Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Security Spam

Spam Opt-out Link Triggers Malicious Code Attack 327

Maestro4k writes "The Register is reporting on a new spam E-mail circulating out there. In it, clicking on the 'Click here to remove' link launches a site, that when the user scrolls the page, triggers a drag-drop javascript exploit. Scarily the E-mail actually complies with the CAN-SPAM act as it only requires spammers to put an opt-out link in their mailings. As The Reg says "It comes as little surprise that this feature is been taken advantage of in a social engineering exploit; but it does illustrate the security problems of the opt-out approach that were always apparent to security experts - and ignored by legislators." The link in questions points to www. xcelent.biz (As in The Reg story, space intentionally included) so even if you can't block the mail yet it should be easy to block access to the site with the exploit. I suspect this is just the beginning and most spam will include "features" such as this in the near future."
This discussion has been archived. No new comments can be posted.

Spam Opt-out Link Triggers Malicious Code Attack

Comments Filter:
  • devious (Score:4, Informative)

    by hendridm ( 302246 ) on Wednesday September 22, 2004 @10:49AM (#10319131) Homepage
    Fortunately, there is a patch for it, Mozilla is unaffected, and Norton and McAfee (at minimum) seem to detect it. That just leaves the millions of unpatched Windows machines that are running out-dated or low-grade antivirus!
  • by Anonymous Coward on Wednesday September 22, 2004 @10:49AM (#10319134)
    Don't worry, this isn't a real problem [com.com]:
    "Given the significant amount of user action required to execute an attack, Microsoft does not consider this to be a high risk for customers," a company representative said, adding that the software giant's security experts are continuing to research the issue.

    I mean, using a scrollbar. Come on, what kind of ignorant user is going to use a scrollbar an a site they don't trust? ;-)
    • by Anonymous Coward on Wednesday September 22, 2004 @10:52AM (#10319172)
      Here is the pertinent CERT advisory [cert.org] for this flaw.

      The idea is that all the website designer has to do is make an image that LOOKs like a scrollbar. The user goes and clicks and drags it to scroll down, not knowing it's fake. If there is a DYNSRC="..." attribute specified in the <IMG...> tag, Internet Explorer downloads and runs whatever program is specified, without any kinds of prompts whatsoever.

      Even with SP2 installed.
      • by Anonymous Coward
        This is my favorite part:
        III. Solution

        Disable Drag and drop or copy and paste files
        Disabling the zone security preference "Drag and drop or copy and paste files" prevents drag and drop operations.

        Note: This preference is not honored with Windows XP operating systems.
        Oh-well, at least it won't affect my Linux and OS/2 boxes if I turn that off.
      • by bheerssen ( 534014 ) <bheerssen@gmail.com> on Wednesday September 22, 2004 @12:08PM (#10320011)
        Yep, exactly right.

        For the curious, here is an interesting post [seclists.org] that describes the exploit at some length. Essentially, it uses an HTML 'dynsrc' attribute (proprietary Microsoft extension) to allow IE to download the executable, and javascript to use the 'shell:' protocol to execute it. It's not a particularly new flaw, but this is the slickest exploit of it I've seen.
    • oh, come on now, it was just a typo, what they meant was that it is not a high risk for MS *intellimouse* customers.

  • by OverlordQ ( 264228 ) * on Wednesday September 22, 2004 @10:49AM (#10319135) Journal
    but my AntiVirus has detected this exploit for a *long* time.

    JS/Exploit-DragDrop.b.gen
    • Yeah except you update your defs dont you?

