Feed

DNS Blackhole with iRules

Posted on December 31st, 2011 in Domain News by dglosser

Interesting article about integrating Blackhole DNS with F5 irules.

Small but important Update

Posted on December 30th, 2011 in New Domains,rogue antivirus by dglosser

A small but important update containing harmful domains associated with pdf exploits, malvertising, rogue/fake antivirus, etc. Sources include malekal.com, www.malware-control.com, www.threatexpert.com and others… Please review Terms of Use.

Free Domain Name Registrars

Posted on December 28th, 2011 in Domain News by dglosser

The Internet Storm Center recommends blocking the following domains in this post:

  • .nl.ai
  • .c0m.li
  • .cd.am
  • .coom.in

We want to make you aware that we have the following lists:

The domains listed in each of these files are NOT included in the DNS-BH Blocklists.

It’s up to you if you wish to block, track, or allow access to these domains.

652 Removed Domains

Posted on December 27th, 2011 in Removed Domains by dglosser

652 domains have been delisted and have been removed:

http://mirror2.malwaredomains.com/files/removed-domains-20111226.txt

Please test our beta search for removed domains  (http://www.malwaredomains.com/wordpress/?p=2252) and provide feedback.

Advance Fee Scam, BH Exploit, Rogue Domains

Posted on December 25th, 2011 in fraud,MoneyMule,New Domains,rogue antivirus,spam,Trojans by dglosser

Added Domains associated with Advance Fee Scams, Black Hole Exploit, Money Mule, PDF Exploits, etc.  Sources include boiler-rooms.org, jsunpack.jeek.org, www.malwaredomainlist.com, xylibox.blogspot.com and others

(every source is  listed in the domains.txt file)

Reminder: the mirror for compressed zip files is up and running – please contact us for details – right now it has very little usage.

Please help to keep this site free and donate whatever you can:  All donations go to hosting and infrastructure costs.

These malware block lists provided here are for free for noncommercial use as part of the fight against malware.   Any use of this list commercially is strictly prohibited without prior approval.

Please use the “datestamp” and “timestamp” file to determine if the list has been updated and ONLY pull the files you need – abusers will be banned!

Yearly sponsorships are available. Full acknowledgment, an icon, and link back to your site will be placed in the left sidebar.

Domains.txt file is the complete list along with original reference.
Justdomains contains list of only the domain names.

BOOT file is in MS DNS format. spywaredomains.zones file is in BIND format.

Also Available in AdBlock, ISA, and MaraDNS formats.

A trusted source on the WOT-the Web of Trust . Used by SURBL, MOREnet, SANs, and others…

On the 12th Day of Christmas, my Search Engine gave to me…..

Posted on December 23rd, 2011 in New Domains by dglosser
On the 12th Day of Christmas, my Search Engine gave to me…
12 Harmful Websites
11 Misleading Ads
10 Malicious  Redirections
9 Browsers Crashing
8 Pop Up Windows
7 Stalled Pages
6 Drive-by-Downloads
5 ~Spam Results~
4 404′s
3 Downed Sites
2 Valid Hits
And a Virus For My Desktop
Have a Safe and Happy Holiday!

Site Delisting: muellerandmore.com

Posted on December 22nd, 2011 in Removed Domains by dglosser

muellerandmore.com has been delisted and will be removed on the next update

BH-DNS Update 12/21

Posted on December 22nd, 2011 in malspam,malvertising,New Domains by dglosser

Added domains associated with htaccess redirects, malicious javascript, malicious spam, malvertising, pdf exploits. Sources include sucuri.net, safebrowsing.clients.google.com, blog.dynamoo.com

Delisting: telus.net

Posted on December 21st, 2011 in Removed Domains by dglosser

telus.net has been delisted and will be removed on the next update.

Malware forces Atlanta area hospitals to stop accepting patients

Posted on December 21st, 2011 in General Security by dglosser

http://www.tecca.com/news/2011/12/19/malware-atlanta-hospitals/

Malware forces Atlanta area hospitals to stop accepting patients

Two medical centers lose computer systems for four days, source of infection unknown