[nsp-sec] (AS33626 - upstreams AS701, AS2914, AS3356, AS27524) ns1.dsredirection.com and ns2.dsredirection.com - Might be 0wned?!??!?
Brian Allen
ballen at wustl.edu
Thu May 8 18:13:54 EDT 2008
Ah ha, found them in my history. These two hostnames were in the Univ
of Auckland's passive dns for 208.73.212.12 at 2:30pm Central today:
almbarcoz.info, majzufaiuq.info
RUS-CERT only had almbarcoz.info listed.
I checked my dns logs a few minutes after 2:30pm and found gmal.com and
searchportal.information.com which both of which resolved to
208.73.212.12. Now there are a ton as BrianE reported.
I'm waiting on sending out infected notices to my admins until I can
gather more info, but I've got a decent amount of traffic to
208.73.212.12, probably 38 machines or so.
Thanks,
Brian Allen
Network Security Analyst
Washington University
> -----Original Message-----
> From: nsp-security-bounces at puck.nether.net [mailto:nsp-security-
> bounces at puck.nether.net] On Behalf Of Brian Eckman
> Sent: Thursday, May 08, 2008 4:49 PM
> To: nsp-security at puck.nether.net
> Subject: [nsp-sec] (AS33626 - upstreams AS701, AS2914, AS3356,
AS27524)
> ns1.dsredirection.com and ns2.dsredirection.com - Might be 0wned?!??!?
>
> ----------- nsp-security Confidential --------
>
> Two nameservers are being used to return the IP address 208.73.212.12
> for
> any query. Earlier today, the RUS-CERT Passive DNS Database reportedly
> (a
> trusted source told me) knew of only one name for that IP address. Now
> it
> knows well over 500 (and probably over 1,000).
>
> 500 names pointing to it:
> http://cert.uni-stuttgart.de/stats/dns-
> replication.php?query=208.73.212.12&submit=Query
>
> Other evidence:
>
> > nslookup www.google.com NS1.DSREDIRECTION.COM
> Server: NS1.DSREDIRECTION.COM
> Address: 204.13.160.15#53
>
> Name: www.google.com
> Address: 208.73.212.12
>
> > host NS1.DSREDIRECTION.COM
> NS1.DSREDIRECTION.COM has address 204.13.160.15
>
> > host NS2.DSREDIRECTION.COM
> NS2.DSREDIRECTION.COM has address 204.13.161.15
>
>
> AS | IP | AS Name
> 33626 | 204.13.160.15 | OVERSEE-DOT-NET - Oversee.net
> 33626 | 204.13.161.15 | OVERSEE-DOT-NET - Oversee.net
> 33626 | 208.73.212.12 | OVERSEE-DOT-NET - Oversee.net
>
> PEER_AS | IP | AS Name
> 701 | 204.13.161.15 | UUNET - MCI Communications Services, Inc.
> d/b/a
> Verizon Business
> 2914 | 204.13.161.15 | NTT-COMMUNICATIONS-2914 - NTT America,
> Inc.
> 3356 | 204.13.161.15 | LEVEL3 Level 3 Communications
> 27524 | 204.13.161.15 | XEEX-COMMUNICATIONS - Xeex
>
>
> Many of the domain names using ns1.dsredirection.com and
> ns2.dsredirection.com as authoritative are shady looking - a number
are
> obvious typo-squatting, such as gmal.com (gmail), wikipeda.org
> (wikipedia),
> and such.
>
> This stinks really badly - but I don't have solid proof of massive
> evilness
> outside of what I've presented thus far. Can anyone (Cymru, perhaps?)
> look
> into it some more - I gotta get home for parent duties...
>
> Thanks,
> Brian
> --
> Brian Eckman, Security Analyst
> University of Minnesota
> Office of Information Technology
> Security & Assurance
>
>
> _______________________________________________
> nsp-security mailing list
> nsp-security at puck.nether.net
> https://puck.nether.net/mailman/listinfo/nsp-security
>
> Please do not Forward, CC, or BCC this E-mail outside of the nsp-
> security
> community. Confidentiality is essential for effective Internet
security
> counter-measures.
> _______________________________________________
More information about the nsp-security
mailing list