Pulse360 Clickfraud Source

chatmasta

New member
Jan 7, 2007
2,613
68
0
NYC
(read on to find out the source of all your Pulse360 clickfraud)

So yesterday I was browsing for a download link the latest entourage episode on warez-bb.org - usually a very safe forum. I hadn't even downloaded anything yet - I was just browsing around (in Firefox). All of a sudden AVG started freaking out with a bunch of messages about shit getting downloaded. I deleted what I could.....or so it seemed.

I've got this SpyWare on my computer now that is a pain in the ass to remove. I can't open .exe installation files, for one thing (like I tried to download hijackthis but can't install it), and it does all sorts of other shit. When I search for something in google, all the results are redirected to something like:

Code:
http://windowsclick.com/go.php?u=Ap7qs0A8vyj55CRShiFZgIVFhwlI2SpUsnVwckdy_r7Tly0VC4ulA1kiu2shj5C9vzZESGxC5ys88wYoaVyDFtoAe0pC4d93bb3Rfzhkz48Eenw4HRgwPhB7fGeimxPA-w-H2B5P2O3r6HURmFM31vNJ-GEkEFfgINiOtcOV-ovcbBIb_hPRHcO3RvF9OD_XNwQF7avzYT4wxHAyV3y_aumYawJJxiCxEGAeuUUAQjv42g5qtKIrChUF4aUr991A3TZGSffg2cR5D4AxjP8F5mOsIhsk0A3MMqROpLO6Ocm-N8qOoIrdqH9ZZBA1O1ATSiUs36GWPcdnyO2tLZ6t9FaFdx2ZN-got2qvg22BU-ncaC4wXlydJt7E634Dl4eE0Jw4j7-xFZmm12XFmF8NhZddc0bl98h88l3cCkZYJCfKMTAq44s7zEVlBZG6DAd9Lqkr2pjhPS7pas0jNoPdZRwbgufmiVmAwWYy-RNBz2gzb1dlNNJfoOweuSd7mknfBxTz723B8uepaBp7_8CAh4FGd92-b6JSJHI6bsz-O2l1MtoMX25IjIkr3LnoELlvFGTWnOvGg042VbWEes0G79tlvnzd79N2ftUGu4w2Q2Gsiy5Yt7sx1kqwfJL5IjwehC4lXDNMdAhU9gVLzw9Trqxn8NrpWHF6gqxV26GF7SaL2c1l3iYZZFlDt_dSNy89yTNmKzGR-yLN9OMfRycz2TQq2XDBjspZff7INHm2bfH5cvbQyHb8O0zjgGBnMtP_ubRbJh8QKZnqCjov5Ec799LKLzDWa0dzWGxzte-prmLcpwbonwPMPLat6IKeQCdjLtZBwu3JaN0w1tXi5pJqbqyuxZBGQ6MsotJZ4vpqYiNwdvHuZa9400ArdoYJxh2vEsDVgfOWd3UBKXXasbN5djhPU8-d04kEwubwcA5tHnOIWrxI91UcZl6fFYEvq7kcf7FctnapFqWVp3Bx_wQJ22muFKdzislv8ZtI5jL-2RnZ1Zq0o3EmKQudKyJgnWA5frLWpmtbP7Rbv03bymsz9pimu0WzYcm58nOGTPVlO9uZOvNOKBe44Vr39aGalvMIV3qcEJY8bjTj6JOu9C_SBpNHlqntd1qUmquifaK7J1wBLuFpq9zbMc6H1kt1vz3XjqKp_69x7Y1dcG6htuIEXP_JbY_6V3LRuVWqUfX2vvOdPFxqgXb6c7cu06xQOmrAmKCZoPR4K-CPI7qf7ypWmvXKy5bl7XT5hr-gLRPXbwcWTbHoHuxvPnOjmzEyMUmzkoCGCGjYYYMlhRJceKOLlSFY5J9jDw5aMlGTi4ILDx5lsmT45IOG1i4c2O7rfqOhD1nLIUMOEMIrAEC_fyDg_Z_x6G7V9puwL57TGHbkXkZMPkSMjr6WtWSe6de9_HJUQCJHJm01dFEEREFQwC4CrzJ4J5I-DAAglqumMlloNe%3Ds%3Fphp.c%2F711.691.111.46&bid=0.025500&aid=158&said=clean12&mppc=peak
I wanted to see where this was hosted, so I looked up the whois. I got more than I bargained for!

