URL in IP Formats which are Supported by Browsers

Posted: October 20th, 2012 | Author: | Filed under: IT Related | 2 Comments »

I’m not sure for the terms used in the title, but what I’m trying to say is..

It’s not over yet. Find out more at:

  1. https://hackvertor.co.uk/hvurl/3x
  2. http://www.pc-help.org/obscure.htm

Please leave your comment with additional awesome example 🙂


Malaysian Research & Education Network Serving BlackHole

Posted: October 20th, 2012 | Author: | Filed under: IT Related | No Comments »

It’s been a while since the last update. What a busy weeks..

I’ve subscribed to MalwareDomainList‘s RSS and recently I’ve found a couple of entries on BlackHole Exploit Kit hosted in Malaysia. I’ve performed a quick analysis on the domains and found that, it is confirmed serving BlackHole Exploit Kit v2.0.

And as for the detection rate in Virustotal: 4/44

I’ve done a quick analysis on the IP using robtex and hostmap, there are 12 (or more) .RU domain associated with the IP. Most of the domains store multiple A record for their DNS. 2 of the IPs are in US, and 1 in Malaysian Research & Education Network.


Weekly Summary : Android tel URi and Malaysia Grey Cloud

Posted: October 2nd, 2012 | Author: | Filed under: IT Related | Tags: , , , , | No Comments »

What a busy week so here is my late update.

I’ve been asked by my wife on this weird javascript pattern. I’m not managed to download the content of the php file due to it has been removed, and some of them were giving me infinite loop of 302. Someone tweet me and ask me to set the referrer as the URL of the ‘infected’ website. A few hours later, I’ve saw a blog post “Redkit Exploit Kit: upgrades in anti-forensics.” popping up from my RSS reader. Mystery solved!

You might have heard about remote USSD attack has been discussed last week. This ‘vulnerability’ exist due to improper handling of “tel:” URi in Android. It affects many phones and according to this entry, it has been verified on not only Samsung Galaxy S3, but also on an HTC One X (running HTC Sense 4.0 on Android 4.0.3) and a Motorola Defy (running Cyanogen Mod 7 on Android 2.3.5). Patch has been released to address this issue and Android 4.1 has been verified not vulnerable to this vulnerability. Alternatively, users can use TelStop or Auto-Reset Blocker to prevent tel URi to be executed without user prompt.

A little update from Malaysia landscape. Exabytes has announced that their cloud server has been compromised and some virtual machines and data have been deleted. Official announcement can be found here.

Thats all.. Stay safe