Archive | April, 2009

Amazon Disputes Hacker Claims of Ranking Manipulation

Your website & network are Hackable


A while back it was all over the blogs and Twitter that Amazon had somehow demoted Gay and Lesbian themed books to keep them from showing up in searches.

There was outrage from all the civil rights folks especially in the LBGT camp (rightfully so if it was true).

After that the rumour started the manipulation was carried about by hackers misusing an XSS flaw in the reporting mechanism.

Amazon.com is disputing an account that a hacker was to blame for an error that caused thousands of books to lose their sales ranks over the weekend. According to Amazon.com Director of Corporate Communications Patty Smith, the situation was due to a cataloging error. Smith disputed a supposed confession posted on a LiveJournal discussion group April 13, in which a hacker identified as “Weev” claimed he had exploited an Amazon.com feature for reporting inappropriate content.

“The thing about the adult reporting function of Amazon was that it was vulnerable to something called “Cross-site request forgery,'” he wrote. “This means if I referred someone to the URL of the successful complaint, it would register as a complaint if they were logged in.

“I know some people who run some extremely high traffic (Alexa top 1000) Websites. I show them my idea, and we all agree that it is pretty funny,” he continued. “They put an invisible iframe in their Websites to refer people to the complaint URLs, which caused huge numbers of visitors to report gay and lesbian items as inappropriate without their knowledge.”

It’s a pretty neat trick, just embed an iframe into some heavily trafficked websites and every time they get visited your cross site request is sent and a vote/report is made.

It leveraged on the ability to report inappropriate content, I’m guessing from what happened that the Amazon system has some automated threshold for tagging stuff that’s reporting x number of times.

However, contrary to statements in Weev’s blog entry and some reports, the situation was not limited to gay-themed books.

“It has been misreported that the issue was limited to Gay & Lesbian themed titles—in fact, it impacted 57,310 books in a number of broad categories such as Health, Mind & Body, Reproductive & Sexual Medicine, and Erotica,” Smith said in a statement. “This problem impacted books not just in the United States but globally. It affected not just sales rank but also had the effect of removing the books from Amazon’s main product search.”

The situation has drawn the ire of some gay and lesbian rights groups concerned that gay-themed books were being censored. In addition, some authors have claimed in press reports that they received e-mails from Amazon.com stating that their books had been placed in an unranked Adult category and excluded from some searches.

At least they’ve acknowledged there is some kind of problem, they understand the scope and are working on fixing it.

I hope they are better than the average corporate and actually fix the root cause too, not just fix the fall-out and patch up the flaw.

Who knows, this may develop further.

Source: eWeek


Posted in: General Hacking

Tags: , , , , , ,

Posted in: General Hacking | Add a Comment
Recent in General Hacking:
- BADLOCK – Are ‘Branded’ Exploits Going Too Far?
- Dradis – Reporting Platform For IT Security Professionals
- Kid Gets Arrested For Building A Clock – World Goes NUTS

Related Posts:

Most Read in General Hacking:
- 10 Best Security Live CD Distros (Pen-Test, Forensics & Recovery) - 1,171,894 views
- Hack Tools/Exploits - 631,005 views
- Password Cracking with Rainbowcrack and Rainbow Tables - 436,527 views

Get protected with Sucuri


ScreenStamp! – Free Screenshot Tool With Timestamp

Your website & network are Hackable


What is ScreenStamp!

ScreenStamp! is basically a screen grabbing application for pen-testing and people working in forensics. The app will ask you for a location to save your screen shots to, along with a name that the program will number, allowing the user to concentrate on the job at hand as opposed to saving screen shots.

ScreenStamp! also time and date stamps the screen shot at the top right hand corner.

Where did the ScreenStamp! idea come from?


A bunch of students studying Ethical Hacking for Computer Security were carrying out an Information Gathering exercise the task of taking and saving screen shots with the clock opened and date showing was repetitive and tedious, so the group members decided that an application that would do this would be useful. After failing to find an existing application that fulfilled their needs they created one.

ScreenStamp! will not only be available to use on Windows operating systems but also Linux and Mac.

You can download ScreenStamp! here:

screenstamp_win_v1_8.zip
screenstamp_v.1.0.tar.gz

Or read more here.


