Page 2 of 4 FirstFirst 1234 LastLast
Results 11 to 20 of 36

Thread: Feds shutter DNS malware scam that infected 4 million PCs

  1. #11
    David H. Lipman Guest

    Re: Feds shutter DNS malware scam that infected 4 million PCs

    From: "~BD~" <~BD~@nomail.afraid.org>

    > David H. Lipman wrote:
    >> From: "siljaline"<spam@uce.gov>
    >>
    >>> <http://www.wilderssecurity.com/showthread.php?t=311763>
    >>>
    >>> <http://www.dslreports.com/forum/r265...hat-infected-4
    >>> -m illion-PCs>
    >>>
    >>> Note: Mods at DSL Reports are rather Anal and don't allow for cross-posting of Wilders
    >>> links.
    >>> Pissed off ? Yes !!
    >>>
    >>> Silj
    >>>

    >>
    >> I love this part...
    >>
    >> https://krebsonsecurity.com/2011/11/...ed-in-estonia/
    >>
    >> "Estonian authorities arrested six men, including Vladimir Tsastsin, 31, the owner of
    >> several Internet companies that have been closely associated with the malware community
    >> for many years. Tsastsin previously headed EstDomains Inc. a domain name registrar that
    >> handled..."
    >>
    >> We all knew that EstDomains Inc was crooked to the core.

    >
    >
    > Please clarify the *we* in your statement, Mr Lipman.
    >
    > If you *knew* the organisation was 'crooked to the core', did you report the fact to the
    > appropriate authorities? If so, how long ago?
    >
    > If not, why not?
    >
    > Just wondering. Others reading here might be wondering too!


    Normally I would NOT give you the time of day with an answer but I'll give you this
    references...

    HostExploit.Com, "Atrivo – Cyber Crime USA", Jart Armin, August 2008

    "A further key factor for cyber crime is anonymity, the most important of these Atrivo
    associations is, EstDomains (anonymous registrant), EstHost (anonymous hosting),
    PrivacyProtect (anonymous registrant), LogicBoxes (hosting servers). "

    HostExploit.Com, "EstDomains Active Domain List and Registrar Abuse", December, 15 2008

    HostExploit.Com, "McColo - Cyber Crime USA", Edited by: Jart Armin, 2008 v2.0

    "We reported on criminal influence at Estdomains and others and complete lack of due
    diligence elsewhere including Xin Net, Beijing Innovative and others. These are in essence
    self-policing companies, who in theory are supposed to keep criminals off their networks.
    But when ICANN won't enforce its contracts with Registrars and criminals are throwing
    money at Registrars, the choice is obvious. In the end it hurts the Internet user and
    consumer. As consumers and users of the global network we are being marginalized. Just
    this past week Knujon's Dr. Robert Bruen traveled to an ICANN meeting to speak on behalf
    of us and the consumer but was told that his voice was unwanted. "

    Getting back to Krebbs URL...

    "Reporting for The Washington Post in September 2008, I detailed how Tsastsin’s prior
    convictions in Estonia for credit card fraud, money laundering and forgery violated the
    registrar agreement set forth by the Internet Corporation for Assigned Names and Numbers
    (ICANN), which bars convicted felons from serving as officers of a registrar. ICANN later
    agreed, and revoked EstDomains’ ability to act as a domain registrar, citing Tsastsin’s
    criminal history."

    I read those documents back in '08.