      Seriously though, I've seen computers bought less than a month previously that ALREADY have their subscription expired due to the length of time the computer sat at the store---it's not surprising to think that even new-ish comptuers might not have either the patch or the virus defs
  • interesting strings (Score:3, Informative)

    by Anonymous Coward on Wednesday September 22, 2004 @10:49AM (#10319141)
    the executable contains the strings "xProxyBot v 1.0.0" and www.earthlabs.biz/sockproxy/rec.php.
    • by Anonymous Coward
      Virus Scan for Linux v4.32.0
      Scan engine v4.3.20 for Linux.
      Virus data file v4394 created Sep 22 2004

      Identified it as:

      $ uvscan --secure windows-update32.exe
      /home/recall/windows-update3 2.exe
      Found the BackDoor-CHP trojan !!!
  • by FearTheFrail ( 666535 ) on Wednesday September 22, 2004 @10:49AM (#10319142)
    So now that we have a legal, malicious attack, we'll only have to wait a few -more- years for bills to be passed to have the law catch up with some watermark of digital exploitation. Super.
    • by auzy ( 680819 ) on Wednesday September 22, 2004 @11:04AM (#10319308)
      Actually, I think thats the wrong approach. I just think vendors like Microsoft need to take responsibility for the poor security in their products.. Many exploits against windows products for instance were long known to come out before they were released, amongst many others. There was a time when eeye had serious exploits listed that took Microsoft longer then 100 days to fix.

      Also, from past experience, legislation is often abused in computer cases (as demonstrated by people like the RIAA). Personally, its been pretty rare to see decent laws against computer crimes (I haven't heard of any I agree with so far).

      I think the development of sender verification frameworks for Email will also eventually help, provided that MS is willing to accept the open standards for once.
    • by stratjakt ( 596332 ) on Wednesday September 22, 2004 @11:09AM (#10319362) Journal
      There's nothing legal about this.

      It's not specifically illegal under the CAN-SPAM act, but it's just as illegal as any other exploit, trojan or worm.
    • by gcaseye6677 ( 694805 ) on Wednesday September 22, 2004 @11:41AM (#10319694)
      The government could crack down on most spam sources anytime they feel like taking the problem seriously. With all the business, tax code, interstate commerce, and other regulations on the books already, any spammer is bound to be violating a bunch of existing laws. And since many spamvertized products and services are fraudulent or blatantly illegal, simply prosecuting with traditional laws would be adequate.

      If the IRS started auditing every known spammer with operations or residence in the United States, that would have a very chilling effect on spam. I'd bet my life savings that spammers don't report all of their income for tax purposes. If other countries then followed suit, spam would be relegated to the far corners of the world and easily firewalled.
    • Flash Lynch Mobs.
  • by Three Headed Man ( 765841 ) <dieter_chen.yahoo@com> on Wednesday September 22, 2004 @10:51AM (#10319160)
    ...to get SpamAssassin.
  • by politicsie04 ( 778589 ) * on Wednesday September 22, 2004 @10:51AM (#10319161) Homepage
    Whois says that the website is operated by Anandan Krishan from Malaysia, so lets all send him an email, win2save@yahoo.com , complaining that he has discrimnated against Firefox, and Linux users of his website, and that in future he should have a more inclusive virus.
    • by Nos. ( 179609 )
      I tried to post the whois for the site as well as the whois for the IP that it's hosted on but gave up when /. said I had too many "junk" characters. Sheesh... here's a quick summary of the IP owner though:

      Yu, Shao
      4F, No. 7, Aly. 7, Lane 355, Sec. 2, Neihu Rd.
      Taipei City
      TW
      Shao Yu (SY167-TW) hn87788676@hn.hinet.net
      +886-9-36-045496

    • Hmm...Not Malaysia, address 61.218.79.53

      Country: TW
      Netname: YU-SHAO-E4-TW
      Descr: CHTD, Chunghwa Telecom Co., Ltd.Data-Bldg. 6F, No. 21, Sec. 21, Hsin-Yi
      Rd.,Taipei Taiwan
      Status: ASSIGNED NON-PORTABLE
      Source: TWNIC
      Server: APNIC
      Inetnum: 61.218.79.48 - 61.218.79.63
  • Dumb (Score:5, Funny)

    by sl8r ( 104278 ) on Wednesday September 22, 2004 @10:52AM (#10319169)
    Also, the programmer seems to have had fun writing the javascript on that xcelent.biz page. From the source:
    // probably the dumbest scrollbar emulation on this planet ;)
  • by jarich ( 733129 ) on Wednesday September 22, 2004 @10:52AM (#10319179) Homepage Journal
    The article says they know the name of the website... why is it still there? Why is the EXE still available?

