A few days ago, I received a classic fraud mail, pointing me to a phished site of AXIS bank. The email read something like
Dear Valued Customer,
During our regularly scheduled account maintenance and verification
procedures, we have
detected a slight error in your Account billing information. This
might be due to either of the following reasons:
1. A recent updates in our billing server ( Due to slightly problem )
2. A recent change in your personal information ( i.e. change of address).
3. An inability to accurately verify your selected option of payment due to an internal error within our processors.
UTI is now AXIS.
If you are an account holder of UTI, please follow the link below and enter correctly the information required of you.
Please re-confirm your Internet Banking by clicking the link below:
https://www.axisbank.co.in
Thanks for your advance help.
Axis Bank
Customer Service.
iConnect is best used with Microsoft Internet Explorer Version 4.0 ((c) Microsoft) and higher. If you are getting the a Security Alert Message please Click here.
Copyright(c) 2007 - Axis Bank. All rights reserved.
Richard Lyons
394 Notre Dame Ave
Apt 7
Manchester, New Hampshire 03102
United States
myergeau@gmail.com
Here is the output of nMaping the box.
PORT STATE SERVICE
1/tcp open tcpmux
21/tcp open ftp
|_ Anonymous FTP: FTP:
Anonymous login allowed
22/tcp open ssh
|_ SSH Protocol Version 1: Server supports SSHv1
25/tcp open smtp
| SMTP: Responded to EHLO command
| prague.dnstraffic.net Hello example.org [122.167.111.114]
| SIZE 52428800
| PIPELINING
| AUTH PLAIN LOGIN
| STARTTLS
| 250 HELP
| Responded to HELP command
| Commands supported:
|_ AUTH STARTTLS HELO EHLO MAIL RCPT DATA NOOP QUIT RSET HELP 53/tcp open domain
80/tcp open http
|_ HTML title: cPanel®
110/tcp open pop3
111/tcp open rpcbind
135/tcp filtered msrpc
136/tcp filtered profile
137/tcp filtered netbios-ns
138/tcp filtered netbios-dgm
139/tcp filtered netbios-ssn
143/tcp open imap
443/tcp open https
445/tcp filtered microsoft-ds
465/tcp open smtps
631/tcp open ipp
993/tcp open imaps
995/tcp open pop3s
1022/tcp filtered unknown
1023/tcp filtered netvenuechat
1026/tcp filtered LSA-or-nterm
1080/tcp filtered socks
1485/tcp filtered lansource
1720/tcp filtered H.323/Q.931
3128/tcp filtered squid-http
3306/tcp open mysql
3456/tcp filtered vat
6588/tcp filtered analogx
Update : The phishing site has been successfully been disabled. Interestingly, the domain name now points to 74.54.176.34 as opposed to 206.221.179.205 earlier. All the malicious services are also gone now, and the node is no longer a part of the botnet. Yet another phishing site taken down !! :)