/home2/mshostin/mail/cur/1769083206.M318085P2302385.s21.hosterpk.com,S=12982,W=13196:2,b
Return-Path: <takedown-response+81455276@netcraft.com>
Delivered-To: mshostin@s21.hosterpk.com
Received: from s21.hosterpk.com
	by s21.hosterpk.com with LMTP
	id e5G7EkYRcmmxISMArcgM2A
	(envelope-from <takedown-response+81455276@netcraft.com>)
	for <mshostin@s21.hosterpk.com>; Thu, 22 Jan 2026 12:00:06 +0000
Return-path: <takedown-response+81455276@netcraft.com>
Envelope-to: webmaster@ms-hostingladz.com
Delivery-date: Thu, 22 Jan 2026 12:00:06 +0000
Received: from mail-1c.netcraft.com ([52.31.138.216]:44389)
	by s21.hosterpk.com with esmtps  (TLS1.3) tls TLS_AES_256_GCM_SHA384
	(Exim 4.99.1)
	(envelope-from <takedown-response+81455276@netcraft.com>)
	id 1vitM6-00000009eXf-3BD1
	for webmaster@ms-hostingladz.com;
	Thu, 22 Jan 2026 12:00:06 +0000
Received: from barb.netcraft.com (unknown [10.9.0.151])
	(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
	 key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256)
	(No client certificate requested)
	by mail-1c.netcraft.com (Postfix) with ESMTPS id 3D7E014F4
	for <webmaster@ms-hostingladz.com>; Thu, 22 Jan 2026 11:59:23 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=netcraft.com;
	s=default202405-yu9bqteb95aqcfpg; t=1769083163;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=35kXpRNM0oKZ/TAPov9I9rPhlL1UxtJAxgPhApwjv5c=;
	b=JypagY+UQ+oO0Wm4MAHM0TSZ0k/cStb3MzFV6eOs9KWYSwKkEYUPWQsdq1hXuo0xZs2L2h
	7SnHCE9ut0EI0cOkz2dv/Z4j8iZUd3rN+aM+digS1GMI+kqhxx3nzSbs4xOuDyxsDVPzR2
	aSqQf3iB4UCifkIlTjJ8tx3TY+E999TThIbh296hp9PIeLv9MDT9gMG1magNlruobxUIL7
	iSijxmKDXrIB3rkHoLLBx+pUTYtHRVNFEnr0paoefIlYNnja6KtH4yDrbi1x9bUt6wfory
	XbJg7CUN8vy128I6wI2KZ4R03DKqP3dw0HUeDsxO8D1Jyfx+0s59aU1VavSyEw==
Received: by barb.netcraft.com (Postfix, from userid 507)
	id 3A232B50; Thu, 22 Jan 2026 11:59:23 +0000 (UTC)
Content-Transfer-Encoding: 8bit
Content-Type: multipart/report; boundary="_----------=_1769083163144696538"; report-type="feedback-report"
MIME-Version: 1.0
Date: Thu, 22 Jan 2026 11:59:23 +0000
From: Netcraft Takedown Service <takedown-response+81455276@netcraft.com>
Subject: Re: Issue 81455276: Malicious web shell at hxxps://recovery.meta.verify.ms-hostingladz[.]com/hindberry.php
References: <89721a7f85610538649e33db6be99be1@takedown.netcraft.com>
In-Reply-To: <89721a7f85610538649e33db6be99be1@takedown.netcraft.com>
To: webmaster@ms-hostingladz.com
Message-Id: <15e67dc6856886f91213c84d850b1554@takedown.netcraft.com>
X-Mailer: MIME::Lite 3.030 (F2.85; T2.17; A2.20; B3.15; Q3.13)
X-Spam-Status: No, score=3.7
X-Spam-Score: 37
X-Spam-Bar: +++
X-Ham-Report: Spam detection software, running on the system "s21.hosterpk.com",
 has NOT identified this incoming email as spam.  The original
 message has been attached to this so you can view it or label
 similar future email.  If you have any questions, see
 root\@localhost for details.
 Content preview:  _____ __ __ ______ ___ __ __ __ __
    ___ ___ __ ___ ______ __ ____ ___ ___ ____
    ___ __ ___ __: hxxps://verify.netflix.ms-hostingladz[.]com/hindberry.php
    [64.31.22.34] hxxps://recovery.meta.verify.ms-hostingladz[.]com/hindberry.php
    [64.31.22.34] 
 Content analysis details:   (3.7 points, 5.0 required)
  pts rule name              description
 ---- ---------------------- --------------------------------------------------
  0.0 RCVD_IN_VALIDITY_CERTIFIED_BLOCKED RBL: ADMINISTRATOR NOTICE: The
                             query to Validity was blocked.  See
                             https://knowledge.validity.com/hc/en-us/articles/20961730681243
                              for more information.
                          [52.31.138.216 listed in sa-trusted.bondedsender.org]
  6.2 RCVD_IN_MSPIKE_L5      RBL: Very bad reputation (-5)
                             [52.31.138.216 listed in bl.mailspike.net]
  0.0 RCVD_IN_ZEN_BLOCKED_OPENDNS RBL: ADMINISTRATOR NOTICE: The query to
                             zen.spamhaus.org was blocked due to usage of an
                              open resolver. See
                             https://www.spamhaus.org/returnc/pub/
                             [52.31.138.216 listed in zen.spamhaus.org]
  0.0 RCVD_IN_VALIDITY_RPBL_BLOCKED RBL: ADMINISTRATOR NOTICE: The query to
                              Validity was blocked.  See
                             https://knowledge.validity.com/hc/en-us/articles/20961730681243
                              for more information.
                             [52.31.138.216 listed in bl.score.senderscore.com]
 -2.3 RCVD_IN_DNSWL_MED      RBL: Sender listed at https://www.dnswl.org/,
                             medium trust
                             [52.31.138.216 listed in list.dnswl.org]
  0.0 RCVD_IN_VALIDITY_SAFE_BLOCKED RBL: ADMINISTRATOR NOTICE: The query to
                              Validity was blocked.  See
                             https://knowledge.validity.com/hc/en-us/articles/20961730681243
                              for more information.
                             [52.31.138.216 listed in sa-accredit.habeas.com]
  0.0 URIBL_BLOCKED          ADMINISTRATOR NOTICE: The query to URIBL was blocked.
                             See
                             http://wiki.apache.org/spamassassin/DnsBlocklists#dnsbl-block
                              for more information.
                             [URI: netcraft.com]
                             [URI: xarf.org]
  0.0 URIBL_DBL_BLOCKED_OPENDNS ADMINISTRATOR NOTICE: The query to
                             dbl.spamhaus.org was blocked due to usage of an
                              open resolver. See
                             https://www.spamhaus.org/returnc/pub/
                             [URI: netcraft.com]
                             [URI: incident.netcraft.com]
                             [URI: www.xarf.org]
 -0.0 SPF_PASS               SPF: sender matches SPF record
 -0.1 DKIM_VALID_EF          Message has a valid DKIM or DK signature from
                             envelope-from domain
 -0.1 DKIM_VALID_AU          Message has a valid DKIM or DK signature from author's
                             domain
 -0.1 DKIM_VALID             Message has at least one valid DKIM or DK signature
  0.1 DKIM_SIGNED            Message has a DKIM or DK signature, not necessarily valid
  0.0 RCVD_IN_MSPIKE_BL      Mailspike blocklisted
X-Spam-Flag: NO

