Is this a crafted malformed text msg for Android?

  • Release Candidate 6
    Guest:
    We are at a “proposed final” true release candidate with nothing known remaining to be changed or fixed. For the full story, please see this page in the "Pre-Release Announcements & Feedback" forum.
    /Steve.
  • Be sure to checkout “Tips & Tricks”
    Dear Guest Visitor → Once you register and log-in:

    This forum does not automatically send notices of new content. So if, for example, you would like to be notified by mail when Steve posts an update to his blog (or of any other specific activity anywhere else), you need to tell the system what to “Watch” for you. Please checkout the “Tips & Tricks” page for details about that... and other tips!

    /Steve.

P

pmikep

Guest
I have removed my content
 

Attachments

  • crafted message.jpg
    crafted message.jpg
    426.9 KB · Views: 657
Last edited by a moderator:
Looks like a real domain to me. The ".me" is the TLD for Montenegro. Obviously it would not be a good choice to click (if you had the ability on your device).
Sub-domain: j3d3tr
Domain: n7h1k
TLD: .me
Query: ?f6y?d4jl=j&fH
 
  • Like
Reactions: StevenW
I think it's probably a scam/spam/malware message. That's an address to some web page (that I would stay well and clearly away from):
nslookup n7h1k.me
Non-authoritative answer:
Name: n7h1k.me
Address: 192.64.119.196
 
I have removed my content
 
Last edited by a moderator:
Here's a quick inspection into the response from that URL. Noted, this can only be done safely from the command line, using tools like curl.

Response from j3d3tr.n7h1k.me redirects to another site:

Code:
HTTP/1.1 302 Found
Connection: keep-alive
Content-Length: 43
Content-Type: text/html; charset=utf-8
Date: Mon, 28 Dec 2020 17:40:06 GMT
Location: http://w1h2ir3.space
Server: nginx
X-Served-By: Namecheap URL Forward

<a href='http://w1h2ir3.space'>Found</a>.

Response from w1h2ir3.space redirects to another site:

Code:
HTTP/1.1 302 Found
Connection: keep-alive
Content-Length: 130
Content-Type: text/html; charset=utf-8
Date: Mon, 28 Dec 2020 17:40:42 GMT
Location: https://nqzem.instawhore.net/c/1e3a4e532f1c7040?s1=16343&s2=1200740&s3=K01K&s5=K01K&click_id=K01K&j1=1&j3=1
Server: nginx
X-Served-By: Namecheap URL Forward

<a href='https://nqzem.instawhore.net/c/1e3a4e532f1c7040?s1=16343&s2=1200740&s3=K01K&s5=K01K&click_id=K01K&j1=1&j3=1'>Found</a>.

Response from nqzem.instawhore.net is a shady HTML/Javascript that intercepts mouse and keyboard events. Visible contents are filled with phrases such as:

Code:
We have a lot of horny girls on our site who want to send their nudes to you. Before you see them, we need to ask a few questions.

So... yeah. It's a phishing scam. Stay away from it.
 
I also received such messages! These are scammers, never reply to such messages or click on the text on them. My friend once had his phone blocked. Unfortunately, it was no longer subject to repair.
I found out about it on the website — https://www.familyorbit.com/blog/iphone-tracker/. Here you can sometimes find helpful information on the iPhone.
I still don't understand why scammers are so fond of hacking iPhones. As if there are not enough android users. Although, of course, it would be better if there were no such scammers at all.
 
Last edited: