By: Dancho Danchev
Folks,Do you remember the international embassies web malware exploitation spree using client-side exploits that took place back in 2009 with the Russian Business Network the hosting provider of choice for these campaigns?I recently took the effort to look at my original data set here and tried to enrich it and provide additional analysis with more details and context.Sample domains known to have been operated by the same individuals behind these campaigns include:hxxp://beert54xyzhxxp://aaepgpcomhxxp://brightstonepharmacomhxxp://ksfcradiocomhxxp://ksfcnewscomhxxp://kklfnewscomhxxp://arabiandemographicscomhxxp://sig4forumcomhxxp://pornokmancomhxxp://pinalbalcomhxxp://bodinzonecomhxxp://123124comhxxp://pixfbizhxxp://frmimginfohxxp://us-shopsonlinehxxp://hornybabeslivecomhxxp://pharmacyitnethxxp://deapothekecomhxxp://cplplywoodcomhxxp://us-electroonlinehxxp://omiardocomhxxp://frmimginfohxxp://ramualdocomhxxp://pixfbizhxxp://ksfcnewscomhxxp://ksfcradiocomhxxp://kklfnewscomhxxp://odmarcocomhxxp://us-electroonlinehxxp://123124comhxxp://sig4forumcomhxxp://brightstonepharmacomhxxp://bodinzonecomhxxp://aaepgpcomhxxp://pinalbalcomhxxp://cplplywoodcomhxxp://pornokmancomhxxp://hornybabeslivecomhxxp://beert54xyzhxxp://us-shopsonlinehxxp://deapothekecomhxxp://pharmacyitnetSample personally identifiable email address accounts known to have been involved in these campaigns:nepishite555sudagmailabusecentregmailbelyaev_andreyinbox.rusrvs4yougmailmigejoshyahookseninkopetrnm.rupalfreycrossvwgmailredemptionsnapnamesmogensenfontdriftxix.x12345yahoojohnvernetgmail4ykakabragmailmironbotgmailfuadrenalraygmailincrementallist.rutraffongmailauctionr01.ruadminbrut.cnbobby10mail.zp.uaipspecgmailOdileMarcottegmailsflgjlkj45yahooSample MD5s:MD5: ca9c64945425741f21ba029568e85d29MD5: b252c210eeed931ee82d0bd0f39c4f1dMD5: 787ed25000752b1c298b8182f2ea4faaMD5: fcbd2777c8352f8611077c084f41be8cMD5: ce02bed90fd08c3586498e0d877ff513MD5: 97ff606094de24336c3e91eaa1b2d4f0MD5: a0caae81c322c03bd6b02486319a7f40MD5: 5733030dcd96cec73e0a86da468a101cMD5: 5d8398070fa8888275742db5b8bbcebf