Posted in: Forensics, Security Software

Tags: , , , , , ,

Posted in: Forensics, Security Software | Add a Comment
Recent in Forensics:
- CuckooDroid – Automated Android Malware Analysis
- Cuckoo Sandbox – Automated Malware Analysis System
- Web Application Log Forensics After a Hack

Related Posts:

Most Read in Forensics:
- NetworkMiner – Passive Sniffer & Packet Analysis Tool for Windows - 66,500 views
- raw2vmdk – Mount Raw Hard Disk (dd) Images As VMDK Virtual Disks - 34,631 views
- OpenDLP – Free & Open-Source Data Loss Prevention (DLP) Tool - 30,383 views

Get protected with Sucuri


Industrial Control Systems Safe? I Think Not

Your website & network are Hackable


It seems like there is some serious hacking going on, attacks on power stations and industrial control systems.

You’d think most of these systems would be offline, or at least behind a solid DMZ. But as we’ve seen before they often get exposed by people plugging into the LAN then accessing the net through dial-up or nowadays through mobile data (HSDPA/3G etc.).

The sad thing is deaths have actually resulted from such intrusions.

The networks powering industrial control systems have been breached more than 125 times in the past decade, with one resulting in U.S. deaths, a control systems expert said Thursday.

Joseph Weiss, managing partner of control systems security consultancy Applied Control Solutions, didn’t detail the breach that caused deaths during his testimony before a U.S. Senate committee, but he did say he’s been able to find evidence of more than 125 control systems breaches involving systems in nuclear power plants, hydroelectric plants, water utilities, the oil industry and agribusiness.

“The impacts have ranged from trivial to significant environmental damage to significant equipment damage to deaths,” he told the Senate Commerce, Science and Transportation Committee. “We’ve already had a cyber incident in the United States that has killed people.”

More than 125 breaches? That’s quite a significant number. The scary part is the Nuclear plants, imagine if a cyberterrorist or hacker can cause a Nuclear meltdown or malfunction in a Nuclear facility?

I’d like to see the US government look into this area a little more and perhaps implement some new standards for Control System security.

It’s an area that really needs tighter security and legislation.

At other times, Weiss has talked about a June 1999 gasoline pipeline rupture near Bellingham, Washington. That rupture spilled more than 200,000 gallons of gasoline into two creeks, which ignited and killed three people. Investigators found several problems that contributed to the rupture, but Weiss has identified a computer failure in the pipeline’s central control room as part of the problem.

It could take the U.S. a long time to dig out from coordinated attacks on infrastructure using control systems, Weiss told senators. Damaged equipment could take several weeks to replace, he said. A coordinated attack “could be devastating to the U.S. economy and security,” he said. “We’re talking months to recover. We’re not talking days.”

The industrial control system industry is years behind the IT industry in protecting cybersecurity, and some of the techniques used in IT security would damage control systems, Weiss added. “If you penetration-test a legacy industrial control system, you will shut it down or kill it,” he said. “You will be your own hacker.”

The problem with these kind of attacks is they might involve multiple vectors in one attack which means it takes a long long time to investigate and work out what actually happened.

It’s backwards too because Industrial Control Systems are so important in our lives but their security is so so far behind.

Definitely an area to watch, I hope some positive improvements are made.

Source: CIO (Thanks Navin)


Posted in: General Hacking, Hardware Hacking

Tags: , , , , , ,

Posted in: General Hacking, Hardware Hacking | Add a Comment
Recent in General Hacking:
- BADLOCK – Are ‘Branded’ Exploits Going Too Far?
- Dradis – Reporting Platform For IT Security Professionals
- Kid Gets Arrested For Building A Clock – World Goes NUTS

Related Posts:

Most Read in General Hacking:
- 10 Best Security Live CD Distros (Pen-Test, Forensics & Recovery) - 1,171,894 views
- Hack Tools/Exploits - 631,005 views
- Password Cracking with Rainbowcrack and Rainbow Tables - 436,527 views

Get protected with Sucuri


OAT (OCS Assessment Tool) – Office Communication Server Security Assessment Tool

Your website & network are Hackable


OAT is an Open Source Security tool designed to check the password strength of Microsoft Office Communication Server users. After a password is compromised, OAT demonstrates potential UC attacks that can be performed by legitimate users if proper security controls are not in place.

