Monday, 4 February 2013

Phish-BankFraud (EDF, CAF, and now Carrefour)

These days they do EDF+CAF and back with Carrefour.

 EDF: > 2/33

$send = "";
$subject = "EDF : $ip";
$from = "From: Tool4Spam.Com";


Dumped pages:

Mechanism is interesting on this one

It extract a zip file inside a a freslhy created dir and write EDF customer IP on Vcounter.txt

Seem the bad guys tested it to see if everything work :)
It's always these 41.x IP from Morocco.
(CF: Access logs of

The bad guys leaved Backdoor.PHP.WebShell.BD (WSO 2.4) as usual:



And some others craps...

For CAF and Carrefour they have not used Hijacked servers (just for redirect).

The CAF mail is just a big failure:

Bank customers reply to phishing e-mail:

A new tool appeared, phishers will be probably interested.

Also i got an interesting mail:
That become a problem when hackers use hijacked servers (especially for phishing and malware hosting)
I concider myself as borderline, i re-break theses servers with my real IP to get the malicious stuff.
I leave files untouched, including hackers files, sometime i probably make more shit than them on log files, i don't edit thems to hide my IP.
I never got sued for hacking a compromised machine and i hope that will not happen.


  1. Hope you won't get sued for your interesting work.

  2. Déjà qu'ils ne voient pas que leur serveur est corrompu, alors qu'il se rendent compte que tu es venu faire un tour... tu peux rester tranquille :)
    En tout cas continu comme ça, tes articles sont vraiment sympa!