[nsp-sec] 1Million Botnet Ips
Lawrence Baldwin
baldwinl at mynetwatchman.com
Sat Jul 5 11:14:20 EDT 2008
How can the "count of infected IPs" be > 1 within a /32?
e.g:
2 | 63.149.54.129/32 | 2008-06-20 01:44:34+02 | 209 | US |
ASN-QWEST - Qwest
Lawrence Baldwin
Chief Forensics Officer/
Cybercrime Investigator
myNetWatchman.com
Alpharetta, GA
+1.678.624.0924
-----Original Message-----
From: nsp-security-bounces at puck.nether.net
[mailto:nsp-security-bounces at puck.nether.net] On Behalf Of Stephen Gill
Sent: Friday, July 04, 2008 13:02
To: nsp-security NSP
Subject: [nsp-sec] 1Million Botnet Ips
----------- nsp-security Confidential --------
Hi Team,
Cert.at has assembled an excellent report on the nadnadzzz.info botnet along
with a large list of compromised IPs! They have put together an analysis
summary and individual report files of compromised hosts sorted by ASN at
the following location:
http://www.cert.at/static/xi3shiZiexu/ips_by_AS/
username: nadnadzzz
pass: letmein
Please do not share this URL outside of the nsp-sec community. If you can
proxy for an entire country, you may be interested in perusing the cctld
files here:
http://www.cert.at/static/xi3shiZiexu/ips_$CC.csv
username: nadnadzzz
pass: letmein
* Where $CC is your ccTLD country code in capital letters (e.g. "MX")
The report, not for redistribution can be found here:
http://www.cert.at/static/xi3shiZiexu/botnetpaper2.pdf
Finally, here is a brief summary from their team:
> nadnadzzz.info botnet analysis
> ==============================
>
> CERT.at has been analysing the nadnadzzz.info botnet. We were able to
> track the botnet and extract a list of affected IP addresses.
> It contains around 950,000 different IPs.
> While the list is probably not exhaustive and while we expect further
> C&C servers, we want to share this info with concerned parties from
> ns-psec and the wider CERT community.
> C&C servers
> ----------------------
> 67.43.232.36/32 - seems to be down or blocks us as of 2008/06/30
> 211.95.79.151/32 - seems to be down or blocks us as of 2008/06/30
> 211.95.79.165/32 - seems to be down or blocks us as of 2008/06/30
> 220.196.42.156/32 - seems to be down or blocks us as of 2008/06/30
> 61.174.17.90/32 - alive as of 2008/06/30
> 61.174.17.89/32 - alive as of 2008/07/03 17:00 UTC+02
>
> Protocol: IRC
> Port: 7000
>
>
> 5 most affected countries:
> cnt_ips | countrycode
> ---------+-------------
> 254660 | MX
> 202109 | BR
> 52377 | CL
> 50078 | IN
> 43725 | PL
>
>
> We would appreciate feedback at team at cert.at
Enjoy, and have a Happy 4th of July ;D.
Cheers,
Steve, Team Cymru.
--
Stephen Gill, Chief Scientist, Team Cymru http://www.cymru.com | +1 312 924
4023 | gillsr at cymru.com
_______________________________________________
nsp-security mailing list
nsp-security at puck.nether.net
https://puck.nether.net/mailman/listinfo/nsp-security
Please do not Forward, CC, or BCC this E-mail outside of the nsp-security
community. Confidentiality is essential for effective Internet security
counter-measures.
_______________________________________________
More information about the nsp-security
mailing list