The Spamhaus Project's avatar
The Spamhaus Project
spamhaus@infosec-exchange.mostr.pub
npub1jy9p...33yz
Spamhaus strengthens trust and safety for the Internet. Advocating for change through sharing reliable intelligence and expertise. As the authority on IP and domain reputation data, we are trusted across the industry because of our strong ethics, impartiality, and quality of actionable data. This data not only protects but also provides signal and insight across networks and email worldwide. โ€ฉWith over two decades of experience, our researchers and threat hunters focus on exposing malicious activity to make the internet a better place for everyone. A wide range of industries, including leading global technology companies, use Spamhaus' data; currently protecting over 4.5 billion mailboxes worldwide.
โœจ Reputation is everything for any reliable email service provider (ESP). One top-tier example is Amazon Web Services (AWS) SES, managing millions of IPs and domains to provide exceptional service and deliverability. Discover how SES works with Spamhaus to protect its network and reputation when at risk here: ๐Ÿ‘‰ #AmazonSES #Spamhaus #EmailDeliverability #NetworkProtection #Reputation image
Mailboxes in German-speaking countries are being targeted by an ongoing phishing spam campaign that began July 13, around midnight UTC. ๐ŸŽฃ ๐Ÿ‡ฉ๐Ÿ‡ช ๐Ÿ‡ฆ๐Ÿ‡น ๐Ÿ‡จ๐Ÿ‡ญ Approx 3,500 botnet IPs have been linked to this campaign, which uses malicious, invoice-themed Scalable Vector Graphics (.svg) attachments - currently a favorite among threat actors for disseminating malware and phishing content. As expected from a relatively mature spam campaign, the SVGs are "hashbusted" to evade hash-based detection, raise operational sandboxing costs, and hamper investigations. ๐Ÿง An earlier iteration of this spam campaign delivered malware, by luring prospective victims to a URL that ultimately infected their Windows systems with Strela Stealer. ๐Ÿ’ฅ A traffic distribution system (TDS) was used to filter out security researchers and other visitors not targeted by the miscreants. Since the start of the current campaign, spamming IPs have been added to our CSS and XBL blocklists, ensuring robust coverage by Spamhaus ZEN, which is available for free to help protect your mailboxes: ๐Ÿ‘‰ SVG-based abuse is likely to remain relevant for the foreseeable future. Where possible, configure your mail infrastructure to reject emails with SVG attachments, allowing them only on a strict need-to-work basis (e.g., for graphics or design teams). Besides using ZEN and DBL at your e-mail perimeter, ensure any outgoing network traffic is checked against DBL and DROP to protect your users from accessing phishing sites and similar threats. ๐Ÿ‘‰
๐Ÿ”ฅ Pikabot and IcedID exited the Top 20 this reporting period (thanks to โ€œOperation Endgameโ€), making way for two Android backdoor malware in at #7 and #19โ€ฆ โ€ฆfind out which ones here ๐Ÿ‘‡ ย  #Malware #BotnetCC #ThreatIntel image
๐Ÿ‘€ Spot the impersonator... When your company uses services like Cloudflare and anonymous WHOIS, how can someone differentiate between your carefully nurtured site and a "rip-off"? The answer? It's damn near impossible! So what is your guess, is the real site no. 1 or no. 2? image
Spamhaus researchers are observing an uptick in phishing ๐ŸŽฃ using the InterPlanetary File System (IPFS). Below is a recent example ๐Ÿ‘‡ This system typically used to host simple files, can be accessed with specialized clients or via gateways. What's most concerning is that... โ— there are HTTP gateways you can use with your browser that look like normal URLs. โ— there is no active side on the "server", so you get plain HTML with JavaScript. โ— there is no server side scripting (like PHP) on IPFS to receive data. ....making it easier for adversaries to post data from the phishing site to another site on the normal web. And, this issue is not limited to phishing but also happens for other kinds of abuse, such as malware and spam. Therefore: โžก Gateway providers need to use and maintain a block list and share blocked IDs with each other. โžก Hosters that host the data receiving scripts can't see the phishing site, and need to be aware that this problem exists. #IPFS #Phishing #Malware
๐Ÿฆ†๐Ÿค– Qakbot makes a return....a not-so-welcome Christmas present! Spamhaus researchers are observing low-volume Qakbot campaigns targeting specific business sectors. But, we do have some positive news.... Many of the observed botnet controllers are now offline, and the remaining ones are already known as rogue ISPs, and listed on the Spamhaus Extended DROP List ๐Ÿ‘‰ ๐Ÿ‘€ Watch this space; if anything changes, we'll keep you updated! #Qakbot #ThreatIntel #TheDuckHuntIsBackOn image
โ†‘