Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article

Skip to comments.

Embassy of Portugal in India Serving Malware
DANCHO DANCHEV's Blog ^ | WEDNESDAY, MARCH 25, 2009 | Dancho Danchev

Posted on 03/25/2009 4:29:32 PM PDT by Cindy

Yet another embassy web site is falling victim into a malware attack serving Adobe exploits to its visitors. As of last Friday, the official web site of the Embassy of Portugal in India has been compromised (embportindia.co.in). Who's behind the attack? Interestingly, that's the very same group that compromised the Azerbaijanian Embassies in Pakistan and Hungary earlier this month. Assessing this campaign once again establishes a direct connection with the Rusian Business Network's pre-shutdown netblocks and static locations.

(Excerpt) Read more at ddanchev.blogspot.com ...


TOPICS: Computers/Internet; Reference
KEYWORDS: computer; computers; embassies; embassy; embassyofportugal; india; internet; malware; portugal; russia; tm

1 posted on 03/25/2009 4:29:32 PM PDT by Cindy
[ Post Reply | Private Reply | View Replies]

To: All

Previously...

http://ddanchev.blogspot.com/2009/03/azerbaijanian-embassies-in-pakistan-and.html

WEDNESDAY, MARCH 11, 2009
“Azerbaijanian Embassies in Pakistan and Hungary Serving Malware”

SNIPPET: “Both embassies are embedded with identical domains, parked at the same IP and redirecting to the same client-side exploits serving URL operated by Russian cybercriminals.”


2 posted on 03/25/2009 4:30:56 PM PDT by Cindy
[ Post Reply | Private Reply | To 1 | View Replies]

To: All

Previously...

http://ddanchev.blogspot.com/2009/03/ethiopian-embassy-in-washington-dc.html

“Ethiopian Embassy in Washington D.C. Serving Malware”
by Dancho Danchev
(March 18, 2009)

SNIPPET: “Oops, they keep doing it again and again. The web site of the Ethiopian Embassy in Washington D.C (ethiopianembassy.org) has been compromised and is currently iFrame-ed to point to a live exploits serving URL on behalf of Russian cybercriminals, naturally in a multitasking mode since the iFrame used to act as a redirector in several other malware campaigns.

Despite that the iFrame domain (1tvv .com/index.php) is already “taken care of”, details on the original campaign can still be provided.”


3 posted on 03/25/2009 4:33:59 PM PDT by Cindy
[ Post Reply | Private Reply | To 2 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson