Yesterday, two zones were quickly blocked as a result of being related to the DataSpii case.
The commit (
https://github.com/bentasker/adblocklists/commit/5a90d2cf4e40eaba383e0d8a0c17b6e7b0618268) blocked
- adclarity.com
- adcint.net
(the commit also accidentally picked up a previously uncommitted change. oops).
The second zone was blocked because the former CNAME's into it
$ host pnldsk.adclarity.com
pnldsk.adclarity.com is an alias for pnldsk.adcint.net.
pnldsk.adcint.net has address 209.126.124.242
Both domains are associated with the company Adclarity - an Israeli marketing intelligence (read tracking) company.
They, however, were just a conduit for the DataSpii issue, and many more domains were involved.
DataSpii is described as
DataSpii is the catastrophic data leak that occurred when any one of eight browser extensions collects browsing activity data — including personally identifiable information (PII) and corporate information (CI) — from unwitting Chrome and Firefox users. This data was then disseminated to members of an online service, where it may have been appropriated or exploited by any member.
Extensions known to be involved (i.e. sending data) are
- Hover Zoom
- SpeakIt!
- SuperZoom
- SaveFrom.net Helper
- Fairshare Unlock
- PanelMeasurement
- Branded Surveys
- Panel Community Surveys
Extensions have been observed surreptiously submitting all visited URLs (and in some cases, all URLs visible
within pages visited), ultimately resulting in those URLs being processed by Nacho Analytics. Some of the extensions listed deployed measures to try and evade detection, including waiting (on average) 24 days after install to start submitting browsing data.
URL strings have been found, in some cases, to contain PII.
An indicator file has been made available here -
https://securitywithsam.com/dataspii-latest.ioc - containing all the currently known hostnames associated with this serious data leak.
This issue is being raised to track taking that file, extracting the domains and adding them into the blocking list.
Activity
2019-07-19 13:56:39
Current resolution results are as follows
2019-07-19 13:59:47
Webhook User-Agent
View Commit
2019-07-19 14:01:46
Webhook User-Agent
View Commit
2019-07-19 14:12:02
2019-07-19 14:27:32
The IPs above return a default SSL cert with a common name of ddmr.com:
According to their website, DDMR.com is:
Ars notes (https://arstechnica.com/information-technology/2019/07/dataspii-inside-the-debacle-that-dished-private-data-from-apple-tesla-blue-origin-and-4m-people/) that
Fairshare, of course, being one of the extensions at the heart of DataSpii.
As their sole form of business seems to be tracking and profiling, even without the links to this, I think they'd qualify for being zone blocked even without the DataSpii links.
2019-07-19 14:29:47
Webhook User-Agent
View Commit
2019-07-19 14:41:07
Kontera.com
Already blocked
Amobee.com
New owner of Kontera. Not currently blocked.
IPs:
2019-07-19 14:43:47
Webhook User-Agent
View Commit
2019-07-19 15:13:05
2019-07-19 15:13:05
2019-07-19 15:13:05
2019-07-19 15:13:10