    I realize that another spammer will take advantadge of the hole next week but if the hosters were blacklisted from DNS servers, the offending files might get removed a little faster.

  • by Evan Meakyl ( 762695 ) on Wednesday September 22, 2004 @10:54AM (#10319193)
    The link in questions points to www. xcelent.biz (As in The Reg story, space intentionally included)

    There should be a real link, in order to /. it!!!
    • You can install Linkification [beggarchooser.com] that allows you "to view plain-text URLs and e-mail addresses as actual links". Well, of course I am assuming you are not running IE!
    • Hazardous link (Score:5, Informative)

      by abb3w ( 696381 ) on Wednesday September 22, 2004 @11:35AM (#10319629) Journal
      Now, now, there might be someone who might go to that page with IE. However, no doubt the Slashdot community would be interested in attempting their own effort at reverse engineering the trojan that they want you to download [xcelent.biz].

      Of course, anyone who installs that on a non-isolated, non-virtual machine pretty much deserves the results. It looks like it has the standard "Software\Microsoft\Windows\Current Version\Run", "Software\Microsoft\Windows\Current Version\RunServices", and "SYSTEM\CurrentControlSet\Control\SafeBoot\" registry hooks. (Unix "strings" is your friend....)

  • by Mignon ( 34109 ) <satan@programmer.net> on Wednesday September 22, 2004 @10:54AM (#10319195)
    Why don't we non IE-users use the Slashdot effect for good? Let's all visit the evil site [xcelent.biz] and soon it will be a steaming pile of rubble.
  • New News? (Score:5, Informative)

    by Kartik3 ( 590836 ) on Wednesday September 22, 2004 @10:55AM (#10319203)
    Spammers have often used an "unsubscribe" link or something similar only to verify your email address and send you more spam. While not the same as triggering an exploit, I've been under the impression that spammers have taken advantage of users with an "opt out" type of link in this way for quite a while now.
    • You'd have to be nuts to click on any link at all that arrived via spam. "Unsubscribe" links have been proven time and again to be feedback mechanisms for helping spammers identify good addresses.

      Of course, now that we have HTML email with IMG tags (whoopee.) you don't even need to click on a link anymore.
    • That's why everyone disagreed with the use of opt-out in the first place.

      Most people don't ever click on the opt-out link for that exact reason. The fact that someone has made it even more dangerous to do so just proves the point.

      As long as they can keep saying "but you haven't opted out" they're safe.

  • by Indy1 ( 99447 ) on Wednesday September 22, 2004 @10:56AM (#10319208)
    host www.xcelent.biz
    www.xcelent.biz has address 61.218.79.53
    host 61.218.79.53
    53.79.218.61.in-addr.arpa domain name pointer 61-218-79-53.HINET-IP.hinet.net

    and people wonder why i firewall 60/7
  • MIME Defang (Score:3, Informative)

    by alatesystems ( 51331 ) <chris@[ ]isbenard.net ['chr' in gap]> on Wednesday September 22, 2004 @10:56AM (#10319213) Homepage Journal
    This is a good reason to use mime_defang with spamassassin. Either do that or what I do, have it actually attach the message as a .eml file(rfc 822 or whatever) and then you can view it in whatever you want and even reimport it into your mailbox.

    I hate spam, but I haven't had a false positive or negative in forever combining the bayes inside spamassassin with the bayes inside thunderbird.

