[nsp-sec] dlink router worm or dlink compromise leadstoinfectedPCs?
John Fraizer
john at op-sec.us
Mon Mar 24 19:49:00 EDT 2008
so, what is your point grasshopper? :)
John Fraizer
Senior Internetworking Engineer
NOC Engineering
NuVox Communications, Inc
(864)331-7575 work
-Sent from my Treo SmartPhone
-----Original Message-----
From: "White, Gerard" <Gerard.White at aliant.ca>
Date: Monday, Mar 24, 2008 7:46 pm
Subject: Re: [nsp-sec] dlink router worm or dlink compromise leadstoinfectedPCs?
To: "Barry Greene (bgreene)" <bgreene at cisco.com>, "Rob Thomas" <robt at cymru.com>, "Smith, Donald" <Donald.Smith at qwest.com>
CC: nsp-security at puck.nether.net
----------- nsp-security Confidential --------
>
>
>>
> So this whole vector could be nasty. SP to customer: "Yo customers, you
> home gateway is owned by some rerow badguy in China. You need to
>unplug
> it, throw it away and get a new one." Customer to SP: "yea right, you
> are just trying to sell me your stuff. You already charge me too much
> and your service sucks - I've got lousy performance."
>
>
>Oh the irony...
>
>If you take the "Dark IP Seeding" system I have in place here (i.e. Seeding across your IP space
>with /31's) and look at the last 8 hours for what's been scanning for TCP/23 against two of our
>/16's, you get this:
>
>AS | IP | AS Name
>24138 | 61.233.11.69 | CRNET_BJ_IDC-CNNIC-AP China Tietong
>Telecommunicati
>4134 | 61.153.176.176 | CHINANET-BACKBONE No.31,Jin-rong Street
>4134 | 61.131.10.66 | CHINANET-BACKBONE No.31,Jin-rong Street
>4134 | 59.42.177.60 | CHINANET-BACKBONE No.31,Jin-rong Street
>4812 | 222.69.60.119 | CHINANET-SH-AP China Telecom (Group)
>4837 | 222.141.220.198 | CHINA169-BACKBONE CNCGROUP China169
>Backbone
>9318 | 218.38.28.147 | HANARO-AS Hanaro Telecom Inc.
>4538 | 210.41.163.3 | ERX-CERNET-BKB China Education and Research Network
>24138 | 61.233.11.69 | CRNET_BJ_IDC-CNNIC-AP China Tietong
>Telecommunicati
>4134 | 61.153.176.176 | CHINANET-BACKBONE No.31,Jin-rong Street
>4134 | 61.131.10.66 | CHINANET-BACKBONE No.31,Jin-rong Street
>4134 | 59.42.177.60 | CHINANET-BACKBONE No.31,Jin-rong Street
>4812 | 222.69.60.119 | CHINANET-SH-AP China Telecom (Group)
>4837 | 222.141.220.198 | CHINA169-BACKBONE CNCGROUP China169
>Backbone
>9318 | 218.38.28.147 | HANARO-AS Hanaro Telecom Inc.
>4538 | 210.41.163.3 | ERX-CERNET-BKB China Education and Research Network
>3786 | 210.108.47.31 | LGDACOM LG DACOM Corporation
>9911 | 202.27.17.234 | CONNECTPLUS-AP Singapore Telecom
>4134 | 202.100.68.17 | CHINANET-BACKBONE No.31,Jin-rong Street
>1659 | 192.192.72.66 | ERX-TANET-ASN1 Tiawan Academic Network
>(TANet) Info
>4766 | 121.159.55.135 | KIXS-AS-KR Korea Telecom
>
>See anything "common" about this source list? Hmmmm....
>
>Incidently the TCP/23 sweeps are being done across /24's within the IP space segments
>I sampled...
>
>GW
>855 - Aliant
>
>
>
>_______________________________________________
>nsp-security mailing list
>nsp-security at puck.nether.net
>https://puck.nether.n
More information about the nsp-security
mailing list