Features

  • Online Dictionary Attack
  • Presence Stealing
  • Contact List Stealing
  • Single User Flood Mode (Internal)
  • Domain Flood Mode (Internal)
  • Call Walk (Internal/External)
  • Play Spam Audio
  • Detailed Report Generation

OAT Modes

Internal Network Attack Mode

Internal Network Mode simulates attacks from the internal IP network, where the attacker has unrestricted access to shared resources and reachability to servers. OCS users are provisioned on a Domain Controller (DC) and can query the DC for data. OAT exploits internal network access by querying the DC for all the communication enabled users. It then adds these users to the attack list.


The following attacks can be performed from the internal network

  • Single user IM Flood
  • Domain IM Flood
  • Call Walk

External Network Attack Mode

External Network Attack Mode simulates the real world attack scenario in which an attacker is outside of the corporate IP network. An attacker sourced from outside of the firewall can not directly query the DC unless they know its hostname.

Once the Dictionary attack is successful against target user, OAT functions like a legitimate OCS client, registering itself with Office Communication Server. Once registered, OAT queries for the contact list of target user and uses this information to create a victim target list. This information is useful for the next attack phase.

The following tests can be performed from the external network

  • Contact List Stealing
  • List IM Flood
  • Call Walking

You can download OAT here:

OAT1.0.zip

Or read more here.


Posted in: Hacking Tools, Network Hacking, Windows Hacking

Tags: , , , , , , , , , , ,

Posted in: Hacking Tools, Network Hacking, Windows Hacking | Add a Comment
Recent in Hacking Tools:
- MANA Toolkit – Rogue Access Point (evilAP) And MiTM Attack Tool
- BBQSQL – Blind SQL Injection Framework
- DET – Data Exfiltration Toolkit

Related Posts:

Most Read in Hacking Tools:
- Top 15 Security/Hacking Tools & Utilities - 1,991,950 views
- Brutus Password Cracker – Download brutus-aet2.zip AET2 - 1,476,684 views
- wwwhack 1.9 – Download wwwhack19.zip Web Hacking Tool - 686,954 views

Get protected with Sucuri


Spammers Recover from McColo Shutdown – Spam Back To 91%

Find your website's Achilles' Heel


You might remember back in November last year Spam ISP McColo was Cut Off From the Internet and there was a fairly drastic drop in spam e-mail traffic.

Well it looks like the spammers have got their acts back together as spam levels are back up to 91% of their previous volume.

Having McColo shut down was nice, but honestly did anyone think it was going to have a serious long term effect on spam? I didn’t…the spammers are going to find another ISP they can use, even if it’s in another country.

Junk e-mail now back to 91% of its usual levels, says Symantec.

The days of blissfully empty in-boxes are long gone – get ready for another onslaught of spam. Symantec’s monthly State of Spam report, out today, shows that levels of spam are approaching the dizzy heights they reached last year, before the sudden shutdown of rogue hosting company McColo.

It estimates that spam now comprises about 85 per cent of all email traffic, thanks to old bot-nets being brought back online and new ones created.

So if you’re a sys-admin and you’ve been enjoying the break from super high volumes of spam – be prepared for it to start pouring back in again.

It seems like South America is seeing a rise in spam activites too, perhaps due to the spread of Internet connectivity and broadband rollout.

You often see the numbers of compromised machines in a country or region is extremely high when they first get connected (remember when Korea came online?).

The EMEA (Europe, the Middle East and Africa) region continues to be the leading source of all zombie IP addresses, hosting 45 per cent of active zombie computers in March 2009 – although Brazil has seen a surge in compromised computers. It now has 14 per cent of all the world’s zombie machines.

Despite these figures, the US continues to be the main source of spam messages (accounting for a full quarter of all spam sent) – the UK has the dubious honour of rounding out the top ten, with a 2 per cent share.

Symantec has also noticed a change in spam subject matter, from get-rich-quick schemes to the sad business of avoiding having your home repossessed.

One ray of spring sunshine – video spam has not taken off as some experts feared. The most common size of spam email (75 per cent of all sent) is a featherweight 2 to 5 KB.

Seems like even the nature of spam is changing to accommodate the recession, these spammers really capitalise on whatever is going on in the World.

I guess that’s why it works and why they still keep spamming, basic social engineering and greed work very well together.

Thankfully no video spam though, imagine if you’re on mobile data…and you start receiving 1-3mb spams!