    Chris
    • Re:MIME Defang (Score:3, Informative)

      by gmuslera ( 3436 )
      Or better yet, Anomy Sanitizer [anomy.net]. It disables "active" html content (i.e. javascript) attached to mails, can quarantine/rename files by extension, and of course, can call a configurable antivirus to check and take actions.

      That is mostly the way i use it, disabling html, checking attached files for virus, and the windows executable extensions that passed the antivirus check gets renamed anyway to make them not executable without strong user action. Attached HTML pages sometimes don't look/work as desired, bu

  • Exploit (Score:5, Informative)

    by jargoone ( 166102 ) * on Wednesday September 22, 2004 @10:56AM (#10319219)
    The article didn't give much explanation about the drag-and-drop exploit itself. Understandably, given the audience, but I was curious. Here's a good link: http://xforce.iss.net/xforce/xfdb/13679 [iss.net]
  • by Indy1 ( 99447 ) on Wednesday September 22, 2004 @10:58AM (#10319236)
    Starting nmap 3.70 ( http://www.insecure.org/nmap/ ) at 2004-09-22 09:54 MDT
    Interesting ports on 61-218-79-53.HINET-IP.hinet.net (61.218.79.53):
    (The 1651 ports scanned but not shown below are in state: closed)
    PORT STATE SERVICE
    21/tcp open ftp
    22/tcp open ssh
    80/tcp open http
    111/tcp open rpcbind
    135/tcp filtered msrpc
    443/tcp open https
    445/tcp filtered microsoft-ds
    3306/tcp open mysql
    6000/tcp open X11

    Nmap run completed -- 1 IP address (1 host up) scanned in 54.453 seconds

  • The only thing you should be clicking on, in a spam message, is the delete icon/key.
  • by nologin ( 256407 ) on Wednesday September 22, 2004 @11:06AM (#10319331) Homepage
    ... that would turn your machine into a Spambot; now that would be funny. :)

    CAN-SPAM may require an opt-out option in the e-mail to remain legal. However, the legislation DOESN'T protect you from the consequences of using that opt-out option.

    It's legislated social engineering at its finest. Good luck out there.

  • IT Geeks - 1
    Politicos without "tech savvy" - 0

    This is the way it will always be unfortunately. Unless the whole population eventually can understand all the technical aspects of computers and the internet, or computers and the internet become so rock solid/secure AND easy to use, it will always be this way.
  • Javascript console (Score:2, Interesting)

    by saned ( 736423 )
    Firefox's Javascript console reports many errors:

    Error: unterminated string literal Source File: http://focusin.ads.targetnet.com//ad/id=dmitryiva n ov&opt=hjj&rw=468&rh=60&cv=220&uid=673 475 Line: 3, Column: 17 Source Code: document.writeln('

    Error: newPopup has no properties Source File: http://mediamgr.ugo.com/js.ng/Network=ugo&size=1x1 &adtype=over&affiliate=ultimate-guitar&suba=ultima te-guitar&channel=music&subchannel=tic&category=ti c&PT=ct
  • by codepunk ( 167897 ) on Wednesday September 22, 2004 @11:10AM (#10319377)
    I just sent a link to that to the MCSE slags at work. How long till they figure out they just got owned.
  • by CdBee ( 742846 ) on Wednesday September 22, 2004 @11:11AM (#10319384)
    I recenived an email from MyPoints asking me to activate an account set up on my Gmail address a few days ago, and hit the CAN-spam opt-out link (I hadn't signed up for it)

    Since then I'm getting a LOT of spam, I received none prior. All have the same recipient name as the Mypoints mail and some other common characteristics, but none of the opt-out stuff. Thankfully, gmail is autofiltering them without any need for intervention, but I can't help but feel MyPoints are behind it.

    Has anyone else had the same thing happen?
  • by 3terrabyte ( 693824 ) on Wednesday September 22, 2004 @11:14AM (#10319422) Journal
    I thought it would be neat to see how good their fake-jpeg scrollbar was, so I loaded the page. I had no plans on 'scrolling down'.