This is a multi-part message in MIME format.

--_----------=_1769083163144696538
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
Content-Type: text/plain; charset="UTF-8"

ہیلو،

ہم نے دریافت کیا ہے کہ آپ کے نیٹ ورک پر ایک بدنیتی پر مبنی ویب شیل ہوسٹ کیا جا رہا ہے:

hxxps://verify.netflix.ms-hostingladz[.]com/hindberry.php [64.31.22.34]
hxxps://recovery.meta.verify.ms-hostingladz[.]com/hindberry.php [64.31.22.34]

ویب شیل اسکرپٹ ہیں جو حملہ آوروں کو ریموٹ رسائی حاصل کرنے کے لیے سمجھوتہ کرنے والے ویب سرورز پر اپ لوڈ کرتے ہیں۔ جب ویب براؤزر کا استعمال کرتے ہوئے رسائی حاصل کی جاتی ہے تو، ویب شیل حملہ آوروں کو فائلیں اپ لوڈ کرنے، سرور پر من مانی احکامات پر عمل درآمد کرنے اور سپیم بھیجنے کی اجازت دے سکتے ہیں۔ ویب شیل اکثر سمجھوتہ شدہ سرور پر فشنگ یا میلویئر اٹیک بنانے کے لیے استعمال ہوتے ہیں۔

