[nsp-sec] UDP based DDoS attack against 80.65.160.10 (AS21196)
Rob Thomas
robt at cymru.com
Sat Mar 8 12:53:19 EST 2008
Hey, Nick.
Apologies for the tardy response; I was on the road.
> europroNET Bosnia has reported a large scale DDoS attack targeting one
> of their IPs (80.65.160.10). All the flows are UDP based, so there may
> be some spoofing involved, though the amount of unique sources (listed
> below) is quite small.
At least some of the attacks were launched from a combination Windows
and Unix botnet. The botnet is located on the #rlz channel on
64.32.10.177 TCP 6667. We see 37 bots on the attack channel
presently. The miscreant or crew is labeled as "jebac" (no quotes).
We don't generally bots of different OS combined in one channel, so
this is fairly rare:
#rlz [A]UDP48264971 H ~UDP572351 at UDPLink-CFECB7CA.operating-
networks.de (Linux operatingcust01.operating-networks.de 2.4.21)
#rlz [C]UDP37410253 H
~UDP929979 at UDPLink-8009F69E.skypoint.net (FreeBSD
matthew.skypoint.net 4.5-RELEASE FreeBSD 4)
#rlz [A]UDP46308402 H ~UDP647385 at 67D107C.4C4F7FB1.4A809331.IP
(Windows NT LAB223SERVER 5.2 build 3790)
#rlz [A]UDP82437591 H
~UDP911187 at 76395417.B3290689.E4654BAC.IP (SunOS omega 5.8
Generic_108528-24 sun4u)
[ ... ]
Some of the attack commands are listed here. All dates and times are
UTC/GMT.
2008-03-07 09:12:59 [#rlz] <A> .udpflood 80.65.160.10 65000 120
2008-03-07 09:23:12 [#rlz] <A> .udpflood 80.65.160.10 999999 20
2008-03-07 09:23:22 [#rlz] <A> .udpflood 80.65.160.10 999999 20
2008-03-07 09:23:24 [#rlz] <A> .udpflood 80.65.160.10 999999 20
2008-03-07 09:23:26 [#rlz] <A> .udpflood 80.65.160.10 999999 20
2008-03-07 09:23:33 [#rlz] <A> .udpflood 80.65.160.10 999999 20
2008-03-07 09:23:43 [#rlz] <A> .udpflood 80.65.160.10 999999 20
2008-03-07 09:25:32 [#rlz] <A> .udpflood 80.65.160.10 999999 20
2008-03-07 09:25:33 [#rlz] <A> .udpflood 80.65.160.10 999999 20
2008-03-07 09:25:33 [#rlz] <A> .udpflood 80.65.160.10 999999 20
2008-03-07 09:25:33 [#rlz] <A> .udpflood 80.65.160.10 999999 20
2008-03-07 09:26:21 [#rlz] <A> .udpflood 80.65.160.10 999999 20
2008-03-07 09:26:45 [#rlz] <A> .udpflood 80.65.160.10 999999 20
2008-03-07 09:26:45 [#rlz] <A> .udpflood 80.65.160.10 999999 20
2008-03-07 09:26:45 [#rlz] <A> .udpflood 80.65.160.10 999999 20
2008-03-07 09:26:46 [#rlz] <A> .udpflood 80.65.160.10 999999 20
2008-03-07 09:26:46 [#rlz] <A> .udpflood 80.65.160.10 999999 20
2008-03-07 09:26:46 [#rlz] <A> .udpflood 80.65.160.10 999999 20
2008-03-07 09:26:46 [#rlz] <A> .udpflood 80.65.160.10 999999 20
2008-03-07 09:26:46 [#rlz] <A> .udpflood 80.65.160.10 999999 20
2008-03-07 09:27:30 [#rlz] <A> .udpflood 80.65.160.10 999999 20
2008-03-07 09:27:30 [#rlz] <A> .udpflood 80.65.160.10 999999 20
2008-03-07 09:27:30 [#rlz] <A> .udpflood 80.65.160.10 999999 20
2008-03-07 09:28:29 [#rlz] <A> .udpflood 80.65.160.10 999999 20
2008-03-07 09:28:29 [#rlz] <A> .udpflood 80.65.160.10 999999 20
2008-03-07 09:28:29 [#rlz] <A> .udpflood 80.65.160.10 999999 20
2008-03-07 09:28:30 [#rlz] <A> .udpflood 80.65.160.10 999999 20
[ ... ]
There are a lot of fun sounding channels and channel topics there.
*** #Ikky 12 [+rk] ( PRIVATE )
*** #scan 15 [+ntr] iLeGaiS TeaM - www.ilegais.com ! - Scan
ON NOT INURL ETC... COMAND !rfi bug dork
*** #balera 1 [+ntr] ( Balera ) | BOTS: ownz.udplink.net |
*** ##ksc## 5 [+ntr] non ci dossate io vado a letto nottola
********
*** #Services 2 [+ntr] Services Channel
*** #senha 1 [+nt]
*** #GE 1 [+nt]
*** #GI 2 [+ntr] ownz.udplink.net
*** #Jo 1 [+ntr]
*** ##vnc## 2 [+nt]
*** #jbksdfsd 1 [+nt]
*** #albania 2 [+ntr] Welcome To #Albania Have Nice Stay !!!
Scan: ON http://www.attacks.ch/ Internet Radio & Tv Join us and to
www.ilegais.com ...! 100% Clean Sites Enjoy Your Stay...!!!
*** #baliemhac 4 [+nt]
*** #CMD 3 [+ntrk] ?~~~~~ Entro sem ser convidado?? = KICK/
BAN ~~~~~?
*** #UDP 41 [+ntr] Welcome to paradise. WARNING! don't use
"inurl: allinurl: intitle: intext:" * IRC: irc.udplink.net BOTS:
ownz.udplink.net HOSP/DOMAIN: http://www.pingohost.com * UDPLink Network
*** #war 5 [+ntr] botnet load on ownz.udplink.net :D
*** #rlz 39 [+sntr] jebac $$$ crew
*** #GameIRC 2 [+ntr] load on ownz.udplink.net
*** #subzid 4 [+ntr] #Subzid/UDPLink: SCAN ONLINE Strings:
http://www.pucorp.t5.com.br/strings.txt
*** #enchufe 1 [+nt]
*** #6thsense 2 [+ntr] load on ownz.udplink.net
*** #ilegais 8 [+ntr] .::,iLeGaiS TeaM::. www.ilegais.com
Mano Apx_ Fora do grupo Temporiariamente =/ || JO RETIRED|| Mas nao
deixa de ser do Ilegais!
Lots more to investigate there.
Thanks,
Rob.
>
--
Rob Thomas
Team Cymru
http://www.cymru.com/
ASSERT(coffee != empty);
More information about the nsp-security
mailing list