[nsp-sec] New Feed: Malware URLs

Stephen Gill gillsr at cymru.com
Thu May 8 16:45:45 EDT 2008


The nature of the beast with malware Urls is that a large percentage of them
may very well be compromised sites so the traditional sense of "validity" is
vastly decreased.  Any legitimate site can become a malware URL hoster - a
classic example was the superbowl series, or the government sites used as a
convincer for IRS spear phishing.   We do not offer a separate list of known
bad actors that just don't seem to go away, etc.

> Next if we wished to selectively block sites on this list but didn't
> charge our customers for this "service" do I still need written
> permission? 

That seems reasonable - let's call this the written permission ;).

Cheers,
-- steve

>> -----Original Message-----
>> From: nsp-security-bounces at puck.nether.net
>> [mailto:nsp-security-bounces at puck.nether.net] On Behalf Of
>> Stephen Gill
>> Sent: Thursday, May 08, 2008 10:40 AM
>> To: nsp-security NSP
>> Subject: [nsp-sec] New Feed: Malware URLs
>> 
>> ----------- nsp-security Confidential --------
>> 
>> Hi Team,
>> 
>> We are very pleased to announce a new feed available for
>> nsp-sec use!  This
>> feed is a summary of malware URLs we've uncovered and vetted using a
>> combination of AV engines where at least one AV engine has
>> tagged it as
>> malicious.  It includes data that is fed into ASN Alerts
>> minus URLs that we
>> are not permitted to share.
>> 
>> The feed will be updated at 24 hour intervals and will
>> include a summary of
>> all of the URLs from the past day.  The format of the file
>> will be in our
>> standard pipe delimited output with the following columns:
>> 
>> # ASN | Description                    | IP              |
>> Date       | URL
>> 
>> Please point your browsers to the following address in order
>> to download the
>> new feed using your nsp-sec username and password:
>> 
>>     URL:    https://www.cymru.com/nsp-sec/MalwareURL/
>> 
>> PLEASE NOTE: This feed is for non-commercial use ONLY.   If you are
>> interested in including this in a product set or through
>> customer services
>> you MUST obtain our written permission to do so.
>> 
>> If you have forgotten or need to reset your nsp-sec mailing list
>> login and password, you'll find a handy reset tool at the bottom of
>> the following page:
>> 
>>     URL:   https://puck.nether.net/mailman/listinfo/nsp-security
>>  
>> As always we remain keenly interested in any and all
>> suggestions, feedback,
>> and  reports of false positives.  Please send those to <team-
>> cymru at cymru.com>.
>> 
>> -- 
>> Stephen Gill, Chief Scientist, Team Cymru
>> http://www.cymru.com | +1 312 924 4023 | gillsr at cymru.com
>> 
>> 
>> 
>> 
>> _______________________________________________
>> nsp-security mailing list
>> nsp-security at puck.nether.net
>> https://puck.nether.net/mailman/listinfo/nsp-security
>> 
>> Please do not Forward, CC, or BCC this E-mail outside of the
>> nsp-security
>> community. Confidentiality is essential for effective
>> Internet security counter-measures.
>> _______________________________________________
>> 
>> 
> 
> 
> This communication is the property of Qwest and may contain confidential or
> privileged information. Unauthorized use of this communication is strictly
> prohibited and may be unlawful.  If you have received this communication
> in error, please immediately notify the sender by reply e-mail and destroy
> all copies of the communication and any attachments.

-- 
Stephen Gill, Chief Scientist, Team Cymru
http://www.cymru.com | +1 312 924 4023 | gillsr at cymru.com





More information about the nsp-security mailing list