[nsp-sec] Pinch C&C with compromised FTP accounts (5000+)

Dave Woutersen (GOVCERT.NL) dave.woutersen at govcert.nl
Fri Jun 6 07:41:06 EDT 2008


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hi all,

The following URL leads to a list of compromised FTP-accounts.

http://87.118.110.78/pinch/ftp.txt

Ive contacted CERT-Bund for this but other might find it interesting to
check (for as long as it is available) and see if any of there users are
compromised.
With kind regards,
Dave Woutersen

- --
Dave Woutersen
security specialist

GOVCERT.NL
T +31 70 888 75 55
I www.govcert.nl
E dave.woutersen at govcert.nl

PGP Fingerprint: C87E 47E2 89D8 5DFB C86F  A3F3 1557 E2E9 AC15 7DD5

GOVCERT.NL is the Computer Emergency Response Team for the Dutch
Government. We support the government in preventing and dealing with
IT-related security incidents.


-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 9.0.4 (Build 4042)

iQA/AwUBSEkiT0vUPFJLM5FwEQKRqACgg7c7OBIyaoAW3PRWsp38TYM2J1UAn0M2
TbS071lT44qOdfyYoQLzen/t
=wBi+
-----END PGP SIGNATURE-----




More information about the nsp-security mailing list