Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Phishing | googleusercontent.com #693

Closed
spirillen opened this issue Jan 18, 2025 · 2 comments
Closed

Phishing | googleusercontent.com #693

spirillen opened this issue Jan 18, 2025 · 2 comments
Assignees
Labels
help wanted Extra attention is needed question Further information is requested

Comments

@spirillen
Copy link
Contributor

What are the subjects of the phishing (domains, URLs or IPs)?

  • example.com
  • sub.example.com
  • https://example.com/page
  • https://sub.example.com/page
  • NSFW example.com
  • 192.168.0.0/16
    00f74ba44b80f08e469019d0c9fef3f3e48564247e-apidata.googleusercontent.com|phishing
    107.64.70.34.bc.googleusercontent.com|phishing
    32.19.192.35.bc.googleusercontent.com|phishing
    109.245.225.35.bc.googleusercontent.com|phishing
    24.174.232.35.bc.googleusercontent.com|phishing
    27.251.247.35.bc.googleusercontent.com|phishing

What are the impersonated domains?

  • example.org
  • sub.example.org
  • https://example.org/page
  • https://sub.example.org/page
    Various

Where or how did you discover this phishing?

I discovered this phishing by...
I was targeted by this phishing by...

I can see in https://kb.mypdns.org/issue/MTX-40416 (mypdns/matrix#40032) that I have marked some subdomains marked for phishing, anyone who would be able to check if these are still active in phishing?

Do you have a screenshot?

Screenshot

nope

Related external source

Additional Information or Context

I have also noticed that...

Response Policy Zone - RPZ

Found these RPZ records in My Privacy DNS

Domain records Type content
*.googleusercontent.com.strict.adult.mypdns.cloud CNAME .
00f74ba44b80f08e469019d0c9fef3f3e48564247e-apidata.googleusercontent.com.phishing.mypdns.cloud CNAME .
107.64.70.34.bc.googleusercontent.com.phishing.mypdns.cloud CNAME .
109.245.225.35.bc.googleusercontent.com.phishing.mypdns.cloud CNAME .
111.91.190.35.bc.googleusercontent.com.tracking.mypdns.cloud CNAME .
119.29.196.104.bc.googleusercontent.com.tracking.mypdns.cloud CNAME .
175.220.196.104.bc.googleusercontent.com.tracking.mypdns.cloud CNAME .
184.48.190.35.bc.googleusercontent.com.tracking.mypdns.cloud CNAME .
200.94.201.35.bc.googleusercontent.com.adware.mypdns.cloud CNAME .
202.90.190.35.bc.googleusercontent.com.tracking.mypdns.cloud CNAME .
24.174.232.35.bc.googleusercontent.com.phishing.mypdns.cloud CNAME .
246.39.190.35.bc.googleusercontent.com.tracking.mypdns.cloud CNAME .
27.251.247.35.bc.googleusercontent.com.phishing.mypdns.cloud CNAME .
32.19.192.35.bc.googleusercontent.com.phishing.mypdns.cloud CNAME .
42.219.186.35.bc.googleusercontent.com.adware.mypdns.cloud CNAME .
42.219.186.35.bc.googleusercontent.com.tracking.mypdns.cloud CNAME .
49.74.190.35.bc.googleusercontent.com.adware.mypdns.cloud CNAME .
49.74.190.35.bc.googleusercontent.com.tracking.mypdns.cloud CNAME .
64.98.201.35.bc.googleusercontent.com.adware.mypdns.cloud CNAME .
64.98.201.35.bc.googleusercontent.com.tracking.mypdns.cloud CNAME .
84.249.186.35.bc.googleusercontent.com.adware.mypdns.cloud CNAME .
84.249.186.35.bc.googleusercontent.com.tracking.mypdns.cloud CNAME .
affiliate.googleusercontent.com.adware.mypdns.cloud CNAME .
affiliate.googleusercontent.com.tracking.mypdns.cloud CNAME .
afs.googleusercontent.com.adware.mypdns.cloud CNAME .
afs.googleusercontent.com.tracking.mypdns.cloud CNAME .
@g0d33p3rsec
Copy link
Contributor

The phishing related content seems to be from 2019 and long since resolved. The tracking issues seem to be with consent of the first-party, so not so relevant here but maybe worth considering still for the matrix. Some examples of the mentioned links from 2019:
107.64.70.34.bc.googleusercontent.com
https://urlscan.io/result/9935139b-0175-4c85-bd91-dcc3415733df/
32.19.192.35.bc.googleusercontent.com
https://urlscan.io/result/49007fda-9008-488d-9737-fd9b7ab1e02a/
109.245.225.35.bc.googleusercontent.com
https://urlscan.io/result/c4070548-a6d1-42b8-bb56-d2639b842c65/

https://urlscan.io/search/#googleusercontent.com

@spirillen
Copy link
Contributor Author

Cool, thanks for looking at them, closing as no longer relevant.

No longer adding subdomains to (.)google(.) they are blacklisted at the root. then people have to whitelist if they are masochists.

@github-project-automation github-project-automation bot moved this from 🆕 New to ✅ Done in Phishing Database Backlog Jan 19, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
help wanted Extra attention is needed question Further information is requested
Projects
Status: ✅ Done
Development

No branches or pull requests

4 participants