    Didn't get that far. Just loading the page launched it. Anti-virus kicked in with a warning, home page was attempted to change, and then I got a call from headquarters to follow the delousing drill, since they also get all of our warnings.

    Well that was fun. Didn't get to see any scroll bar :(

    Windows 2000 - IE 5.50.4807.2300

    • the scrollbar is the real IE scroll bar but there's an invisible image on top of it. When you click and drag you're actually dragging this image onto a small square that follows the mouse cursor - you can't avoid dropping it into that small image.

      the js code scrolls the page for you, instead of the actual scroll bar. since you're scrolling the page (via javascript) the real scroll bar reflects the new page position, making you think you actually were dragging the scroll bar.

      as you learned, the code does
  • Win32.Sokeven.D (Score:2, Informative)

    by davidwr ( 791652 )
    39,936 bytes
    Added to Computer Associates database 9/21/04

    What do other vendors call this?
  • by mykepredko ( 40154 ) on Wednesday September 22, 2004 @11:16AM (#10319445) Homepage
    Seriously.

    It's not like spammers are a class of people to be trusted. I always felt the opt-out requirement was joke and prime for abuse. By opting out, you are telling the spammer that you read every email that comes your way and they add it to their list of email addresses that actually respond to spam.

    So what do they do with this list? If they follow the letter of the law, they will stop spamming - but, they have a list of high quality email IDs that they can sell to other spammers.

    Users should always follow these simple instructions with regards to email spam:

    1. Make sure you have an incoming mail spam filter, like SpamAsassin.
    2. Delete any spam that gets through.
    3. If you are interested in the product, do not contact the email (spam) source, reply to the email, click on "helpful" buttons. Find reputable mainstream vendors - if it's great then Wal-Mart, Best Buy, Circuit City, etc. will stock it.

    myke
    • "3. If you are interested in the product, do not contact the email (spam) source, reply to the email, click on "helpful" buttons. Find reputable mainstream vendors - if it's great then Wal-Mart, Best Buy, Circuit City, etc. will stock it."

      If you are interested, buy from a competitor. Note that under your system, it still makes sense for a manufacturer (e.g. the makers of Cialis, Levitra, or herbal substitutes) to support spam (either directly or through dealer incentives). E.g. if someone spams you to bu

  • Why, exactly, is anybody reading SPAM? It is not like you cannot tell just by looking at the subject and the From line.

    Secondly, why are people viewing emails as anything but text?

  • You click the opt-out link, bad things happen. Before it was even more spam, now it's malicious attacks.

    How many people really trust spammers to honor an opt-out?
  • by Chatmag ( 646500 ) <editor@chatmag.com> on Wednesday September 22, 2004 @11:30AM (#10319586) Homepage Journal
    There is a slew of sites on that same server according to Webhosting Info [webhosting.info] that are infected, some with windows-update.exe and others with windows-update32.exe
  • YARTNUIE (Score:2, Redundant)

    by Ghengis ( 73865 )
    Yet
    Another
    Reason
    To
    Not
    Use
    Internet
    Expl orer.
  • Quick .EXE Analysis (Score:4, Interesting)

    by terrencefw ( 605681 ) <slashdot@@@jamesholden...net> on Wednesday September 22, 2004 @11:44AM (#10319729) Homepage
    As one other poster pointed out, running 'strings' on the executable reveals itself it be 'xProxyBot'.