    --
    Dave
    Multi-AV Scanning Tool - http://multi-av.thespykiller.co.uk
    http://www.pctipp.ch/downloads/dl/35905.asp



  2. #12
    Dustin Guest

    Re: Feds shutter DNS malware scam that infected 4 million PCs

    "David H. Lipman" <DLipman~nospam~@Verizon.Net> wrote in
    news:j9hi8j027nm@news3.newsguy.com:

    > From: "siljaline" <spam@uce.gov>
    >
    >> <http://www.wilderssecurity.com/showthread.php?t=311763>
    >>
    >> <http://www.dslreports.com/forum/r265...S-malware-scam
    >> -that-infected-4-m illion-PCs>
    >>
    >> Note: Mods at DSL Reports are rather Anal and don't allow for
    >> cross-posting of Wilders links.
    >> Pissed off ? Yes !!
    >>
    >> Silj
    >>

    >
    > I love this part...
    >
    > https://krebsonsecurity.com/2011/11/...gpins-arrested
    > -in-estonia/
    >
    > "Estonian authorities arrested six men, including Vladimir Tsastsin, 31,
    > the owner of several Internet companies that have been closely
    > associated with the malware community for many years. Tsastsin
    > previously headed EstDomains Inc. a domain name registrar that
    > handled..."
    >
    > We all knew that EstDomains Inc was crooked to the core.


    It's nice when you *know* some individuals are eating a lot!!! of crow now.



    --
    Character is doing the right thing when nobody's looking. There are too
    many people who think that the only thing that's right is to get by, and
    the only thing that's wrong is to get caught. - J.C. Watts

  3. #13
    Dustin Guest

    Re: Feds shutter DNS malware scam that infected 4 million PCs

    ~BD~ <~BD~@nomail.afraid.org> wrote in news:j9hpm9$sil$1@dont-email.me:

    > Hey! How've you been, FTR? :-)


    Are you really expecting a response? Was his sarcasm too difficult for you in
    the other newsgroup? Or, do you think he's your pal? LOL!

    > Still snowy there?


    While you wait for a response, hold your breath.



    --
    Character is doing the right thing when nobody's looking. There are too many
    people who think that the only thing that's right is to get by, and the only
    thing that's wrong is to get caught. - J.C. Watts

  4. #14
    David H. Lipman Guest

    Re: Feds shutter DNS malware scam that infected 4 million PCs

    From: "Dustin" <bughunter.dustin@gmail.com>

    > "David H. Lipman" <DLipman~nospam~@Verizon.Net> wrote in
    > news:j9hi8j027nm@news3.newsguy.com:
    >
    >> From: "siljaline" <spam@uce.gov>
    >>
    >>> <http://www.wilderssecurity.com/showthread.php?t=311763>
    >>>
    >>> <http://www.dslreports.com/forum/r265...S-malware-scam
    >>> -that-infected-4-m illion-PCs>
    >>>
    >>> Note: Mods at DSL Reports are rather Anal and don't allow for
    >>> cross-posting of Wilders links.
    >>> Pissed off ? Yes !!
    >>>
    >>> Silj
    >>>

    >>
    >> I love this part...
    >>
    >> https://krebsonsecurity.com/2011/11/...gpins-arrested
    >> -in-estonia/
    >>
    >> "Estonian authorities arrested six men, including Vladimir Tsastsin, 31,
    >> the owner of several Internet companies that have been closely
    >> associated with the malware community for many years. Tsastsin
    >> previously headed EstDomains Inc. a domain name registrar that
    >> handled..."
    >>
    >> We all knew that EstDomains Inc was crooked to the core.

    >
    > It's nice when you *know* some individuals are eating a lot!!! of crow now.
    >
    >
    >


    LOL - And shoe leather.



    --
    Dave
    Multi-AV Scanning Tool - http://multi-av.thespykiller.co.uk
    http://www.pctipp.ch/downloads/dl/35905.asp



  5. #15
    Nobody > (Revisited) Guest

    Re: Feds shutter DNS malware scam that infected 4 million PCs

    On 11/10/2011 2:37 PM, ~BD~ wrote:
    > If you *knew* the organisation was 'crooked to the core', did you report
    > the fact to the appropriate authorities? If so, how long ago?
    >
    > If not, why not?
    >
    > Just wondering. Others reading here might be wondering too!


    Hey dip****....

    Read the writeups on how long the authorities and other organizations
    have been working this.

