Google Code group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to google-code-hosting+unsubscr...@googlegroups.com.
To post to this group, send email to google-code-hosting@googlegroups.com.
Visit this group at http://groups.google.com/group/google-code-hosting.
For more options, visit https://groups.google.com/d/optout.


Takedown Request for Malware Site: https://drive.google.com/uc?id=0B7GL_v41VtxbeTJGMklNWGFEc1Uexport=download

2014-02-20 Thread Fraudwatch Security
Requesting a take down for the following URL's containing malware:


IP Address: 74.125.224.160

URL: 
https://drive.google.com/uc?id=0B7GL_v41VtxbeTJGMklNWGFEc1Uexport=download

Additional URL's:
https://drive.google.com/uc?id=0B7GL_v41VtxbZEdwOEJ1MFhQd0Uexport=download
http://drive.google.com/uc?id=0B7GL_v41VtxbZEdwOEJ1MFhQd0U
https://drive.google.com/uc?id=0B0Reg5xK_YeldUphZmc3bkkxWm8
https://drive.google.com/uc?id=0B7GL_v41VtxbY2xVMmhLc0VrZ3cexport=download
https://drive.google.com/uc?id=0B9YabVwypYeAZTM3X2hfaXpZUjQamp;export=download

-FraudWatch International

-- 
You received this message because you are subscribed to the Google Groups 
Project Hosting on Google Code group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to google-code-hosting+unsubscr...@googlegroups.com.
To post to this group, send email to google-code-hosting@googlegroups.com.
Visit this group at http://groups.google.com/group/google-code-hosting.
For more options, visit https://groups.google.com/groups/opt_out.


Takedown Request for Malware Site

2014-02-20 Thread Fraudwatch Security
Requesting takedown for the following Malware site(s):

IP Address: 74.125.224.170

URL: 
https://doc-08-bg-docs.googleusercontent.com/docs/securesc/ha0ro937gcuc7l7deffksulhg5h7mbp1/nca08q79a4jdp42rq27qgmm30t679gma/139291920/00558100178077668181/*/0B7GL_v41VtxbZEdwOEJ1MFhQd0U?h=16653014193614665626e=download

Additional URL's:
https://doc-08-bg-docs.googleusercontent.com/docs/securesc/ha0ro937gcuc7l7deffksulhg5h7mbp1/nca08q79a4jdp42rq27qgmm30t679gma/139291920/00558100178077668181/*/0B7GL_v41VtxbZEdwOEJ1MFhQd0U?h=16653014193614665626

-FraudWatch International 

-- 
You received this message because you are subscribed to the Google Groups 
Project Hosting on Google Code group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to google-code-hosting+unsubscr...@googlegroups.com.
To post to this group, send email to google-code-hosting@googlegroups.com.
Visit this group at http://groups.google.com/group/google-code-hosting.
For more options, visit https://groups.google.com/groups/opt_out.