Source: Techradar (Thanks Navin)


Posted in: Malware, Phishing, Spammers & Scammers

Tags: , , , , , , , , ,

Posted in: Malware, Phishing, Spammers & Scammers | Add a Comment
Recent in Malware:
- CuckooDroid – Automated Android Malware Analysis
- Android Malware Giving Phones a Hummer
- Cuckoo Sandbox – Automated Malware Analysis System

Related Posts:

Most Read in Malware:
- Nasty Trojan Zeus Evades Antivirus Software - 77,547 views
- Hospital Hacker GhostExodus Owns Himself – Arrested - 47,661 views
- US considers banning DRM rootkits – Sony BMG - 44,998 views

Get protected with Sucuri


EFIPW – Modify Apple EFI Firmware Passwords

Find your website's Achilles' Heel


EFIPW is a tool that can be used to decode and modify Apple EFI firmware passwords via the command line. It is designed after the non open source OFPW utility and is designed to work on Intel machines running Leopard or newer. Useful for lab deployments (setting the firmware password of machines as a post install item) and pen tests (recovering the EFI firmware password).

Tested on:

  • Core Duo (1st gen) Macbook Pro 15″
  • Core 2 Duo Macbook Pro 15″

Technical details on how it works here.

You can download EFIPW v0.1a here:

efipw_v0.1a.zip

Or read more here.


Posted in: Apple, Exploits/Vulnerabilities, Hardware Hacking, Password Cracking

Tags: , , , , , , , ,

Posted in: Apple, Exploits/Vulnerabilities, Hardware Hacking, Password Cracking | Add a Comment
Recent in Apple:
- Apple Will Not Patch Windows QuickTime Vulnerabilities
- FBI Backed Off Apple In iPhone Cracking Case
- Mac OS X Ransomware KeRanger Is Linux Encoder Trojan

Related Posts:

Most Read in Apple:
- KisMAC – Free WiFi Stumbler/Scanner for Mac OS X - 83,066 views
- Apple Struggling With Security & Malware - 24,143 views
- Java Based Cross Platform Malware Trojan (Mac/Linux/Windows) - 15,994 views

Get protected with Sucuri


Hacker Develops Tool To Hide Malware in .NET Framework

Find your website's Achilles' Heel


Once again something is wrong with part of the Microsoft suite of software and once again they are denying it’s anything to do with them.

This time a researcher has developed a rootkit style infection tool aimed at the .Net framework.

Most modern computers come with .Net of some description installed so this could be quite a widespread threat, especially if it gets into the hands of the bad guys and they use it for something like Conficker.

A computer security researcher has released an upgraded tool that can simplify the placement of difficult-to-detect malicious software in Microsoft’s .Net framework on Windows computers.

The tool, called .Net-Sploit 1.0, allows for modification of .Net, a piece of software installed on most Windows machines that allows the computers to execute certain types of applications.

Microsoft makes a suite of developer tools for programmers to write applications compatible with the framework. It offers developers the advantage of writing programs in several different high-level languages that will all run on a PC.

.Net-Sploit allows a hacker to modify the .Net framework on targeted machines, inserting rootkit-style malicious software in a place untouched by security software and where few security people would think to look, said Erez Metula, the software security engineer for 2BSecure who wrote the tool.

It an interesting attack vector, attacking a different part of the OS that isn’t usually targeted. It offers better protection from AV software and from being found and it’s pretty much guaranteed all Windows computers will have .Net installed.

I’d guess some pretty interesting stuff can be gathered by tapping into .Net.

.Net-Sploit essentially lets an attacker replace a legitimate piece of code within .Net with a malicious one. Since some applications depend on parts of the .Net framework in order to run, it means the malware can affect the function of many applications.

For example, an application that has an authentication mechanism could be attacked if the tampered .Net framework were to intercept user names and passwords and send them to a remote server, Metula said.

.Net-Sploit automates some of the arduous coding tasks necessary to corrupt the framework, speeding up development of an attack. For example, it can help pull a relevant DLL (dynamic link library) from the framework and deploy the malicious DLL.

Metula said that an attacker would already have to have control of a machine before his tool could be used. The advantage of corrupting the .Net framework is that an attacker could clandestinely maintain control over the machine for a long time.

It could potentially be abused by rogue system administrators, who could abuse their access privileges to deploy so-called “backdoors” or malware than enables remote access, Metula said.

