-
-
Notifications
You must be signed in to change notification settings - Fork 216
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
amazonaiy.co #497
amazonaiy.co #497
Conversation
That particular link are no longer available The domain it self can't find it's index file either, so putting this one on hold https://kb.mypdns.org/issue/MTX-1188/amazonaiy.co#focus=Comments-4-252.0-0 |
@g0d33p3rsec Do you have any active links? otherwise I'm going to close this as fixed by the webhoster |
Closing as inactive |
I don't have any additional links, just the sms lure that isn't resolving. My apologies for the delayed response, I've been on the road. |
isn't the sidewalk a safer playground 😉 |
Perhaps, but safety is overrated. For what its worth, I just received another lure using the same format, for a different domain, that was also dead on arrival. Notice how the lure always starts with [AMAZ0N]. The domain is still resolving to an IP address, but the link 404's. https://urlscan.io/result/a1d066e8-9ad9-4766-aebf-ed61a88ced47/
|
Both domains are hosted at DataWagon... should we be so lucky that they actually scan new domains for badware? PS: this is one of many reasons to blacklists |
It is starting to look like there may be something else going on. I have since received two more lures of the same format that were both also dead on arrival. The first redirected to 1b2v[.]co at The second redirected to amazonmaz[.]com at I'm still not quite sure what to make of the behavior but find it unlikely that an actor would continue to use domains in lures that have already been killed by the provider.
|
Wow, your right, it wont make seance to keep using a dead domain.. but I know why... they moved to the most well knows phishing network Drilling for amazonaiy.co amazonaiy.co. 3600 IN NS reza.ns.cloudflare.com.
amazonaiy.co. 3600 IN NS ezra.ns.cloudflare.com.
amazonaiy.co. 300 IN A 104.192.1.23 |
Phishing Domain/URL/IP(s):
Impersonated domain
Describe the issue
I received a sms lure with a shortened link that resolved to this domain. The message was:
Related external source
Screenshot
Click to expand