scamFRAUDalert.ORG cybersquatting WARNING

A Cybercriminal has registered one of our domain name scamFRAUDalert.org and isshutterstock_344117816-1 hijacking indexed urls  of ours and redirecting traffic. Essentially what this CRIMINAL (samirnet2@gmail.com) is doing is to hijack scamFRAUDaler.org urls and  twitter URLs redirecting traffic

scamFRAUDalert.org
REDIRECT WEB TRAFFIC

To MALWARE INFESTATION sites

sfa-for sale.png

whoismark_

We were able to identify the criminal publisher ID as Pub-2955686772232536. This practice is known as cybersquatting.

Cybersquatting is a common practice online. Stealing brand names via registering domains or hijacking links or urls and redirecting traffics.

scamFRAUDalert is no exception. What is increasing becoming annoying is the amount of interest in our domain name. Dozens of so called scam ALERT sites have emerged. A cyber criminal has purchased the domain name scamfraudalert.org and is actively attempting to infect as many computers as possible.

SCAMMERS  have reinvented themselves to now providing ALERTS in all world to confused, muddy and discredit legitimate scam sites as ours.

Cybersquatting is a practice of registering, selling or using a domain name with the intent of profiting from the goodwill of someone else’s trademark. It generally refers to the practice of buying up domain names that use the names of existing businesses with the intent to sell the names for a profit to those businesses.

Below is the latest attempt of this squatter – URL discarded t.co / iB1oliNuVY
SFA_org_T.co Squatter
You get redirected to a Malware Infested Site
SFA_org_T.co Squatter2

Read About the Phishing and Malware Expedition with domain scamFRAUDalert.org (screenshot below)

SFA_phishinggoogle-translate-1504195331710
SFA_Google_For SALE


screencapture-google-search-1507908626744
t.co_ibolinuvy=malware3
t.co_ibolinuvy=malware2


Domain Whois record
Queried whois.internic.net with “dom scamfraudalerts.com”…

Domain Name: SCAMFRAUDALERTS.COM
Registry Domain ID: 2096067633_DOMAIN_COM-VRSN
Registrar WHOIS Server: whois.namebright.com
Registrar URL: http://www.NameBright.com
Updated Date: 2017-02-08T13:08:54Z
Creation Date: 2017-02-07T19:14:41Z
Registry Expiry Date: 2018-02-07T19:14:41Z
Registrar: DropCatch.com 808 LLC
Registrar IANA ID: 2567
Registrar Abuse Contact Email:
Registrar Abuse Contact Phone:
Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
Name Server: NSG1.NAMEBRIGHTDNS.COM
Name Server: NSG2.NAMEBRIGHTDNS.COM
DNSSEC: unsigned
URL of the ICANN Whois Inaccuracy Complaint Form: https://www.icann.org/wicf/
>>> Last update of whois database: 2017-08-30T08:44:49Z <<<


Address lookup
canonical name:scamfraudalert.org

aliases
addresses:192.184.12.62
Domain Whois record

Queried whois.publicinterestregistry.net with “scamfraudalert.org”…

Domain Name: SCAMFRAUDALERT.ORG
Registry Domain ID: D402200000001715160-LROR
Registrar WHOIS Server:
Registrar URL: http://www.sitename.com
Updated Date: 2017-05-04T03:46:53Z
Creation Date: 2017-03-04T14:30:24Z
Registry Expiry Date: 2018-03-04T14:30:24Z
Registrar Registration Expiration Date:
Registrar: SiteName Ltd.
Registrar IANA ID: 437
Registrar Abuse Contact Email:
Registrar Abuse Contact Phone:
Reseller:
Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited

Registry Registrant ID: C136922651-LROR
Registrant Name: Domain Manager
Registrant Organization: samirnet -domain names for sale
Registrant Street: Flat No. 48 Cunningham Apts Edward Road
Registrant City: Bangalore
Registrant State/Province:
Registrant Postal Code: 560052
Registrant Country: IN
Registrant Phone: +91.802260640
Registrant Email: samirnet2@gmail.com

Registry Admin ID: C136922651-LROR
Admin Name: Domain Manager
Admin Organization: samirnet -domain names for sale
Admin Street: Flat No. 48 Cunningham Apts Edward Road
Admin City: Bangalore
Admin State/Province:
Admin Postal Code: 560052
Admin Country: IN
Admin Phone: +91.802260640
Admin Email: samirnet2@gmail.com

Registry Tech ID: C136922651-LROR
Tech Name: Domain Manager
Tech Organization: samirnet -domain names for sale
Tech Street: Flat No. 48 Cunningham Apts Edward Road
Tech City: Bangalore
Tech State/Province:
Tech Postal Code: 560052
Tech Country: IN
Tech Phone: +91.802260640

Tech Email: samirnet2@gmail.com
Name Server: NS15.ABOVE.COM
Name Server: NS16.ABOVE.COM
DNSSEC: unsigned
URL of the ICANN Whois Inaccuracy Complaint Form: https://www.icann.org/wicf/
>>> Last update of WHOIS database: 2017-08-30T08:45:24Z


from: James Ashmore [abuse@trellian.com]
to: scamFRAUDalert [scamfraudalert@gmail.com]
______________________________________
Hello,

Thank you for your message.

Acknowledgement that written correspondence has been received.

Above.com Monetization AutoPilot is a routing/redirection service only; we do not host any of the content of the domain/s or IP addresses in question. As this is the case, we dispute any claim of hosting any copyrighted content.

As we are not the governing body for these disputes, any cancellation of services will be done in accordance to the outcome of a UDRP from WIPO.

