[nsp-sec] ACK AS852 - RE: 10K attacking Ips
Chris Calvert
Chris.Calvert at telus.com
Fri Feb 8 11:41:32 EST 2008
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
ACK'ed for AS852, sanitized and sent to Abuse.
I have flow visibility into what the lone host on our network is doing. Any particular ports for C&Cs that I should look into further?
Chris
> -----Original Message-----
> From: nsp-security-bounces at puck.nether.net
> [mailto:nsp-security-bounces at puck.nether.net] On Behalf Of
> Stephen Gill
> Sent: Friday, February 08, 2008 1:17 AM
> To: nsp-security NSP
> Subject: [nsp-sec] 10K attacking Ips
>
> ----------- nsp-security Confidential --------
>
> Hi Team,
>
> The following Ips have been attacking the Virustotal service in a few
> different ways, non spoofed, should be presumed compromised:
>
> https://www.cymru.com/nsp-sec/Owned/ddos-20070207.txt
-----BEGIN PGP SIGNATURE-----
Version: 9.8.0 (Build 2158)
Charset: utf-8
wsBVAwUBR6yGPANosZkkw642AQhogAf8C51xYFp1MROsSMgaNRIXk6AXkHgvam65
UueTbS7dopBaYVbgVODKc9TgxvRgDHj/BosBP6mS6LqocNUhAV9w37NeVRlYwx+5
nv+9WnKFsmk+mJFQvWq7cvtJWavqFfxpSh6nEqJhlIU50G3feDFxAluykJvQD41/
ZX8kGURVrD5igSiTO5Vag5yYJ/IcIflyYMvxdHqSTVlICYKGE2hFqpCXOYtf8Lo9
E9d2iSVcNIv6cuw0BKQrVjs03+Rw8dKP2Rkmc3ZfZls8va49uhT5uNAZR2e4/eCK
pCsMtbH/GHsUj9umA5VH3Ae6A6oleHrc2Bb+nJuhz9N5UiKDWGdpyA==
=L/GH
-----END PGP SIGNATURE-----
More information about the nsp-security
mailing list