I took these screenshots in 2009.
Independent Contractor. Bitcoin: 15Zvie1j8CjSR52doVSZSjctCDSx3pDjKZ Email: dancho.danchev@hush.com OMEMO: ddanchev@conversations.im | OTR: danchodanchev@xmpp.jp | TOX ID: 2E6FCA35A18AA76B2CCE33B55404A796F077CADA56F38922A1988AA381AE617A15D3D3E3E6F1
Friday, October 28, 2022
Exposing a Portfolio of YaBucks Pay Per Install Affiliate Network Scareware Serving Domains - An Analysis
I took these screenshots in 2009.

CAPTCHA is Dead! - Here's the Proof
It's a public secret that the majority of today's modern Web sites rely on the use of CAPTCHA for proper user vs bot or automated software detection which in reality is a flawed and an outdated approach to protect a Web site and its visitors as in 2022 we continue to live in a world where CAPTCHA-solving as a service that also includes reCAPTCHA solving as a service continues to proliferate with possible thousands of users across the globe processing hundreds of thousands of CAPTCHAs courtesy of popular CAPTCHA services for the purpose of empowering Russian or international cybercriminals on their way to properly and automatically register new accounts on major Web properties and social networks internationally.
In this post I'll detail the activities of several known CAPTCHA-solving services and discuss in-depth their functionalities with the idea to raise awareness on the concept including the systematic and automatic CAPTCHA solving courtesy of humans and their affiliate-based networks.
Sample URLs known to have been involved in the campaign include:
hxxp://captchasolver.com - 69.172.201.208; 52.73.71.92; 52.73.115.80; 172.64.138.13; 172.67.184.21
hxxp://captchaocr.com - 172.93.194.59; 172.93.194.58; 3.130.204.160; 103.224.212.221; 3.19.116.195
hxxp://typethat.biz - once executed the sample phones back to hxxp://5fc.info - 184.168.192.116; 45.40.164.140; 209.99.40.222; 208.91.199.225; 50.62.160.53
Sample MD5 known to have been involved in the campaign include:
MD5: eb1ef93dcf2e9fd747ea2b80dd0c2619
Related URLs known to have been involved in similar campaigns include:
hxxp://captchasolver.com/
hxxp://216.55.132.15/captchas
hxxp://64.34.161.26:8888/type/typer.html
hxxp://panel.6ew.pl/index.php
hxxp://www.geocities.com/workcaptcha/magic.bolobomb.htm
hxxp://magic.bolobomb.com/lepricon/index.php
hxxp://www.geocities.com/workcaptcha/destination.work.htm
hxxp://nagic.bolobomb.com/lepricon/index.php?A=STATS
hxxp://www.destination-server.com/bulletinpics/entry.cgi
hxxp://www.destination-server.com/bulletinpics/server-slow.cgi
hxxp://74.55.167.90:8546/entry/type.php?
hxxp://www.lovecolony.com/captchasetup.exe
hxxp://www.captchaocr.com/human/index.php
hxxp://bpoworld.awardspace.com/
Stay tuned!

Mobile Malware - Hype or Threat? - An Analysis
It's all cyclical, and not a rocket science needing a reverse engineer to explain and dazzle you with advanced Assembly experience.
There are incentives for malware authors to code mobile malware, namely the commercialization of mobile malware itself, which happened in the middle of 2006 with the release of the RedBrowser. Among the key point I indicated in my "Malware - Future Trends" research that I released in the beginning of 2006. The ugliest things are the easiest to emerge as always.
The very nature of a mobile phone's voting and purchasing power, let's not mention could literally provoke your imagination on the possible abuses.
Why would an end user start asking a mobile operator's representative on the availability of mobile anti virus scanners? Because he or she would have been a victim the art of market development, viral
The industry's main points:
- more people have mobile phones then they own a personal computer -- which doesn't mean they're all smart phones running Symbian or Windows Mobile
- over 300 generically detected malware samples, reminds of the concept of a malware family in PC malware world. These are all the Cabir family, spread to code on the Internet and have ordes of script kiddies fueling the FUD while watching Takedown and inspiring themselves to eavesdrop on someone's mobile communication while "commuting" in the park
The reality
- Anti virus vendors suffer from marketing myopia, they've simply fallen in love with their products, and we all know that once you fall in love it's hard to become as pragmatic as you used to be before -- sweet pain
- the majority of known mobile malware comes out of a Cabir Proof of Concept (PoC) publicly available code, that is the spreading routine within. Namely the current threat represents nothing more than a mobile malware family, and there's no such thing as a perfect family
- Malware authors are too busy to efficiently play cat and mouse game and taking advantage of the about to reach 1B world wide Internet population.
- the end user MUST confirm the unknown Bluetooth connection, if she's in discoverable mode, must confirm the execution of the executable from unknown source
- given that Symbian and Windows Mobile dominate the mobile OS space, a vulnerability in the systems is crucial
- Anti virus signatures are basically a reactive security protection
I once argued on the myth of anti virus vendors sharing every malware sample they came across, in between the "usefulness" of virus signatures in today's open source malware, and malware on demand world
How to protect yourself?
- be aware of the basics of mobile malware
- don't install applications from untrusted on-the-go sources
Do you need a personal anti-virus scanner for your mobile phone? No, you don't, but mobile operators need them on the gateway level, the rest is just your mobile operator differentiating its offering, positioning itself as a conscious one, and further fueling growth into the market -- whether revenues are about to get spent on further R&D on mobile malware, or market development with other products is up to the vendors themselves.
It's your network operator who should be responsible for limiting the spread of potential epidemics, and charging a buck for a slight modification of Cabir's PoC spreading module, brings us back to the same old issue with open source malware, or malware of demand and anti virus signatures usefulness and recency of updates. My point, the responsibility for dealing with general and family based mobile malware, the one we're seeing today, should go to my mobile operator, not to myself getting infected and spreading the decease even further.
The average mobile phone user would start enjoying a provider's brand even more, if he's been talked into the huge dangers posed by mobile malware -- from a marketing point of view he would even spread the word further while trying to let the other perceive him/her as a tech savvy individual with a fancy AV scanner on his couple hundred.
Targeted attacks have a huge potential though, while a mass sending of mobile malware would result in the mobile operator directly blocking it, and merely relaying on the end user to take care of their responsibilities. All you need is a wide spread mobile malware dissemination attempt, and then you'll witness your operator using his ownership powers to shock and awe you with its know how.
Wise investments are not always those that seems the most proactive ones, but the ones taking advantage of the momentum.
Remember, the best marketers don't just respond profitably to the consumer's needs, they create new markets. It's the unspoken rule of the game.
What's next? Anti virus software for your gaming device and music player, as well as for your IPv6 compatible fridge? For sure, but in the very, very long run. Meanwhile, be aware, don't panic, and try to base your concerns on objective and unbiased sources only.
Stay tuned!
