[nsp-sec] 598 Compromised hosts

Smith, Donald Donald.Smith at qwest.com
Tue Jul 1 18:35:03 EDT 2008


Netflow report complete. I stand corrected in that I now believe those
ips are botted.

They are talking to 69.64.76.38 on tcp port 2008.
That ip is listed here:
http://www.emergingthreats.net/rules/emerging-botcc-BLOCK.rules
alert ip $HOME_NET any -> [<SNIP long list of ips] any (msg:"ET DROP
Known Bot C&C Traffic (group 15) - BLOCKING SOURCE";
reference:url,www.shadowserver.org; threshold: type limit, track by_src,
seconds 3600, count 1; classtype:trojan-activity; sid:2405014; rev:1211;
fwsam: dst, 30 days;)

They are also talking to 189.17.122.195 on tcp 5555
That ip also shows up in the emergingthreats rules with a pointer to
shadowserver.org.
I searched shadowserver.org for the ips and didn't get a match.

We will get our customers notified.


Security through obscurity WORKS against some worms and ssh attacks:)
Donald.Smith at qwest.com giac 

> -----Original Message-----
> From: nsp-security-bounces at puck.nether.net 
> [mailto:nsp-security-bounces at puck.nether.net] On Behalf Of 
> Smith, Donald
> Sent: Tuesday, July 01, 2008 3:31 PM
> To: Nicholas Ianelli
> Cc: nsp-security NSP
> Subject: Re: [nsp-sec] 598 Compromised hosts
> 
> ----------- nsp-security Confidential --------
> 
> 
> 
> Security through obscurity WORKS against some worms and ssh attacks:)
> Donald.Smith at qwest.com giac 
> 
> > -----Original Message-----
> > From: Nicholas Ianelli [mailto:ni at cert.org] 
> > Sent: Tuesday, July 01, 2008 3:06 PM
> > To: Smith, Donald
> > Cc: nsp-security NSP
> > Subject: Re: [nsp-sec] 598 Compromised hosts
> > 
> > -----BEGIN PGP SIGNED MESSAGE-----
> > Hash: SHA256
> > 
> > 
> > 
> > | :i use stacheldraht.
> > | :mostly out of Solaris boxes
> > | :shcrew kit and t0rnkit coded by me.
> > |
> > 
> > |> shv5 and others in the family included synscan.
> > |> Tornkit2 shared elements from ramen which used synscan.
> > |> I was told that some versions of torn used synscan but I 
> > never saw one:(
> > |
> > |> Does he use psych0id, mixer, or pint as an aliases?
> > 
> > I've only seen the following:
> > 
> > KH4ALED
> > Danny-Boy
> > brzi
> > SDK
> > 
> > I highly doubt he's the author of any of those. I'd chalk it up to
> > talking trash. Though he may have made "custom" mods (take 
> > that for what
> > ever it's worth).
> > 
> > What I'd like to know is the OS' of the compromised hosts, 
> if they are
> > Solaris boxes, he may have some power. I've sent emails to 
> a few South
> > American contacts (thanks Guilherme), I'm hoping for some 
> data points.
> > 
> > Any ideas on the three below?
> 
> Three dynamic dsl ip addresses in phoenix, KC and Portland.
> Our dsl dynamic ip address space is not a good place to run services.
> The ips change to fequently.
> 
> None of them appear to be running well known services (ssh, telnet nor
> http) on standard ports.
> I will go look at netflow but I would bet nearly anything 
> these are not
> solaris systems.
> I am running a report now to see what is in netflow for those systems
> but this is being to look like a false positive.
> 
> 
> > 
> > | |
> > | | The ASN - IP mapping can be found here:
> > | |
> > | | https://asn.cymru.com/nsp-sec/upload/1214882891.whois.txt
> > 
> > | |
> > | | 209     | 63.229.83.8      | ASN-QWEST - Qwest
> > | | 209     | 70.56.99.180     | ASN-QWEST - Qwest
> > | | 209     | 71.34.70.112     | ASN-QWEST - Qwest
> > 
> > Nick
> > -----BEGIN PGP SIGNATURE-----
> > Version: GnuPG v1.4.6 (MingW32)
> > 
> > iD8DBQFIapw4i10dJIBjZIARCNGeAKCCRUd4Sj20oxAIdHyKT/9J68fdvACgn8An
> > jV0xXH1Fey5LM/uUb2QZaeI=
> > =y0nG
> > -----END PGP SIGNATURE-----
> > 
> 
> 
> This communication is the property of Qwest and may contain 
> confidential or
> privileged information. Unauthorized use of this 
> communication is strictly 
> prohibited and may be unlawful.  If you have received this 
> communication 
> in error, please immediately notify the sender by reply 
> e-mail and destroy 
> all copies of the communication and any attachments.
> 
> 
> _______________________________________________
> nsp-security mailing list
> nsp-security at puck.nether.net
> https://puck.nether.net/mailman/listinfo/nsp-security
> 
> Please do not Forward, CC, or BCC this E-mail outside of the 
> nsp-security
> community. Confidentiality is essential for effective 
> Internet security counter-measures.
> _______________________________________________
> 
> 



More information about the nsp-security mailing list