Category: DODGY WEBSITES

IP: 103.209.229.2 Attempted to Hack My site.

IP: 103.209.229.2 Attempted to Hack My site

Hackers Site www.wimsbd.com

“I think it is only right to give this person their five minutes of fame considering the effort they have gone to trying to hack my website”.

I used the following service to do a ‘Reverse IP Look Up’: https://www.whatismyip.com/reverse-dns-lookup/

MY WEBSITE

This is the message I had from WordPress, I have redacted some of the information and sent the hacker an email. The original WordPress message can be seen at the bottom of the screenshot.

I have enlarged the text below!

Fw: [] Failed WordPress login attempt by IP 103.209.229.2

From: xxxxxx@xxxxxxxxxxxxx Tue 08/06/2021 11:37

To: wimsbd@gmail.com

I have just done an IP Address Look UP

IP Address Location Information for 103.209.229.2

SCROLL TO READ NOTIFICATION FROM WORDPRESS

  • City: Rangpur
  • State: Rangpur
  • Country: Bangladesh
  • Postal Code: 5403
  • Time Zone: +06:00

Host Info for 103.209.229.2ASN: 135115ISP: Wims OnlineHost Name: 103.209.229.2 Domain: wimsbd.com

Proxy Check Info for 103.209.229.2

  • Proxy: No

And am wondering why you are attempting to hack www.disabledentrepreneur.uk ??????????????????????🤬🤬🤬🤬🤬🤬🤬🤬🤬🤬🤬🤬🤬🤬🤬🤬🤬
IF YOU PLAY WITH FIRE, YOU WILL GET BURNT!🔥🔥🔥🔥🔥🔥🔥🔥🔥🔥🔥🔥🔥🔥🔥🔥🔥


From: wordpress@disabledentrepreneur.uk <wordpress@disabledentrepreneur.uk>
Sent: 08 June 2021 10:48
To: xxxxxxxx@xxxxxxxxxxxxxxxx>
Subject: [] Failed WordPress login attempt by IP 103.209.229.2  

Hello,

12 failed login attempts (3 lockout(s)) from IP 103.209.229.2
Last user attempted: xxxxxxxxxxxx
IP was blocked for 20 minutes

This notification was sent automatically via Limit Login Attempts Reloaded Plugin. This is installed on your disabledentrepreneur.uk WordPress site. Please login to your WordPress dashboard to view more info.

Under Attack? Try our advanced protection. Have Questions? Visit our help section.


Unsubscribe from these notifications.

#domaintheft #domaintheives #hackers #hacking #cybercrime #cybertheft #cybersecurity #domainguard

How to spot a dodgy email.

How to spot dodgy emails.

I have never thought too much about it until one of my clients forwarded me an email he had received from a person supposedly trying to steal my business. I had to look twice and realised that the entity was actually referring to an old domain my client had until it was stolen and cybersquatted.

You can view the cyber-squatted domain here: www.firstphaseelectricalwales.co.uk you will find it points to a clothing site yet again.

You can ready the whole three part cybersqualtting incident here:

Futhermore the domain supposedly changed hands in July of this year but my client is still getting emails this tells me the same entity is still using the domain name and still has my client’s data. Had the domain really have gone to a thirdparty they would not have had access to my clients data or email address. My client’s email that he received today was to his gmail email not his company email meaning how would the new owner know about my clients gmail email unless they were one and the same entity?

So when you open these emails two things that can happen if you reply to such emails they could either be malware infected and will be embed on your computer or you may get lots of spam messages whereby the sender will be then able to use your email address and spam other people.

Another way cyber criminals work is by using undisclosed email addresses this way they can send bulk emails. An undisclosed email may be used if you previously have had an email subscription and your email has be leaked or sold to a thirdparty that may then want to send out spam emails in bulk.

This goes against your privacy protection and you have to remember that email lists are worth a lot of money to some people so it stands to reason that they can be sold and misused.

How to spot a dodgy email.

This is an actual email I received to my private email account.

Apple know how to spell and they use their company name to send out information.

Check For Misspellings

The first and most obvious tip-off is misspellings. In the header above, the name of the company is spelled incorrectly, and the likelihood that a big corporation would misspell its own name is pretty unlikely.