حملہ آور اکثر ویب شیل کو سومی صفحات کے طور پر چھپانے کی کوشش کرتے ہیں۔ عام تکنیکوں میں جعلی 404 صفحہ واپس کرنا اور صفحہ پر موجود ویب شیل ان پٹ فیلڈز کو پوشیدہ بنانا شامل ہے۔ براہ کرم چیک کریں کہ حملہ آور اس رپورٹ کو مسترد کرنے سے پہلے ویب شیل کو چھپانے کی کوشش نہیں کر رہا ہے۔

اس مسئلے کے بارے میں ہم نے پہلے آپ سے 2026-01-22 11:17:26 (UTC) پر رابطہ کیا تھا۔
ہماری آخری اطلاع کے بعد سے، درج ذیل اضافی URL(ز) کا پتہ چلا ہے:

hxxps://verify.netflix.ms-hostingladz[.]com/hindberry.php

پتہ چلا مسئلہ کے بارے میں مزید معلومات پر فراہم کی گئی ہے۔ https://incident.netcraft.com/reports/e36ix277usbaurcoj2xjfv
API ﺱپﻭﺭٹ ﺱﻡیﺕ ﻡﺯیﺩ ﺕﻑﺹیﻻﺕ کے ﻝیے https://incident.netcraft.com/about ﺩیکھیں۔

آداب،

Netcraft

فون: +44(0)1225 447500
فیکس: +44(0)1225 448600
نیٹ کرافٹ کا شمارہ نمبر: 81455276

اس حملے سے متعلق اپ ڈیٹس کے بارے میں ہم سے رابطہ کرنے کے لیے، براہ کرم اس ای میل کا جواب دیں۔ براہ کرم نوٹ کریں: اس پتے کے جوابات لاگ کیے جائیں گے، لیکن ہمیشہ پڑھے نہیں جاتے۔ اگر آپ کو لگتا ہے کہ آپ کو یہ ای میل غلطی سے موصول ہوئی ہے، یا آپ کو مزید تعاون کی ضرورت ہے، تو براہ کرم رابطہ کریں: support@netcraft.com۔

اس میل کو x-arf ٹولز سے پارس کیا جا سکتا ہے۔ x-arf کے بارے میں مزید معلومات کے لیے http://www.xarf.org/ پر جائیں۔
-------------------
Hello,

We have discovered a malicious web shell being hosted on your network:

hxxps://verify.netflix.ms-hostingladz[.]com/hindberry.php [64.31.22.34]
hxxps://recovery.meta.verify.ms-hostingladz[.]com/hindberry.php [64.31.22.34]

Web shells are scripts that attackers upload to compromised web-servers in order to gain remote access. When accessed using a web browser, web shells can allow attackers to upload files, execute arbitrary commands on the server, and send spam. Web shells are often used to create phishing or malware attacks on the compromised server.

Attackers often attempt to disguise web shells as benign pages. Common techniques include returning a fake 404 page and making the web shell input fields on the page invisible. Please check the attacker is not attempting to hide the web shell before dismissing this report.

We previously contacted you about this issue on 2026-01-22 11:17:26 (UTC).
Since our last notification, the following additional URL(s) have been detected:

hxxps://verify.netflix.ms-hostingladz[.]com/hindberry.php

More information about the detected issue is provided at https://incident.netcraft.com/reports/e36ix277usbaurcoj2xjfv
See https://incident.netcraft.com/about for more details including API support.

Kind regards,

Netcraft

Phone: +44(0)1225 447500
Fax: +44(0)1225 448600
Netcraft Issue Number: 81455276

To contact us about updates regarding this attack, please respond to this email. Please note: replies to this address will be logged, but aren't always read. If you believe you have received this email in error, or you require further support, please contact: support@netcraft.com.

This mail can be parsed with x-arf tools. Visit http://www.xarf.org/ for more information about x-arf.
--_----------=_1769083163144696538
Content-Disposition: inline
Content-Transfer-Encoding: 7bit
Content-Type: message/feedback-report
MIME-Version: 1.0
X-Mailer: MIME::Lite 3.030 (F2.85; T2.17; A2.20; B3.15; Q3.13)
Date: Thu, 22 Jan 2026 11:59:23 +0000

Feedback-Type: xarf
User-Agent: Netcraft
Version: 1
--_----------=_1769083163144696538
Content-Disposition: attachment; filename="xarf.json"
Content-Transfer-Encoding: base64
Content-Type: application/json; charset=utf-8; name="xarf.json"
MIME-Version: 1.0
X-Mailer: MIME::Lite 3.030 (F2.85; T2.17; A2.20; B3.15; Q3.13)
Date: Thu, 22 Jan 2026 11:59:23 +0000
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=

--_----------=_1769083163144696538--