Code:
Domain Name: windowsclick.com
Registered at http://www.dynadot.com

Registrant:
Zitoclick
Elliott Cameron
15180 Western Springs
Reno, NV 89521
United States

Administrative Contact:
Zitoclick
Elliott Cameron
15180 Western Springs
Reno, NV 89521
United States
[URL="http://www.domaintools.com/registrant-search/?email=0d4644339b612dd2c0fd56878c089325"][IMG]http://source.domaintools.com/email.pgif?md5=0d4644339b612dd2c0fd56878c089325&face=Atomic_Clock_Radio&size=7&color=000000&bgcolor=FFFFFF&face=Trebuchet&size=9&color=0000FF&bgcolor=FFFFFF&format%5B%5D=underline&format%5B%5D=transparent&format%5B%5D=transparent[/IMG][/URL]
+1 775-851-7682

Technical Contact:
Zitoclick
Elliott Cameron
15180 Western Springs
Reno, NV 89521
United States
[URL="http://www.domaintools.com/registrant-search/?email=0d4644339b612dd2c0fd56878c089325"][IMG]http://source.domaintools.com/email.pgif?md5=0d4644339b612dd2c0fd56878c089325&face=Atomic_Clock_Radio&size=7&color=000000&bgcolor=FFFFFF&face=Trebuchet&size=9&color=0000FF&bgcolor=FFFFFF&format%5B%5D=underline&format%5B%5D=transparent&format%5B%5D=transparent[/IMG][/URL]
+1 775-851-7682

Record expires on 2010/01/11 UTC
Record created on 2009/01/11 UTC

Domain servers in listed order: 
ns1.zitodns.com
ns2.zitodns.com
Keep in mind this is from a very visible URL that I can see just by clicking on a google result - it is not some background process. Surely nobody running spyware traffic would be stupid enough not to get a private whois. So it must be a fake name or identity theft or something right?

Turns out, no...

If you google for Elliot Cameron, it's not difficult to find this little gem:

Federal Trade Commission, Plaintiff, v. ERG Ventures, LLC, et al, Defendants

Looks like this guy has been around the block when it comes to spyware! He had to pay $3 mil in 07 along with his partners - which is probably nothing compared to how much he banks.

I tried calling him but got his answering machine. I left a message asking him to call me back regarding private matters.

------------
other details:

I watched Ethereal to see what kind of shit this spyware is doing. There is always at least one instance of iexplore.exe open in the background consuming a fair bit of memory, so what is it up to?

It's putting all sorts of random searches through

Code:
http://www.alertsfind.com
That's an obvious rip of

Code:
http://www.alert4find.com
(just look at the unchanged footer). It then proceeds to click on the kanoodle ads, engaging in obvious clickfraud against a Pulse360-owned company (no wonder we are always complaining :crying:).

Meanwhile, it sends queries that look like this:

Code:
http://www.toptravetmd.com/work.aspx?query=E4C6D5AA9E98A1A9A3AF9CADA0B5A9B1A9BEA892A9716FEBDEE2CAB4A4846FE2DCE0DCA4A9A3AD9A9F737AE8DCE5B5A092979D95AE97A6
If you go to that page you see:

Code:
user= pass= remotehost=74.222.4.235
This seems to be the central control of the whole bot that it checks with for instructions. Troptravetmd.com has an index page that says "正在建设中、、、、、、" which in English means "under construction" - obviously the dude's control center.

That domain is registered to some chinese motherfucker at some sketchy registrar, and is on a server at VRTSERVERS.NET.

So that's about all I have right now.



tl;dr: suggestions for Elliot Cameron? :zzwhip:
 
  • Like
Reactions: Pr0xyhub


Can someone launch a counter strike on this wanker that goes beyond linking his name.