Also look out for subdomain names such as info@subdomain.company.com No legitimate company would send out emails from their subdomain. Subdomains are the extension to a the originators website and are mainly used for blogs: https://ukdomainbrokers.ukwebsitedesigners.co.uk/

So for all intent and puposes the above is an example of my sub domain and I would not send out an email from info@ukdomainbrokers.ukwebsitedesigners.co.uk. I would however send one out from info@ukwebsitedesigners.co.uk

IP Address

Another quick trick is to look up the IP address the message came from. If it’s in a different country than the company, it’s probably fake.

Received From

The “Received” line tells you where the email originated from. If the email is actually from who it says it’s from, it would probably come from the company’s website. In the email above, the website the email came from has nothing to do with the company it says it’s from. If however the email mimicks your email the sender is hiding their identity.

Reply To

Same goes for the “Reply To” field. You can tell the email address has been spoofed because the “Reply To” address doesn’t match the “From” address.

Spoofing:

Email spoofing the process of disguising the original senders identity by creating email messages with a forged sender email address. The core email protocols do not have any mechanism for authentication, making it common for spam and phishing emails to use such spoofing to mislead or even prank the recipient about the origin of the message.

Final Notes.

Always check the recipients email. If you do not know or were not expecting anything from anyone DO NOT OPEN EMAIL ATTACHMENTS.

If you get emails from web designer telling you your website is s##t do ask your current web designers to send an audit report of your website. Also if the sender is sending you an email from a gmail, hotmail or msn account without a company signature in the footer of the email this is reason for alarm bells to ring.

DO NOT USE OFFSHORE WEBSITE DESIGNERS.

SUPPORT LOCAL BUSINESSES!

Do not reply to anyone that has a suspicious email address, especially if it is a long thread of letters and numbers that do not resemble a person or company.

Always check email addresses from the sender.

Lastly always mark emails that have landed in your inbox as ‘report phishing’ rather than simply deleting them as the email client will block this email from their servers to stop other people falling victim.

Scam Alert Domain Name Phishing

Cyber Crime.

Scam Email to attempt cyber theft of my domain name.

Cyber crime is rife at the moment not just with domain theft but scammers doing everything they can to extract money from less fortunate people.

Yesterday I wrote a post on my other blog https://marketingagency.cymrumarketing.com/2020/11/03/scam-alert-letter/ about a Scam Letter I received from a banker, by coincidence an unrelated to the email I also wrote about a banker betting $5 Million Dollars on Donald Trump winning the election.

I named and shamed this person whom sent me the email whom most probably is not even using their real name. So low and behold today I receive another email to a website I own which is a Business Directory and Community Hub for the district in Cardiff UK where I live ‘Roath’.

Now you have to think to yourself how would this keyword be a conflict or beneficial to anyone in China?

The domain is: www.roathlife.com

The email is as follows and when I replied back it bounced, you can come to your own conclusions but I think some one is attempting to scam me and whoever it is has to get up earlier than me to catch me out.

Original Scam Email.

Nick Liu <nick@chinaregistryshanghai.org> 05:35

To  info@roathlife.com

(It’s very urgent, therefore we kindly ask you to forward this email to your CEO. If you believe this has been sent to you in error, please ignore it. Thanks) Dear CEO, This is a formal email. We are the Domain Registration Service company in China. Here I have something to confirm with you. On November 4, 2020, we received an application from Hongxin Ltd requested “roathlife” as their internet keyword and China (CN) domain names (roathlife.cn, roathlife.com.cn, roathlife.net.cn, roathlife.org.cn). But after checking it, we find this name conflict with your company name or trademark. In order to deal with this matter better, it’s necessary to send email to you and confirm whether this company is your distributor in China?   Best Regards

Nick Liu | Service & Operations Manager

China Registry (Head Office)

Tel: +86-02161918696

Fax: +86-02161918697

Mob: +86-13816428671

6012, Xingdi Building, No. 1698 Yishan Road, Shanghai 201103, China

*****************************************

This email contains privileged and confidential information intended for the addressee only. If you are not the intended recipient, please destroy this email and inform the sender immediately. We appreciate you respecting the confidentiality of this information by not disclosing or using the information in this email.

My reply was:

Dear Nick Liu,

My name is Renata Maziak Barnes, I am the legal owner of the said domain names www.roathlife.com and www.roathlife.co.uk.
These domains have been registered and are developed by me. I also own www.ukdomainbrokers.com and specialise with UDRP’s.