Of course the disadvantage is you already need to have control over the machine to execute this kind of attack, I guess it’s for when you’ve hacked the machine and you want to keep control or gather more data.

Metula has published a white paper on the technique as well as the latest version of .Net-Sploit.

Source: CIO (Thanks Navin)


Posted in: Exploits/Vulnerabilities, Malware, Windows Hacking

Tags: , , , , , , , , , , ,

Posted in: Exploits/Vulnerabilities, Malware, Windows Hacking | Add a Comment
Recent in Exploits/Vulnerabilities:
- PunkSPIDER – A Web Vulnerability Search Engine
- Dropbox Hacked – 68 Million User Accounts Compromised
- PowerOPS – PowerShell Runspace Portable Post Exploitation Tool

Related Posts:

Most Read in Exploits/Vulnerabilities:
- Learn to use Metasploit – Tutorials, Docs & Videos - 235,826 views
- AJAX: Is your application secure enough? - 120,268 views
- eEye Launches 0-Day Exploit Tracker - 85,738 views

Get protected with Sucuri


Charles Web Debugging Proxy – HTTP Monitor & Reverse Proxy

Your website & network are Hackable


Charles is an HTTP proxy / HTTP monitor / Reverse Proxy that enables a developer to view all of the HTTP traffic between their machine and the Internet. This includes requests, responses and the HTTP headers (which contain the cookies and caching information).

Charles can act as a man-in-the-middle for HTTP/SSL communication, enabling you to debug the content of your HTTPS sessions.

Charles simulates modem speeds by effectively throttling your bandwidth and introducing latency, so that you can experience an entire website as a modem user might (bandwidth simulator).

Charles is especially useful for Adobe Flash developers as you can view the contents of LoadVariables, LoadMovie and XML loads. Charles also has native support for Flash Remoting (AMF0 and AMF3).

Charles is also useful for XML development in web browsers, such as AJAX (Asynchronous Javascript and XML) and XMLHTTP, as it enables you to see the actual XML that is flowing between the client and the server. Charles natively supports JSON, JSON-RPC and SOAP; displaying each in a simplified tree format for easy viewing and debugging.

You can download Charles Proxy here:

Windows – charles_setup.exe
Linux / Unix – charles.tar.gz
Mac OS X – charles_macosx.zip

Or read more here.


Posted in: Network Hacking, Programming, Web Hacking

Tags: , , , , , , , , , , ,

Posted in: Network Hacking, Programming, Web Hacking | Add a Comment
Recent in Network Hacking:
- Two Israeli Men Arrested For Running VDoS-s.com DDoS Service
- DET – Data Exfiltration Toolkit
- miranda-upnp – Interactive UPnP Client

Related Posts:

Most Read in Network Hacking:
- Brutus Password Cracker – Download brutus-aet2.zip AET2 - 1,476,684 views
- Wep0ff – Wireless WEP Key Cracker Tool - 514,615 views
- THC-Hydra – The Fast and Flexible Network Login Hacking Tool - 328,435 views

Get protected with Sucuri


Multiple Bugs In Anti-Virus Software Revealed

Find your website's Achilles' Heel


A spate of bugs have popped up recently in quite a few of the major anti-virus brands, some are old bugs which have just been made public and some are apparently new bugs – just discovered. Nothing too serious it seems (no remote takeover vulnerabilities) mostly just crashes and annoyances.

Included are Symantec’s Norton Anti-virus, Kaspersky Anti-Virus 6.0, F-Prot, IBM Proventia and Clam Antivirus.

Once an occasional inconvenience, serious security bugs and vulnerabilities in anti-virus and security suite products are growing into hardy perennials. Once, running Windows anti-virus was like driving down a dual carriageway. These days, it’s more like an unpaved road.

Last week alone bought a confirmed snag with anti-virus products from Kaspersky Lab and a reported oddity with an update Norton anti-virus from Symantec. Elsewhere an allegedly long running flaw in anti-virus scanner from F-Prot was published for the first time. The Kaspersky bug had the potential to result in serious annoyance. The other bugs are less serious and individually don’t amount to much, but collectively, they’re enough to make you reach for an Ubuntu installation CD or start looking on eBay for a Mac.

First up, let’s consider a misfiring definition update for Kaspersky Anti-Virus 6.0 for Windows Workstations, which sent users into pop-up hell. It was issued on 31 March, and it wasn’t resolved until 2 April.