    Some other strings give a few clues about what it does:

    • Software\Microsoft\Windows\CurrentVersion\Run - It installs itself in the registry.
    • Mozilla/4.0 (compatible) - It grabs stuff of the web and tries to look like IE in the logs.
    • SYSTEM\CurrentControlSet\Control\SafeBoot - Tries to get started in safe mode too.
    It installs itself in Software\Microsoft\Windows\CurrentVersion\Run as 'w32.exe'. I don't see it doing very much though. I've let it loose on a VMWare '98 session. No opened ports (unless it responds to portknocking), no attempts at outbound communication, maybe '98 is too old for it!
  • I just got exploited (Score:3, Informative)

    by iMaple ( 769378 ) on Wednesday September 22, 2004 @11:45AM (#10319743)
    I decided to try it out on my Windows machine, so opened the link in IE. I had Win XP SP2 and an updated Norton Antivirus and the (new ) Win XP firewall on.
    But the exploit worked !! I was expecting to get a pop up from NAV with an exciting alarm sound .
    (Un)Fortunately since it worked now I know what it does :
    1) Add thw windows-update.exe in the startup folder
    2) Add a new file cmd.dat to the startup folder.
    Anyway since I had gone so far, I tried running the Windows-udpadte , but that gave me the error that it was not a valid exe file. I ran it in the protected moded (available when u slecet run as.. in Win XP). Then I renamed the dat file to .exe and ran that in the protected mode too. It ran !! It tried to access the internet but I hope the WinXP 2 firewall stoppped it. Anyway got sort of scared since my Win Laptop is not junk and I use it whenever I need a Laptop with standby and Powerpoint. So now I have deleted the files. Cant see any new services in the registry either so hopefully my machine isnt yet a spam mail relay.
    BTW if anyone else has tried it out and know about something else that should be done pls let me know. And does anyone have a clue why NAV does not detect this ?? Maybe u need to activate it for IE or make IE the default browser ???
  • Duh... How stupid do you want to present yourself as? You are having foreign code executing on your computer. How many friggin computers infected does this need to present a problem for before people get a clue?

    Bottom line: EXECUTING FOREIGN COMPUTER CODE (be it Javascript or Java) IS A POTENTIAL HAZARD. Solution: Disable the execution of such code in your browser. Don't reactivate it until providers (of Javascript or Java) allow you to sue them for liability). Until then they don't trust their own co
  • by gelfling ( 6534 ) on Wednesday September 22, 2004 @12:06PM (#10319989) Homepage Journal
    I like a good practical joke as much as the next person. Can we just track down one of these people, drag him/her outside chop them up with bolo knives hunt down their families, rape mutiliate and murder them set fire to their houses, kill their dogs and piss all over the corpses already?

    I figure 10, 20 thousand of these losers tops and the problem will go away.
      • I like a good practical joke as much as the next person. Can we just track down one of these people, drag him/her outside chop them up with bolo knives hunt down their families, rape mutiliate and murder them set fire to their houses, kill their dogs and piss all over the corpses already?

        I figure 10, 20 thousand of these losers tops and the problem will go away.

      While I appreciate the sentiment (personally I'm thinking boiling oil would be appropriate for spammers) I doubt it'd help. Even with the de

  • by Chuck Bucket ( 142633 ) on Wednesday September 22, 2004 @12:07PM (#10319992) Homepage Journal
    If SA 3.0 is running with SUBL support, how can we add: www.xcelent.biz to the SUBL list? In that case, SA 3.0 would block this email alltogether. I think this is a killer feature of SA now, and I'm waiting to learn more about it so I can update my current 2.x version running on my home mailserver.

    PCB$@#
  • by miu ( 626917 ) on Wednesday September 22, 2004 @12:12PM (#10320057) Homepage Journal
    By creating the .biz TLD they created a shyster scum ghetto I can easily ignore.

    Thank you ICANN! :)

  • I block all .biz (Score:3, Interesting)

    by emptybody ( 12341 ) on Wednesday September 22, 2004 @12:28PM (#10320241) Homepage Journal
    what, you dont have a .com?
    get over it.
  • Fill his database (Score:5, Interesting)

    by caffeine_monkey ( 576033 ) on Wednesday September 22, 2004 @01:25PM (#10320981)
    It looks like he's not checking the field length of that "email addr" input before inserting it into the DB, so it should be a simple matter for someone to write a script to continuously loop through a POST to http://61.218.79.53/o/cgi-bin/removeme.cgi with a large amount of data in the field name "email". If a few people do this, his DB should fill up pretty quick.
  • by Honest Man ( 539717 ) on Wednesday September 22, 2004 @04:14PM (#10323084)
    Well, we could always call the owner of the site and tell him how much we 'so' appreciate his exploit being used on ppl.