Pulse should be launching a submarine if this fucker is on a boat.
 
Chatmasta - as Johny Drama would scream.. "Victoryyyyyyyyyyyyyyyyyy!"

Nice work, +rep, and kudos for shedding some light on this.
 
Chatmasta, I'd hope you've shut that machine down, you don't knwo what it's doing with your personal shit...
 
More stuff:

Who.is on alert4find.com
Code:
Registrant Contact:
   iversbradly
   Ivers Bradley Email Masking Image@gmail.com
   +1.7165084534 fax: +1.7165084534
   4228 East Cortez St.
   Phoenix Arizona 85028
   us

DNS:
ns1.full4search.com
ns2.full4search.com
and on alertsfind.com
Code:
Registrant Contact:
   Tompson
   Jason Tompson Email Masking Image@freebbmail.com
   +1.7536856123 fax: +1.7536856123
   811 Georga ave.
   Nanaimo B.C. v9r6e3
   ca

DNS:
ns1.alertsfind.com
ns2.alertsfind.com
Googling "Ivers Bradley" shows that he is involved in plenty of malware.

"Jason Tompson" on Google reveals his facebook, in which it lists his location as "Vancouver, BC" which matchs the whois info. Facebook Link


These sites both push searches through urls like this:
Code:
http://64.111.196.117/c.php?s=eNoV0N1uqkAUBeAHMuHM7Pm_8AJLSysIQSMiNycOA0oLRYseHTMPf2h2srKTta6-1mEiOXecupXFbbnLbVkkWL9nc4c8xNmUGCEHCCkkQADGgIgzYf40_nzuBKZgNBWqMlIxSlnFa8SIqUwFGpPmr6KcM6YUcFKBgpppijSpBWs0sAPhTjjq6mRIbDym99bf-snLn325jgGv26x7VGnnF_3pSOyYtPdAd_klb36gkq-zpR2um_dO5Z_ftzSMz4egXydK991JRVYFz7fBRB-8ahcspKv8Jy2vG_VyjbIrCrffMybwzV8O4eU0UP6cBV-XQmtYbAWHTdPF1vLVeLdiUUQii7Y9qgO5W4Zf-Wf0CO_-bP1qZeoE95TyOPcocU7IiUp5ZBKT1CHnwGXwOO9hPB7CyXWz6DX5OOqd-v3Pui__Tavfc5MoMSTu38ayWKIkLKc2u-1BXR3jTVVLKjRhqNaU1BLkRKsNQ9IwQ_8D19WLkw
which in turn redirects to various tracking urls, such as:
Code:
http://hempstringbobbiner.com/results.php?aff=13866&subaff=3-beeresult&q=test&ipr=&rej=1&data=12sfe345g
http://findabsolutely.com/jump1/?affiliate=2780&subid=13866&terms=test&sid=Z261044095z81NwUTMyIzX0cTNfdTMfhTMx8lMyUzM0cDO0ITM&a=vgpt&mr=1&rc=0
http://www.alivelocal.com/jump1/?affiliate=2780&subid=13866&terms=test&sid=Z713044024181NwUTMyIzX0cTNfdTMfhTMx8lMyUzM0cDO0ITM&a=vgpt&mr=1&rc=0
http://dinoflagellatearcology.com/results.php?aff=13866&subaff=3-beeresult&q=test&ipr=&rej=1&data=12sfe345g
etc.
64.111.196.117 is the ip of the searchs, and is hosted by ISPrime, Inc.

When a link is clicked after a search, it sends the user to this ip: 76.9.16.155, which is again hosted by ISPrime, Inc.