Your domain names are on different GEO territories to myself being the owner from the time 2020-03-06 and I have actively developed my sites, therefore  there is no trademark conflict as I was the first person to publicly publish my domains names.

I would suggest your client refrains from registering the domain names because this could cause a problem in future, although I have no intention of ever marketing my business in China.

www.roathlife.cn is not registered and has no whois data

www.roathlife.com.cn is not registered and has not whois data
www.roathlife.net.cn is not registered and has no whois data
www.roathlife.org.cn is not registered and has no whois data

I await your reply at your earliest convenience.

Yours Truly,

Renata Maziak Barnes
Founder
www.roathlife.com
www.roathlife.co.uk
Tel: +44 (0) 7565253529

Mail delivery failed: returning message to sender

Mail Delivery System<mailer-daemon@kundenserver.de>

To  info@roathlife.com

This message was created automatically by mail delivery software.
A message that you sent could not be delivered to one or more ofits recipients. This is a permanent error. The following address(es)failed:
nick@chinaregistryshanghai.org:SMTP error from remote server for RCPT TO command, host: mx.chinaregistryshanghai.org (199.195.251.131) reason: 550-Rejected because 82.165.159.43 is in a black list at zen.spamhaus.org550 https://www.spamhaus.org/sbl/query/SBL275660

— The header of the original message is following. —
Received: from oxbsltgw54.schlund.de ([172.19.249.7]) by  mrelayeu.kundenserver.de (mreue106 [213.165.67.115]) with ESMTPSA (Nemesis)  id 1MnItm-1jtEYQ3Htc-00jJDA for <nick@chinaregistryshanghai.org>; Wed, 04 Nov  2020 14:09:54 +0100Date: Wed, 4 Nov 2020 13:09:53 +0000 (GMT)From: info <info@roathlife.com>To: Nick Liu <nick@chinaregistryshanghai.org>Message-ID: <439891402.17398.1604495393295@email.ionos.co.uk>In-Reply-To: <202011041335263262056@chinaregistryshanghai.org>References: <202011041335263262056@chinaregistryshanghai.org>Subject: Re: roathlifeMIME-Version: 1.0Content-Type: multipart/related; boundary=”—-=_Part_17396_1939878953.1604495393253″X-Priority: 3Importance: NormalX-Mailer: Open-Xchange Mailer v7.10.3-Rev26X-Originating-Client: open-xchange-appsuiteX-Provags-ID: V03:K1:0iM3qWu96k7+nm6+4FH27tKPwLRBi3asRo6IkltspIx3TiUD8kb  64Uvu0jRQatF1oh4vDfkRIqu/dq6NyeeDKKZXgjPLwi3RTMcoCU6+tQ/oULYFxnptlDS3oS  IlPnkssjWtzaXo3GN5ANdoR8YOAFSgjH7j7v7yiwWdYUG6l3EGRySxCDl5dFixgSGqCZFZc  7KMuQNqSZjTIl6nphFPyA==X-Spam-Flag: YESX-UI-Out-Filterresults: junk:10;V03:K0:dkv51dmL+xI=:uYemXnJzgY5oUhy06auNt9z0  /s6XKe4ewOfXuhxlYsCuQnjZQZ8rRyx3d9vm8um4MQVT2TCP40TEZLgS+hlkJ7zOGoNigfUsO  /uxX0VlvP1Y2598VU7SFDa71yNpiYn57pI+0NRWuxMDVxzXftUBgs9OWRrR2YcRpBBBLAc4OL  uQE+bUIjVqcX7gI9Ht/2gH/HmgicgKTL7IRwiJmPzRin6agRweednEeaGngyVgz1hFNU/JwWe  aFqNNvU0Q+2UHmAdKte0AlLqugU/30/GG++dkm//fmctpH/2xvAOMmWRH3UMEjaQybSFNEGIv  rVSrzn+pPorxI8nsm5NaMKHrKhFiP4kZ3xt/yT8fY9Tc/b6BOBTtFT41i5RNa/cP14dDxlVG/  Grj3D5HVH4qNOjgzjPEcQFhvViI8WGsQFX+gLi1NC7E/EIpaWoXFI3YD4oL0ihfpC/JoCsPL3  /SLhxA6S4CWKkdsFvBSQfJNSddtAnxDwjcsy+RS5YEGl4i6nIqqFkNTeFeiU7lMpeE1I85/AN  uc79t8O70Dx02z5zhq2c=

PHISHING EMAILS & SCAMMERS

PHISHING EMAILS & SCAMMERS.