    Domain Name: XCELENT.BIZ
    Domain ID: D7752456-BIZ
    Sponsoring Registrar: CSL COMPUTER SERVICE (D.B.A. JOKER.COM)
    Domain Status: clientTransferProhibited
    Registrant ID: CNEU-105661
    Registrant Name: Anandan Krishan
    Registrant Organization: Iscon & Krishan
    Registrant Address1: Suite 50-12
    Registrant Address2: Jalan Yap Kwan Seng.
    Registrant City: Kuala Lumpur
    Registrant State/Province: KL
    Registrant Postal Code: 50450
    Registrant Country: Malaysia
    Registrant Country Code: MY
    Registrant Phone Number: +603.27756842
    Registrant Facsimile Number: +603.27756642
    Registrant Email: win2save@yahoo.com
    Administrative Contact ID: CNEU-105617
    Administrative Contact Name: Anandan Krishan
    Administrative Contact Organization: Iscon & Krishan
    Administrative Contact Address1: Suite 50-12
    Administrative Contact Address2: Jalan Yap Kwan Seng.
    Administrative Contact City: Kuala Lumpur
    Administrative Contact State/Province: KL
    Administrative Contact Postal Code: 50450
    Administrative Contact Country: Malaysia
    Administrative Contact Country Code: MY
    Administrative Contact Phone Number: +603.27756842
    Administrative Contact Facsimile Number: +603.27756642
    Administrative Contact Email: win2save@yahoo.com
    Billing Contact ID: CNEU-105617
    Billing Contact Name: Anandan Krishan
    Billing Contact Organization: Iscon & Krishan
    Billing Contact Address1: Suite 50-12
    Billing Contact Address2: Jalan Yap Kwan Seng.
    Billing Contact City: Kuala Lumpur
    Billing Contact State/Province: KL
    Billing Contact Postal Code: 50450
    Billing Contact Country: Malaysia
    Billing Contact Country Code: MY
    Billing Contact Phone Number: +603.27756842
    Billing Contact Facsimile Number: +603.27756642
    Billing Contact Email: win2save@yahoo.com
    Technical Contact ID: CNEU-105617
    Technical Contact Name: Anandan Krishan
    Technical Contact Organization: Iscon & Krishan
    Technical Contact Address1: Suite 50-12
    Technical Contact Address2: Jalan Yap Kwan Seng.
    Technical Contact City: Kuala Lumpur
    Technical Contact State/Province: KL
    Technical Contact Postal Code: 50450
    Technical Contact Country: Malaysia
    Technical Contact Country Code: MY
    Technical Contact Phone Number: +603.27756842
    Technical Contact Facsimile Number: +603.27756642
    Technical Contact Email: win2save@yahoo.com
    Name Server: NS1.GRAITHBOADER.BIZ
    Name Server: NS2.GRAITHBOADER.BIZ
    Name Server: NS2.TIKONDES.BIZ
    Created by Registrar: CSL COMPUTER SERVICE (D.B.A. JOKER.COM)
    Last Updated by Registrar: CSL COMPUTER SERVICE (D.B.A. JOKER.COM)
    Domain Registration Date: Wed Sep 15 03:53:27 GMT 2004
    Domain Expiration Date: Wed Sep 14 23:59:59 GMT 2005
    Domain Last Updated Date: Wed Sep 15 04:03:16 GMT 2004

    **

Order and simplification are the first steps toward mastery of a subject -- the actual enemy is the unknown. -- Thomas Mann

Working...