[nsp-sec] Large injection AS4134, lots of upstreams (AS4812 also involved)
Brian Eckman
eckman at umn.edu
Wed Apr 23 12:16:51 EDT 2008
Yiming,
Yes, you may pass it along to CT.
Thanks!
Brian
Gong, Yiming wrote:
> Hi Brian,
>
> Would you mind I pass your list to CT guys? They need some evidences to
> take action, thanks
>
> Regards,
>
> Yiming
>
>
>> -----Original Message-----
>> From: nsp-security-bounces at puck.nether.net
>> [mailto:nsp-security-bounces at puck.nether.net] On Behalf Of
>> Brian Eckman
>> Sent: Wednesday, April 23, 2008 10:18 AM
>> To: Smith, Donald
>> Cc: nsp-security at puck.nether.net
>> Subject: Re: [nsp-sec] Large injection AS4134, lots of
>> upstreams (AS4812 also involved)
>>
>> ----------- nsp-security Confidential --------
>>
>> FWIW, Infected clients are given a laundry list of malware to
>> download,
>> including:
>>
>> hXXp://1.haoliuliang.net/ma/1.exe
>> hXXp://1.haoliuliang.net/ma/2.exe
>> hXXp://1.haoliuliang.net/ma/3.exe
>> hXXp://1.haoliuliang.net/ma/4.exe
>> hXXp://1.haoliuliang.net/ma/5.exe
>> hXXp://1.haoliuliang.net/ma/6.exe
>> hXXp://1.haoliuliang.net/ma/7.exe
>> hXXp://1.haoliuliang.net/ma/8.exe
>> hXXp://1.haoliuliang.net/ma/9.exe
>> hXXp://1.haoliuliang.net/ma/10.exe
>> hXXp://2.haoliuliang.net/ma/11.exe
>> hXXp://2.haoliuliang.net/ma/12.exe
>> hXXp://2.haoliuliang.net/ma/13.exe
>> hXXp://2.haoliuliang.net/ma/14.exe
>> hXXp://2.haoliuliang.net/ma/15.exe
>> hXXp://2.haoliuliang.net/ma/16.exe
>> hXXp://2.haoliuliang.net/ma/17.exe
>> hXXp://2.haoliuliang.net/ma/18.exe
>> hXXp://2.haoliuliang.net/ma/19.exe
>> hXXp://2.haoliuliang.net/ma/20.exe
>> hXXp://2.haoliuliang.net/ma/21.exe
>> hXXp://2.haoliuliang.net/ma/22.exe
>> hXXp://2.haoliuliang.net/ma/23.exe
>>
>> > host 1.haoliuliang.net
>> 1.haoliuliang.net has address 222.73.44.134
>>
>> > host 2.haoliuliang.net
>> 2.haoliuliang.net has address 222.73.44.135
>>
>> AS | IP | AS Name
>> 4812 | 222.73.44.134 | CHINANET-SH-AP China Telecom (Group)
>>
>> PEER_AS | IP | AS Name
>> 4134 | 222.73.44.135 | CHINANET-BACKBONE No.31,Jin-rong Street
>>
>> Non-infected clients are drawn to gg.haoliuliang.net and
>> gg.haoliuliang.com,
>> but I've only seen infected clients going to 1.haoliuliang.net and
>> 2.haoliuliang.net.
>>
>> Brian
>>
>> Smith, Donald wrote:
>>> ----------- nsp-security Confidential --------
>>>
>>> If you google for www.nihaorr1.com you will find the target
>> of the "large injection site" that several av companies and
>> some certs are talking about today. This resolves to
>> 219.153.46.28. From there users get directed to a site that
>> trys to exploit several applications.
>>> Some details here:
>>> http://securitylabs.websense.com/content/Alerts/3070.aspx
>>> http://isc.sans.org/diary.html?n&storyid=4294
>>>
>>>
>>> Here is the actual google search
>>>
>>>
>> http://www.google.co.uk/search?q=%3Cscript+src%3Dhttp://www.ni
>> haorr1.com&hl=en&start=0&sa=N
>>>
>>>
>>> bash-3.1$ whois -h whois.cymru.com 219.153.46.28
>>> AS | IP | AS Name
>>> 4134 | 219.153.46.28 | CHINANET-BACKBONE No.31,Jin-rong Street
>>> bash-3.1$ whois -h upstream-whois.cymru.com 219.153.46.28
>>> PEER_AS | IP | AS Name
>>> 174 | 219.153.46.28 | COGENT Cogent/PSI
>>> 703 | 219.153.46.28 | UUNET - MCI Communications
>> Services, Inc. d/b/a Ve
>>> izon Business
>>> 1239 | 219.153.46.28 | SPRINTLINK - Sprint
>>> 2828 | 219.153.46.28 | XO-AS15 - XO Communications
>>> 2914 | 219.153.46.28 | NTT-COMMUNICATIONS-2914 - NTT
>> America, Inc.
>>> 3257 | 219.153.46.28 | TISCALI-BACKBONE Tiscali Intl
>> Network BV
>>> 3320 | 219.153.46.28 | DTAG Deutsche Telekom AG
>>> 3549 | 219.153.46.28 | GBLX Global Crossing Ltd.
>>> 3561 | 219.153.46.28 | SAVVIS - Savvis
>>> 11164 | 219.153.46.28 | TRANSITRAIL - National LambdaRail, LLC
>>> 17888 | 219.153.46.28 | SINGTEL-HK SingTel Hong Kong Limited
>>>
>>> If someone could get this taken down that would be most beneficial.
>>>
>>> donald.smith at qwest.com giac
>>>
>>>
>>>
>>> This communication is the property of Qwest and may contain
>> confidential or
>>> privileged information. Unauthorized use of this
>> communication is strictly
>>> prohibited and may be unlawful. If you have received this
>> communication
>>> in error, please immediately notify the sender by reply
>> e-mail and destroy
>>> all copies of the communication and any attachments.
>>>
>>>
>>> _______________________________________________
>>> nsp-security mailing list
>>> nsp-security at puck.nether.net
>>> https://puck.nether.net/mailman/listinfo/nsp-security
>>>
>>> Please do not Forward, CC, or BCC this E-mail outside of
>> the nsp-security
>>> community. Confidentiality is essential for effective
>> Internet security counter-measures.
>>> _______________________________________________
>>
>> --
>> Brian Eckman, Security Analyst
>> University of Minnesota
>> Office of Information Technology
>> Security & Assurance
>>
>>
>> _______________________________________________
>> nsp-security mailing list
>> nsp-security at puck.nether.net
>> https://puck.nether.net/mailman/listinfo/nsp-security
>>
>> Please do not Forward, CC, or BCC this E-mail outside of the
>> nsp-security
>> community. Confidentiality is essential for effective
>> Internet security counter-measures.
>> _______________________________________________
>>
--
Brian Eckman, Security Analyst
University of Minnesota
Office of Information Technology
Security & Assurance
More information about the nsp-security
mailing list