Rocksolid Light

Welcome to RetroBBS

mail  files  register  newsreader  groups  login

Message-ID:  

The debate rages on: Is PL/I Bachtrian or Dromedary?


computers / comp.misc / UCEPROTECT Scam: When RBLs Go Bad

SubjectAuthor
* UCEPROTECT Scam: When RBLs Go BadBen Collver
`- Re: UCEPROTECT Scam: When RBLs Go BadOtto J. Makela

1
UCEPROTECT Scam: When RBLs Go Bad

<slrnu52kge.c4o.bencollver@svadhyaya.localdomain>

  copy mid

https://www.rocksolidbbs.com/computers/article-flat.php?id=2347&group=comp.misc#2347

  copy link   Newsgroups: comp.misc
Path: i2pn2.org!i2pn.org!eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: bencollver@tilde.pink (Ben Collver)
Newsgroups: comp.misc
Subject: UCEPROTECT Scam: When RBLs Go Bad
Date: Tue, 2 May 2023 18:16:23 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 276
Message-ID: <slrnu52kge.c4o.bencollver@svadhyaya.localdomain>
Injection-Date: Tue, 2 May 2023 18:16:23 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="3c6ffd1d84070222d5416dc7f2a67328";
logging-data="916371"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1/bLWVCc4sgriatQV1Cen+apBNoCEKn+Yo="
User-Agent: slrn/1.0.3 (Linux)
Cancel-Lock: sha1:4G0cgzYxNjmqbNBMTqY4M+Y7+14=
 by: Ben Collver - Tue, 2 May 2023 18:16 UTC

# UCEPROTECT Scam: When RBLs Go Bad

by Marc Kranat
February 12, 2021

# What is a Realtime Blackhole List (RBL)?

A Realtime Blackhole List (RBL) contains lists of email servers,
domain names, and IP addresses that are associated with hosting,
producing, forwarding or otherwise helping spam.

Furthermore, RBLs can be a great tool in your security arsenal. You
may not know you're using them, but all email providers and company
email servers leverage RBLs to verify whether servers and IP
addresses are sending spam or other abusive content against a known
list of offenders.

These services use a number of methods to compile lists of IP
addresses reputed to send spam, mostly populating them using
honeypots drawing them in with "poison" email addresses to act as
victims. They leverage the DNS service normally known for routing
traffic by converting Domain names into IP addresses. In this
context, RBLs serve as a useful database of known abusive IP
addresses that you in turn can "blackhole" as a bad response is given
a loopback address by the RBL. https://www.dnsbl.info/ has a good
short explanation and history of the technology.

# Contents

* What is a Realtime Blackhole List (RBL)?
* DNS warnings from MXToolbox
* How to use RBLs to block spam
* How to check RBLs for listings
* Is UCEPROTECT a scam?
* Payment in return for "Express Delisting"
* Threats and security issues with UCEPROTECT
* Ignore RBLs that request payment for removal

# DNS warnings from MXToolbox

Usually, we don't deal with Realtime Blackhole Lists while managing
the WAF--they are more related to email, and only occasionally will
our malware removal team may need to make removal requests for a
clients' hosting servers IP addresses as part of the remediation
process.

That being said, a large number of our clients have recently reported
seeing DNS warnings from MXToolbox while using our product.

# Blacklisting warning for Sucuri IP

After a thorough investigation, we discovered that the RBL provider
uceprotect[.]net has listed a wide range of IPs (including our own)
as notable reputed spammers, despite the fact that many servers are
not even set up or capable of sending email content.

To help shed light on the issue and provide insights for anyone
receiving warnings from UCEPROTECT, here's a deep dive into the
situation with a bit of background context on using and
troubleshooting RBLs thrown in for good measure.

# How to use RBLs to block spam

RBLs have been around for about 25 years.

There are a large number of RBLs currently in existence which all
leverage a wide array of criteria for listing and delisting
addresses. Normally, you'll want to use 3 or more respected RBLs to
identify and block spam.

Most likely, however, you'll have no choice if you are using an anti
spam product in either your email client or on the email server
itself, since preset RBLs are often designated as part of their
filtering process.

# How to check RBLs for listings

A large number of tools are readily available to automate checking if
your own server or even home ISP connection has been listed by one of
these RBLs.

The most commonly used solution is MXToolbox, which is also available
as an API and tests a mail server IP address against 86 DNS based
RBLs.

If you are checking a large number of servers or IP addresses for RBL
listing, you may want to subscribe to MXToolbox, RBLmon (rblmon.com),
or some other similar service. You could also script something to
check a list of domains against a list of preferred RBLs.

I have found https://github.com/polera/rblwatch very adaptable, and
personally use the bash script here, which allows me to check a full
Class C IP range (256 addresses) in less than 5 minutes against 5
reputable RBLs.

# Is UCEPROTECT a scam?

There is a plethora of bad behaviour from the RBL provider
uceprotect[.]net. This service is known to blocklist and demands a
payment in exchange for "express delisting". Let's take a look at a
recent example of this.

Over the weekend, I received 2 warnings from RBL monitoring services.

UCEPROTECT Level 1 Warning

Notice this statement:

> It means abusive activity was seen from IP 192.124.249.6 directly
> within the last 7 days.

And:

Concrete allegation:

> Portscans or hacking attempts were seen against an UCEPROTECT-System
> from IP 192.124.249.6.

This is in fact impossible. 192.124.249.6 is the public IP address of
our Sucuri WAF, which forwards requests via a back end IP address to
our clients hosting server. Our public IPs are never seen to make
requests--they only ever accept requests, it's the way our AnyCast
network works.

In this context, I really don't think these guys understand what
concrete means.

