|
Cybercriminal network Innovative Marketing made headlines in rogue scareware’s heyday. Between its founding in Kyiv, Ukraine, in 2009 and the three years it continued operating, the company reportedly amassed close to US$700 million in revenue.
Today, Innovative Marketing founders, Shaileshkumar P. Jain and Bjorn Daniel Sundin, remain on the Federal Bureau of Investigation (FBI) most wanted list for wire fraud, conspiracy to commit computer fraud, and computer fraud. Anyone who can provide information on the two’s whereabouts stand to gain US$20,000 for their capture.
We sought to find out if the Innovative Marketing rogue scareware products continue to pose a threat more than a decade down the line. Our deep dive revealed these findings:
As part of our ongoing effort to enable cybersecurity analysts and researchers to further their studies, we collated all pertinent data and made it available to anyone interested. You may download the related threat research materials here.
We started our investigation with 992 domains known to have hosted Innovative Marketing rogue scareware pages throughout its operation. Examples of these are:
Interestingly, despite the outstanding warrant for the company’s founders, the Innovative Marketing site is still up and running according to a screenshot lookup.
We also used 81 registrant email addresses found in the domains’ historical WHOIS records. Most of these were created using free email services, notably Hotmail, Yahoo!, and Gmail.
We began by subjecting the 991 domain IoCs to Domain Name System (DNS) lookups. That gave us 126 unique IP resolutions. Examples of the IP addresses 191 out of the 991 domain IoCs resolved to are:
Malware checks via Threat Intelligence Platform (TIP) revealed that 14 of the 126 IP addresses were dubbed “dangerous” by various malware engines. These are:
We then did reverse IP lookups for the 126 IP addresses, which gave us a sample of 381 domains that shared them as hosts. There could be tons more, though. Here are some a few sample connected domains:
While only three of them—kay4kona[.]com, 002145f8abd4[.]com, and 09876543211234567890[.]com—were dubbed “dangerous” by various malware engines, steering clear of all of them is advised due to their connection to the domain IoCs.
For good measure, we also performed reverse WHOIS lookups on current records only using the email address IoCs as search terms and found that 45 were still actively being used to register thousands of domains, at least 53,950 (results per email address were limited to a maximum of 10,000) to be exact.
Interestingly, six of the additional domains contained security- or antivirus-related strings akin to the ones Innovative Marketing used. Examples include mydiysecurity[.]com and vulcansecurity[.]com. We didn’t subject them to a malware check, though, as most probably belong to domainers, as evidenced by several screenshot lookups made that revealed the domains were parked. Given their connections, however, to a known threat email address, it may be best to avoid accessing or, worse, purchasing any of them.
While we can’t be sure if Innovative Marketing’s malware business remains operational, we do know that its website is still active and both its founders have not been incarcerated.
And given their ties to the domains and email addresses known for being part of the cybercriminal operation, users should avoid accessing the thousands of connected web properties we identified, especially the 14 IP addresses and three domains that TIP dubbed “dangerous.”
If you wish to perform a similar investigation, please don’t hesitate to contact us. We’re always on the lookout for potential research collaborations.
Sponsored byVerisign
Sponsored byRadix
Sponsored byWhoisXML API
Sponsored byDNIB.com
Sponsored byIPv4.Global
Sponsored byCSC
Sponsored byVerisign