PHISHING EMAILS.

What is phishing.

People who prey on vulnerable people online are called cyber criminals.

These cyber criminals use a multitude of strategies to help someone part with sensitive information in order then to commit a crime.

The most common is email phishing whereby the recipient opens an email with a virus in it called malware. Malware can infiltrate the users computer and will collect data without the user knowing. Another way a cyber criminal targets a user is through telephone or text message by someone posing as a legitimate institution to lure an innocent person into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords. This as a consequence can lead to identity theft.

If you notice an email that has clickable hyperlinks and attachments do some due diligence.

I will post a couple of emails that I have had today.

Cyber crime has been around for a very long time with the first phishing lawsuit filed in 2004 against a teenager from California who cloned a website “America Online”. This fake website conned people into thinking it was the real deal and as a consequence sensitive data from users was stolen to gain access to credit card details to withdraw money from their accounts. There are other ways that cyber criminals work other than through emails and website phishing. These other methods can also be ‘vishing’ (voice phishing), ‘smishing’ (SMS Phishing).

Most Popular Email Phishing is ad follows:

(In most case you do not know who has sent you the email but cybercriminals are being clever by cloning a popular organization such as Netflix, Apple, HMRC, GOV websites and Banks).

  1. Always be vigilant and open the senders email address to see if the sender looks legitimate or not.
  2. Sometimes the sender may look legit as in the example I set out below but may have a clickable hyperlink. Never click on clickable links or download attachments if you are not expecting anything from anyone or do not know who the sender is.
  3. Sometimes the cybercriminals may use an alternative website very similar to the original one to make it look like the email was sent from the real company. Usually by simply opening the senders email address you can see if they are the ‘Real McCoy’ or not. If you have been cc’d and you can see multiple recipients this is either spam or a virus.
  4. Sometimes you may get an email saying you have been hacked and you are being blackmailed to pay them with bitcoin within 24 hours or all your data will be sold on the dark web. Never interact with these people as it only could cause further problems, instead block and report and change you passwords.

What do you do when you receive these email?

Depending on your email client. I use outlook for mine I can block their email and then report them as phishing emails. I think what Microsoft does is bounce all emails from the sender after they get reported or block them permanently.

Remember that clickable hyperlinks and attachments could contain payloads like ransomware or other viruses. Hyperlinks are either blue or purple and your cursor turns into an arrow when you hover over them.

Below is a couple of dodgy emails I received today one forwarded from my client and when I phoned the number it went dead. (I did not click it ). The other thing may I add is if you type any words after the forward slash of any domain name that does not correspond to a created page, the search results will always be the same and will come up with a 404 error message or page not found. This is a way for a non IT person who relies on Web Designers and may not realise the danger they may be in by receiving an email like the one below and may inevitably end up get hood winked and scammed.

This is a virus email was sent to my client and then forwarded onto me.

The second email was from an Insurance Company.

In the last few days I attempted to set up dentistry insurance only to find the Cardiff in particular al though it applies to all of Wales in the UK as from Friday 23rd October to 9th November 2020 we are on lockdown again. So before I could even set up the dentistry plan I then had second thoughts and cancelled it this morning and asked if the company I was dealing with was associated with Close Brothers and they said they were not.

I then rang ‘Close Brothers’ after attempting to copy and paste the url into my browser

https://www.closebrothersbanking.com/registration/

and found the url/domain does not exist.

I did however phone the real Closebrothers.com website and they did seem to have my account details but they could not tell me who set up the new insurance?

They did however say if I have cancelled the health plan that I told them about then the company should cancel any direct debits.

From what I can see I only have one DD with this company for my home insurance which was renewed this month but that would not be a new DD, it would just carry on.

What Closebrothers did say was that my insurance DD was made through Atlantis 1.

When I asked for their website they could not tell me the domain name and upon further investigation I came up with https://www.autonetinsurance.co.uk/ which has no mention of Atlantis 1 other than in Companies House https://find-and-update.company-information.service.gov.uk/company/03642372 which appertains to Autonet Insurance Services LTD.

Why set a name called Atlantis 1 and then use a totally different name for the domain name……….very confusing and I have not got a clue who sent me this email and why. Obviously I will have to wait it out.

Be careful we do not want to be shark bait!

Industry Categories