# Payment in return for "Express Delisting"

Here's their advice on removing the blocklisting:

> Mostly infected PC's but also possible an hacker that has broken
> into their system are the reason in this case.
>
> They should check all systems behind their IP with an actual
> Anti-virus/Anti-Trojan/Anti-Rootkit tool.

We are certain there is no malware on our servers, we have a world
class reputation for preventing and identifying malware. It would be
great at this point if they had given us some clue as to why they
think this and publicly claiming that a hacker has broken into our
server.

And although they have given us no evidence on the allegation or
provided additional information on the malware detected, they do have
another option:

# Express delisting ransom payment

An "Express delisting" option button is available, which takes us to
the following message:

> How can the IP be removed from UCEPROTECT-Level 1?
>
> Every IP temporary listed at Level 1 will be removed automatically
> (and free of charge) as soon as it is no longer a source of abuse
> for 7 days.
>
> Automatic expiration is free of charge, because it does not require
> manual work.
>
> If you don't want to wait for expiration, expedited express
> delisting of this IP from Level 1 can be optionally available at a
> charge by using one of the payservicebuttons above.
>
> Orders for expedited express delisting are processed by external
> service providers, therfore it cannot be offered for free.
>
> Please also note that express delisting only makes sense after the
> problem which caused the Level 1 listing is fixed.
>
> If the problem is not fixed, it is mostly just a question of time
> until the IP might end up listed in UCEPROTECT Level 1 again.

Basically what this means is if you don't want to wait 7 days to be
taken off their list, you can pay 89 CHF (about $100) and to cover
their cost of them pressing a delete button. By their own admission
there is no due diligence involved in this removal, as you may be
relisted if you are later found to be still abusing their systems.

They justify using an external service provider as an explanation for
why the service cannot be offered for free--because you know they'd
really like to offer this express service for free, you can just feel
it.

Further down the page, we have another warning that is applied to the
whole subnet, giving an RBL listing to 255 neighbouring IP addresses:

UCEPROTECT Level 2

The first paragraph continues justifying the listing, although they
now claim it's due to excessive spamming.

> According to the table above allocations get listed at Level 2 if
> there are too many Level 1 listings (spam sending IP's) in that
> ranges and too many Impacts were counted.
>
> In other words: One or several networks which your IP belongs to have
> send too much spam within the last week.

Remember, none of these IP addresses are capable of sending email.
Here in the next paragraph, they contradict themselves, saying it was
your IP that was spamming:

> Who is responsible for this listing?
>
> You and the other Level 1 listees within that range. Your IP was
> also seen in a spamming, so you can't claim to be innocent.

# Threats and security issues with UCEPROTECT

There are plenty of other unconventional and eyebrow-raising claims
on their website. For example, on the Removal Policy tab, the
subpages include the following the warning:

# RBL Warning Doxing

Their banner informs site visitors that if you complain about their
behaviour and notify them of any impending legal action, they will
both dox you and feed your email address to spammers email scrapers,
as well as list the IP address that you contacted them from. Not very
GDPR compliant.

And while we are on the subject of GDPR compliance and security in
general, the owner of this company has a number of related sites,
none of which have SSL enabled. While that is not an issue if there
is no login portal, the site is described to be intended for
"Executive members" and does have a cleartext login that requires a
username and password. And all running on a 20-year-old operating
system and 17 year old version of PHP, which offer a good indication
of their security practices--or lack thereof.


Click here to read the complete article
Re: UCEPROTECT Scam: When RBLs Go Bad

<87wn1jvwcu.fsf@tigger.extechop.net>

  copy mid

https://www.rocksolidbbs.com/computers/article-flat.php?id=2370&group=comp.misc#2370

  copy link   Newsgroups: comp.misc
Path: i2pn2.org!i2pn.org!weretis.net!feeder8.news.weretis.net!eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: om@iki.fi (Otto J. Makela)
Newsgroups: comp.misc
Subject: Re: UCEPROTECT Scam: When RBLs Go Bad
Date: Mon, 08 May 2023 15:30:41 +0300
Organization: Games and Theory
Lines: 8
Message-ID: <87wn1jvwcu.fsf@tigger.extechop.net>
References: <slrnu52kge.c4o.bencollver@svadhyaya.localdomain>
MIME-Version: 1.0
Content-Type: text/plain
Injection-Info: dont-email.me; posting-host="59cfc1b8c1a55806b71daba2e9e60d25";
logging-data="4084486"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18rPVwHMTYV1LRo8bADHhjf"
User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/28.2 (gnu/linux)
Cancel-Lock: sha1:AmrrL4ImWGLFwakqm2Sw58SzFNc=
sha1:u6/uH/taJVRYnRKyBo9ql1UzxFU=
X-Face: 'g'S,X"!c;\pfvl4ljdcm?cDdk<-Z;`x5;YJPI-cs~D%;_<\V3!3GCims?a*;~u$<FYl@"E
c?3?_J+Zwn~{$8<iEy}EqIn_08"`oWuqO$#(5y3hGq8}BG#sag{BL)u8(c^Lu;*{8+'Z-k\?k09ILS
Mail-Copies-To: never
X-URL: http://www.iki.fi/om/
 by: Otto J. Makela - Mon, 8 May 2023 12:30 UTC

As a long-time email admin, I've come to the conclusion that these days
running a RBL apparently requires some degree of sociopathy. This is the
reason their usefulness has severely diminished in the last few years.
--
/* * * Otto J. Makela <om@iki.fi> * * * * * * * * * */
/* Phone: +358 40 765 5772, ICBM: N 60 10' E 24 55' */
/* Mail: Mechelininkatu 26 B 27, FI-00100 Helsinki */
/* * * Computers Rule 01001111 01001011 * * * * * * */

1
server_pubkey.txt

rocksolid light 0.9.8
clearnet tor