The worst one in my opinion is the Kaspersky problem, because it’s their own fault? How can a company with so many users, pushing out automatic updates have such poor quality control?

Pushing out an update that messes up a users machine and not fixing it for 3 days is enough to stop using a product for me.

Elsewhere reports on Norton’s support forums on Saturday (4 April) suggest a Symantec update killed right click menu on PCs running Windows Vista. We brought the thread to Symantec’s attention earlier this afternoon and wait the security giant response to the odd, not to say bizarre, reported glitch with interest.

Moving on past glitches there’s also straightforward security vulnerabilities to consider. A flaw in F-Prot involving the scanning of Zip files allegedly creates a possible method to circumvent anti-virus protection. Security researcher Thierry Zoller, who discovered the vulnerability, went public with the flaw on 2 April after F-Prot failed to act for a reported four years.

Zoller also published two other advisories last week, each covering problems with enterprise products and scanning archived files. Malicious RAR archives might make their way past IBM Proventia email security appliances, according to Zoller. He published a limited details advisory after not hearing from IBM for a month. IBM is reportedly investigating the issue.

Clam AntiVirus, the open source anti-virus toolkit for UNIX, which is used to scan email on mail gateways for Windows viruses, also had a problem with RAR files. That problem was plugged late last month but only publicised by Zoller with an advisory last week.

Even the popular Linux/UNIX solution Clam Antivirus didn’t escape testing throwing up a bug when scanning RAR files. I’m surprised AV still has such problems with RAR/Zip and compressed files.

We worked out long ago if you made a batch script to make an almost infinite loop of zip files (zip within zip within zip etc) you could bomb out the CPU totally on most AV e-mail gateways.

I hope 10 years later they aren’t still having the same problems.

Source: The Register


Posted in: Countermeasures, Exploits/Vulnerabilities, Security Software

Tags: , , , , , , , , , , , , , , ,

Posted in: Countermeasures, Exploits/Vulnerabilities, Security Software | Add a Comment
Recent in Countermeasures:
- Bearded – Security Automation Platform
- An Introduction To Web Application Security Systems
- OpenIOC – Sharing Threat Intelligence

Related Posts:

Most Read in Countermeasures:
- AJAX: Is your application secure enough? - 120,268 views
- Password Hasher Firefox Extension - 117,883 views
- NDR or Backscatter Spam – How Non Delivery Reports Become a Nuisance - 57,751 views

Get protected with Sucuri


Lynis 1.2.6 Released – UNIX System & Security Auditing Tool

Find your website's Achilles' Heel


Lynis is an auditing tool for Unix (specialists). It scans the system and available software, to detect security issues. Beside security related information it will also scan for general system information, installed packages and configuration mistakes.

This software aims in assisting automated auditing, software patch management, vulnerability and malware scanning of Unix based systems. It can be run without prior installation, so inclusion on read only storage is no problem (USB stick, cd/dvd).

Lynis assists auditors in performing Basel II, GLBA, HIPAA, PCI DSS and SOX (Sarbanes-Oxley) compliance audits.

A lot of new checks and controls have been added in this latest release (Full Changelog). Do note Lynix is not a hardening tool, it won’t make any changes – only suggestions.

Intended audience:
Security specialists, penetration testers, system auditors, system/network managers.

Examples of audit tests:

  • Available authentication methods
  • Expired SSL certificates
  • Outdated software
  • User accounts without password
  • Incorrect file permissions
  • Firewall auditing

You can download Lynix 1.2.6 here:

lynis-1.2.6.tar.gz

Or read more here.


Posted in: Countermeasures, Exploits/Vulnerabilities, Linux Hacking, Security Software

Tags: , , , , , , , ,

Posted in: Countermeasures, Exploits/Vulnerabilities, Linux Hacking, Security Software | Add a Comment
Recent in Countermeasures:
- Bearded – Security Automation Platform
- An Introduction To Web Application Security Systems
- OpenIOC – Sharing Threat Intelligence

Related Posts:

Most Read in Countermeasures:
- AJAX: Is your application secure enough? - 120,268 views
- Password Hasher Firefox Extension - 117,883 views
- NDR or Backscatter Spam – How Non Delivery Reports Become a Nuisance - 57,751 views

Get protected with Sucuri