That then sends the user to an affiliate page, such as this:
Code:
http://feed.ndot.com/clickn.php?fb=aSlAXz5iW2g%20bWcxRGJDaDBQUztpUGR6RG1bej5tdXE%20YltoPm1nMURqMC0wJGQmOEJDWkRtW2g%20bXUxRG1EWT5gJTFHaEBZOGBDWWkkMGpSVkQjOGhARiUpQFklXzZZMCRDXzBQRzZuJ2FZPmAlMUdoQFluTi1oUng/LzBWRCM4aEBoJW1AWWkpflowaiVfPkl%20OjBJfkZpaGdCRylSLUcpdUI%20JGE6PkksOkdJJWBHbTtZPmAlMT5JQFlpQkYvaUJbJlEkYVk%20YCUxJWhEMURtfkZpajA7R20lcSVqeHppbS0tPkl4amlCMDtHSSxgaWppIDBJejslaCUgRG1baD5tOzFEakYvOGBkJlJOLVswSkQjOGhARj4pQFklbX46PkpaOkdfWl9HX35fJSlAXz4pQDY%20SkQjOGhAaD5ZUzY4ajpZPmAlMUdJYTFEanpaUid%20MXZfP1tpUGR6OGo/ImlKIF9SSj9abmB%20TDBCY0U4Tno6WGBHLzBJWkZTOy11WCl1aD5JaUJEbVtoPm1hMURqWzo4TjtZPmAlMUdJQFklKXVaJVZEIzhoQF8%20WVMvMFZEIzhoQDY%20WURxR2gsWiVWRCM4aEBgPllTZTBQLWBuYFM7RG1baD5tYTFEYmQtOGBhWT5gJTElbUBZUVB%20WT5gJTElKXUxRG04QnZtOyB2bWlCdm1haERtW2g%20bXVfPllTbW5gQ0VSJ1MgUEJHTDBOLFk%20YCUxJW1AWUNDJVk%20YCUxJWhAWWkkMGpEbVtoPm0sMURtdWg%20SWlCRG1baD5taTFEYkc2aWp4ajBZRCM4aEBfPllEQkdWRCM4aEBoPllTWVEkYVk%20YCUxR0lAWSVWcTolSkQjOGhAYD5ZU1tpUHomaWAybURtW2g%20bWExRG1%20RSVJdVk%20YCUxPilAWTBqLXEwJGQmaWAybURtW2g%20bWExRG1%20RSVJdVk%20YCUxR21AWWlCeG1RTkM7RG1bLz5tfiM4aEBGJWhAWWkkZEIwUFNaUVBHLTgtPy8wVkQjOGhAWj5ZREYlaH4gRG1bPzhoQGg%20WVNbMEksWT5gJTElaEQxRG0tekdCU3olSSxfR2pHekdoeC0%20SThfJW1nIGlqU20wJHhtPilEYCVoZG1EbVs/&b=MC4wMQ==&p=Mg==

So basically, Elliot Cameron is up to some shady affiliate stuff with his partners.
 
If I wanted to use a fake name everyone would believe, I would pick a known scammer and use his contact info for my whois.

Just saying.
 
This is certainly fucked up.

So is it safe to say that the person who has obtained the top positions with pulse360 for so long is in some way tied in with this, or no?
 
Faint- awesome! Nice investigating. :D

Synozeer said:
If I wanted to use a fake name everyone would believe, I would pick a known scammer and use his contact info for my whois.

Just saying.

I thought of this too. It's definitely possible. His answering machine didn't mention a name, but just said "you've caught me away from the phone." I will continue to try to contact him.

mediasup said:
Wow this is getting interesting. Hope Pulse360 acts on stopping this type of stuff.

I don't think there's much they can do in terms of prevention, but hopefully they actively hunt down sites like this. A high number (3+ in a short period of time) of clicks coming from one IP (mine) should be suspicious.

mattseh said:
Chatmasta, I'd hope you've shut that machine down, you don't knwo what it's doing with your personal shit...

Well I finally managed to fix it. It was a PITA before because the spyware was blocking me from using the common anti-spyware programs. It also propgates throughout the system pretty fast. Seems like a lot of people are infected with it though, because googling for windowsclick.com brought me to How to remove windowsclick.com redirect [UACd.sys trojan] | My Anti Spyware. Once I ran avenger, I could use all my anti-spyware programs again. I ran a full scan on each of them and it seems to be gone now.

Needless to say I changed all my account passwords.