A dull attempt to hack into my email from Nigeria.

Published Date: 2022/11/03 by: DaVieS

A dull attempt to hack into my email from Nigeria.
A dull attempt to hack into my email from Nigeria.

Seems like this amazing African country has some hacky potential, but so much to learn.

The thing why is this attempt worth a blog entry, because he unable to get any information, but exposed himself and this award-winning dull attempt should be worth to talk.

Well Done!

 

I got a phising email (Of Corse) from AMAZON-AWS instance that pretending that my system has became self-aware and sending under (my name) an email to change my password immediately.

ASPF-FINGERPRINT: SOA: 
ASPF-FINGERPRINT: PTR: ec2-100-26-95-170.compute-1.amazonaws.com
ASPF-FINGERPRINT: IP: 100.26.95.170
ASPF-FINGERPRINT: ELO: ip-172-26-0-145.ec2.internal
ASPF-FINGERPRINT: LOC: North America / United States
ASPF-FINGERPRINT: SRV: 14618 AMAZON-AES
ASPF-DATE: Wed, 02 Nov 2022 14:35:01 GMT
Subject: [SPAM] URGENT ACCOUNT VALIDATION SERVICE!
Dear davies,
 
This is a second notification message sent  from our database that your email account
davies@npulse.net  will expire within the next 48 hours and access to your account might be terminated.

And the only one button goes forward to: https://retesos.tk/imndx.php/?email=davies@npulse.net

retesos.tk
86.48.1.128	vmi1030152.contaboserver.net	254	Europe / Denmark	Sentia Denmark A/S

Then this site forward to https://storageapi.fleek.co/ed432db3-8379-46ce-953b-55a4dccb359c-bucket/kolm/pag.html#davies@npulse.net

(Just to mention I already submitted reports against fleek.co, coz all the attacking attempts comes from their side so I think this is not coincidence anymore)

So the fleek.co provides a website to show a HTML form that pretending to be nPulse.net which is infringing and also a felony attempt, and asking for an email and password.

After filling the form with the right details, it is become submitted into https://52.37.77.10/ojo/next.php

52.37.77.10	ec2-52-37-77-10.us-west-2.compute.amazonaws.com	0	North America / United States	AMAZON-02


This server has a directory listing enabled and thats why it clearly advertising that it has a logs.txt.
Guess what the logs.txt has? An attacker test attempts from his own IP Addresses and details.
https://52.37.77.10/ojo/logs.txt

|----------| Resultz |--------------|
Login From           : 
Online ID            : raq@crr.com
Passcode              : kmmkmkmkmkmk
|--------------- I N F O | I P -------------------|
|Client IP: 105.112.182.171
|--- http://www.geoiptool.com/?IP=105.112.182.171 -


User Agent : Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:106.0) Gecko/20100101 Firefox/106.0
|-----------------------|
|----------| Resultz |--------------|
Login From           : 
Online ID            : raq@crr.com
Passcode              : ffffffffff
|--------------- I N F O | I P -------------------|
|Client IP: 105.112.182.171
|--- http://www.geoiptool.com/?IP=105.112.182.171 -


User Agent : Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:106.0) Gecko/20100101 Firefox/106.0
|-----------------------|
|----------| Resultz |--------------|
Login From           : 
Online ID            : jiii@mail.imc
Passcode              : jjjjjjjj
|--------------- I N F O | I P -------------------|
|Client IP: 105.112.182.171
|--- http://www.geoiptool.com/?IP=105.112.182.171 -


User Agent : Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:106.0) Gecko/20100101 Firefox/106.0
|-----------------------|
|----------| Resultz |--------------|
Login From           : 
Online ID            : jiii@mail.imc
Passcode              : mvmvmv
|--------------- I N F O | I P -------------------|
|Client IP: 105.112.182.171
|--- http://www.geoiptool.com/?IP=105.112.182.171 -


User Agent : Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:106.0) Gecko/20100101 Firefox/106.0
|-----------------------|
|----------| Resultz |--------------|
Login From           : 
Online ID            : davies@npulse.net
Passcode              : g54645h45z
|--------------- I N F O | I P -------------------|
|Client IP: 195.184.9.230
|--- http://www.geoiptool.com/?IP=195.184.9.230 -


User Agent : Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.0.0 Safari/537.36
|-----------------------|
|----------| Resultz |--------------|
Login From           : 
Online ID            : davies@npulse.net
Passcode              : I just made an article from you
|--------------- I N F O | I P -------------------|
|Client IP: 195.184.9.230
|--- http://www.geoiptool.com/?IP=195.184.9.230 -


User Agent : Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.0.0 Safari/537.36
|-----------------------|
|----------| Resultz |--------------|
Login From           : 
Online ID            : davies@npulse.net
Passcode              : Please upgrade the screenshot to appear on your dull attempt too
|--------------- I N F O | I P -------------------|
|Client IP: 195.184.9.230
|--- http://www.geoiptool.com/?IP=195.184.9.230 -


User Agent : Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.0.0 Safari/537.36
|-----------------------|

 

105.112.182.171	105.112.182.171	0	Africa / Nigeria	Celtel Nigeria Limited t.a ZAIN


Due it is clearly a targeted attempt to gain access to my email address I reported this incident to every provider, and I will keep you posted what these provider did and how much time they required for an appropriate action on their side.

I have to mention that the this LAME method wont work until you manually enable to bypass SSL warning.
To question is why an attacker try his luck on a site which is about network security? - no clue.

 

 



A dull attempt to hack into my email from Nigeria.
A dull attempt to hack into my email from Nigeria.
A dull attempt to hack into my email from Nigeria.
A dull attempt to hack into my email from Nigeria.


If you like the article then don't forget to share!


Big Concern: Facebook hack, Google Chrome V8 Hack, Meta Support

Many users experiences that their account leaked through Facebook Advertisement platform.The BOT change their names to Kevin Konkrete Davis and..


Maintenance

We are doing some regular maintenance at 22:00 - 02:00 UTC. Some services might be distrupted at this time. ..


FreeBSD Bhyve Webadmin | BVCP 1.9.8 Just Released

BVCP 1.9.8 features  New protocol to transmit VNC/RFB data as encrypted and compressed.Better, faster and more responsive UI.Colored..


BVCP 1.9.8 Upcoming Features

We received a ton of feedback about our new project, BVCP.So here is a little description what we are working currently. The next release will..


Trackit-PortGuard just released

When implemented well, this software can be considered as two-factor pre-authentication.Therefore this is one of the most secure method to..


2022 annual report

Here we go another year passed away.We very well predicted the importance of energy efficiency. In the year of 2022 we faced a lot of challenges..


BVCP 1.9.0 Released Today

A major version update released out today!This update address many requests and improves overall speed and performance. Highlight of this..


Energy Saving

We have been busy since expanding our services worldwide meanwhile in other hand helping reduce CO emission in industrial-scale levels.  We..


MSSQL Fail to start on newer hardware

I recently faced with a strange issue with Microsoft Database Server.I used Bhyve as hypervisor and a Windows as Guest OS, tried to install MSSQL..

All rights reserved nPulse.net 2009 - 2023
Powered by: MVCP 2.0-RC / BVCP / ASPF-MILTER / PHP 7.4 / NGINX / FreeBSD