[nsp-sec] 1Million Botnet Ips

Par Osterberg Medina par.osterberg at sitic.se
Wed Jul 30 04:04:01 EDT 2008


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


Sorry for ACK:in to this so late. Vacation is a wonderful thing, at
least for me;)

Proxy-ACK for the Swedish ASN in
http://www.cert.at/static/xi3shiZiexu/ips_SE.csv

Mvh / Regards
Pär Österberg Medina - Sitic, GovCERT-SE


Stephen Gill wrote:
> ----------- nsp-security Confidential --------
> 
> Hi Team,
> 
> Cert.at has assembled an excellent report on the nadnadzzz.info botnet along
> with a large list of compromised IPs!  They have put together an analysis
> summary and individual report files of compromised hosts sorted by ASN at
> the following location:
> 
>     http://www.cert.at/static/xi3shiZiexu/ips_by_AS/
>     username: nadnadzzz
>     pass: letmein
> 
> Please do not share this URL outside of the nsp-sec community.  If you can
> proxy for an entire country, you may be interested in perusing the cctld
> files here:
> 
>     http://www.cert.at/static/xi3shiZiexu/ips_$CC.csv
>     username: nadnadzzz
>     pass: letmein
>     * Where $CC is your ccTLD country code in capital letters (e.g. "MX")
> 
> The report, not for redistribution can be found here:
> 
>     http://www.cert.at/static/xi3shiZiexu/botnetpaper2.pdf
> 
> Finally, here is a brief summary from their team:
> 
>> nadnadzzz.info botnet analysis
>> ==============================
>>
>> CERT.at has been analysing the nadnadzzz.info botnet. We were able to track
>> the botnet and extract a list of affected IP addresses.
>> It contains around 950,000 different IPs.
>> While the list is probably not exhaustive and while we expect further C&C
>> servers, we want to share this info with concerned parties from ns-psec and
>> the wider CERT community.
> 
>> C&C servers
>> ----------------------
>> 67.43.232.36/32 - seems to be down or blocks us as of 2008/06/30
>> 211.95.79.151/32 - seems to be down or blocks us as of 2008/06/30
>> 211.95.79.165/32 - seems to be down or blocks us as of 2008/06/30
>> 220.196.42.156/32 - seems to be down or blocks us as of 2008/06/30
>> 61.174.17.90/32  - alive as of 2008/06/30
>> 61.174.17.89/32  - alive as of 2008/07/03 17:00    UTC+02
>>
>> Protocol: IRC
>> Port: 7000
>>
>>
>> 5 most affected countries:
>>  cnt_ips | countrycode
>>     ---------+-------------
>>  254660 | MX
>>  202109 | BR
>>   52377  | CL
>>   50078  | IN
>>   43725  | PL
>>
>>
>> We would appreciate feedback at team at cert.at
> 
> Enjoy, and have a Happy 4th of July ;D.
> 
> Cheers,
> Steve, Team Cymru.
> 
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFIkCBxpIEfudwUi78RAqhQAJ471C9XGEgRNBWP9bThLbwCf8T1eACgjKLN
yFLwKJW3w8N7JGo81aaKx7g=
=muTu
-----END PGP SIGNATURE-----



More information about the nsp-security mailing list