    Many of us have been involved for years on this one. We don't do it
    here, there are a number of private forums and networks devoted to
    tracking this crap.

    Mr. Lipman and I do see each other in those (waves, Dave).

    You are just pissed off because none of them will let *you* in.


    --
    "**** this is it, all the pieces do fit.
    We're like that crazy old man jumping
    out of the alleyway with a baseball bat,
    saying, "Remember me mother****er?"
    Jim “Dandy” Mangrum

  6. #16
    ~BD~ Guest

    Re: Feds shutter DNS malware scam that infected 4 million PCs

    Peter Foldes wrote:
    > "siljaline" <spam@uce.gov> wrote in message
    > news:j9h126$gdb$1@dont-email.me...
    >
    > <http://www.wilderssecurity.com/showthread.php?t=311763>
    >
    >
    >
    >
    > Thanks Silj



    http://i56.tinypic.com/smge3s.jpg

  7. #17
    ~BD~ Guest

    Re: Feds shutter DNS malware scam that infected 4 million PCs

    Dustin wrote:
    > ~BD~<~BD~@nomail.afraid.org> wrote in news:j9hpm9$sil$1@dont-email.me:
    >
    >> Hey! How've you been, FTR? :-)

    >
    > Are you really expecting a response?


    I am.

    > Was his sarcasm too difficult for you in
    > the other newsgroup?


    I enjoy FTR's sense of humour! ;-)

    > Or, do you think he's your pal? LOL!


    Why do you think that funny?

    He's certainly been a mentor. I like to think he's a pal, too.

    Do you know otherwise?

    >> Still snowy there?

    >
    > While you wait for a response, hold your breath.


    If he's not driven off the snowy roads, I *do* expect him to come back!


  8. #18
    Bullwinkle. Guest

    Re: Feds shutter DNS malware scam that infected 4 million PCs

    Care to explain to the folks here what the action
    was going to be if you did not "volunteer" to leave the
    Navey when you did?

    You were/are a very sick/odd Freak



    "~BD~" <~BD~@nomail.afraid.org> wrote in message
    news:j9j32v$bof$1@dont-email.me...
    Dustin wrote:
    > ~BD~<~BD~@nomail.afraid.org> wrote in news:j9hpm9$sil$1@dont-email.me:
    >
    >> Hey! How've you been, FTR? :-)

    >
    > Are you really expecting a response?


    I am.

    > Was his sarcasm too difficult for you in
    > the other newsgroup?


    I enjoy FTR's sense of humour! ;-)

    > Or, do you think he's your pal? LOL!


    Why do you think that funny?

    He's certainly been a mentor. I like to think he's a pal, too.

    Do you know otherwise?

    >> Still snowy there?

    >
    > While you wait for a response, hold your breath.


    If he's not driven off the snowy roads, I *do* expect him to come back!


  9. #19
    Bullwinkle. Guest

    Re: Feds shutter DNS malware scam that infected 4 million PCs

    Care to explain to the folks here what the action
    was going to be if you did not "volunteer" to leave the
    Navey when you did?

    You were/are a very sick/odd Freak

    "~BD~" <~BD~@nomail.afraid.org> wrote in message
    news:j9j1ej$1iv$1@dont-email.me...
    Peter Foldes wrote:
    > "siljaline" <spam@uce.gov> wrote in message
    > news:j9h126$gdb$1@dont-email.me...
    >
    > <http://www.wilderssecurity.com/showthread.php?t=311763>
    >
    >
    >
    >
    > Thanks Silj



    http://i56.tinypic.com/sge3s.jpg


  10. #20
    ~BD~ Guest

    Re: Feds shutter DNS malware scam that infected 4 million PCs

    Bullwinkle. wrote:
    > Care to explain to the folks here what the action
    > was going to be if you did not "volunteer" to leave the
    > Navey when you did?



    Come back when you have finished school and know how to spell. OK?

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •