[nsp-sec] Outdated CERT.ORG notifications?

Nicholas Ianelli ni at cert.org
Wed Feb 6 04:29:13 EST 2008


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Hank,

Yes, these recently went out to various groups. We also had data from
2005, but is was decided to not even send this data out.

We fully understand that many organizations wouldn't have this data, and
if they did, probably wouldn't be a good use of their time to go look at
and verify that the customer is still infected. At the request of the
FBI (as well as other National CSIRTs) we decided to still send it out
and leave the decision up to you. My guess is many people probably
received infection details through other means during that time.

Nick

Hank Nussbacher wrote:
> ----------- nsp-security Confidential --------
> 
> Has anyone else received a notice from CERT in regards to Operation BOT
> ROAST II along with "Attached is a list of suspect IP addresses within your
> country. Any assistance that you could provide in securing and/or
> notifying the persons responsible for these hosts would be appreciated."
> 
> But the IPs are from 2006 and are about 1.5 years old on average?  This 
> appears to be a somewhat waste of time.
> 
> Regards,
> Hank
> 
> 
> 
> _______________________________________________
> nsp-security mailing list
> nsp-security at puck.nether.net
> https://puck.nether.net/mailman/listinfo/nsp-security
> 
> Please do not Forward, CC, or BCC this E-mail outside of the nsp-security
> community. Confidentiality is essential for effective Internet security counter-measures.
> _______________________________________________

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (MingW32)

iD8DBQFHqX3pi10dJIBjZIARCMhiAJ9CLrqTD12kRhSqyK1ANxAicmJdiQCdFPk3
FqB97pkh9UcEKXnOb8b5KWw=
=fL0w
-----END PGP SIGNATURE-----



More information about the nsp-security mailing list