Kind regards,
James Ashmore
__________________________
Trellian.com Abuse Team :abuse@trellian.com
USA: +1 310-736-4230
Australia::+61- 3-9589-7946
http://www.above.com
http://www.above.com


AUSTRALIA

Office Hours:
M-F 9:00 am to 5:00 pm
Australian Eastern Std Time

Phone: + 61-3-9589-7946
Fax: + 61-3-9589-7951

USA Office
Trellian Direct Search Network
Above.com
5220 Pacific Concourse Dr
Suite 100
Los Angeles, CA 90045

WhoIs stanley@distjobs.com

The Purpose of this post is to ALERT you that the job you are about to apply for scamalert4or may have applied FOR or is CONSIDERING APPLYING FOR is FRAUDULENT. The identities of individuals or a business entity have been stolen along with fund from their bank accounts.

These job postings are an attempt to lure you into accepting wire transfers and cashing counterfeit checks into your bank accounts. You are being recruited to wire transfer these funds via WESTERN UNION or MONEYGRAM from your bank into a DOMESTIC BANK or OFFSHORE BANK ACCOUNT.

Essentially You Become A Money or Repackage Mule

  1. Money Mule Explained
  2. Understanding The Cyber Theft Ring
  3. Protecting Yourself Against Money Mule
  4. KrebsOnSecurity – Cyberheist
  5. Washingtonpost.com by Brian Krebs
  6. Interview With A Money Mule
  7. Bobbear.co.UK ~ Historical Money Mule Sites

____________________

Good day!

We considered your resume to be very attractive and we thought the vacant position in our company could be interesting for you.

Our firm specializes in consultation services in the matter of bookkeeping and business administration.
We cooperate with different countries and currently we have many clients in the US.
Due to this fact, we need to increase the number of our destination representatives’ regular staff.

In their duties will be included the document and payment control of our clients.
Part-time and full-time employment are both currently important.
We offer a flat wage from $1000 up to $3,000 per month.

If you are interested in our offer, mail to us your answer on stanley@distjobs.com and we will send you an extensive information as soon as possible.

Respectively submitted
Personnel department

How Microsoft Appointed Itself Sheriff of the Internet

By: Robert McMillian – wired.com

“There’s simply no other company that takes such a direct approach to taking on scammers.”

Robert McMillian of wired.com report on How Mircosoft appointed itself sheriff of the internet is right to the point we’ve been making over the years. If more companies were taking legal actions against cyber-criminals and those harboring these creeps like Mircosoft have been doing, then Target, Home Depot, JP Morgan Chase and many more US companies may not have endured data breaches.

What we mean by this? We defined cyber-crime as a web of individuals, venture capitalists, investment bankers, ISP providers acting knowingly or unknowingly in aiding cyber criminals by their actions, company policies and business practices.

From reading wired.com article, it appears like legal scholars and security experts such as the Eric Goldman, a First Amendment Professor at Santa Clara University, California and Electronic Frontier Foundation disagreed with Mircosoft practices.

They argued that Mircosoft actions as sheriff thwarts our legal system of adjudication, deprived a person of Due Process Under the Law. In essence what Mr. Goldman and the Electronic Frontier Foundation are saying is that Doctrine of Habeas Corpus should be evoke.

“No-IP is a legitimate company whose services are used by thousands of law-abiding citizens. The fact that Microsoft could knock it offline, as if it were another Waledac, has many observers worried.”

As you can see, cybercriminals are well financed. To take them down would require a company like Mircosoft or Target or JP Morgan Chase. Someone with deep pockets and the resources like Mircosoft to take on these creeps. Mircosoft must not be the only company fighting cyber crimes. Others need to follow.

scamFRAUDalert position is that we are at WAR. Our privacy are being invaded. The public safety is at risk. Article I Section 9, Clause 2 of the US Constitution states “The privilege of the Writ of Habeas Corpus shall not be suspended, unless where in Cases of Rebellion or Invasion of Public Safety.”

We believe there is an invasion of public safety with the spreading of malwares as in the case of IP’S addresses associated with NO-IP.com or any company that houses malwares. Public safety tramp our judicial processes and collateral damages that may result. These individuals are well financed, can easily buy US Senators and Judges.

Tell US What You Think

Data Breaches A National Crisis, Really?

When Investigative Reporter Brian Krebs broke the news that Target Company had experienced a data breach, we at scamFRAUDalert asked the question, how pervasive this was? This was December 24, 2013. Fast forward nine months (9) later, we’ve now learned of JP Morgan Chase and there have been other breaches at Home Depot, Michael’s Stores, Signature Systems, Jimmy Johns, The Goodwill Stores, P.F. Chang’s, Neiman Marcus, SuperValu, and the list goes on and on of breaches unreported nationally. As of October 7, 2014, there have been 589 data breaches recorded by the Identity Theft Recourse Center (ITRC) as compare to 467 breaches in all of 2013.

Based on our experienced of monitoring cybercrimes, this is the new gold mine for these thugs. They seems to gravitate to where the action is.

Government agencies and companies worldwide should take an offensive approach to data security breaches. They should go after these thugs forcefully with the zest of a warrior rather then playing defense. They should follow Mircosoft lead. The internet touches our every day life and is a precious medium of communication to have it infested with just a  few criminals.  The consequences of not playing offense in the fight against cybercrime can be catastrophic. It simply going to get worse.

Our private information are at risk. These records are being SOLD all over the internet making them accessible to creeps, slimes, parasites, psychopaths, and cyber criminals.

In our opinion, this is not a national crisis, this is an imminent threat to our way of LIFE. We should not be going after these thugs after the fact. By then, it’s perhap too late.

Tell Us What You Think

Related: