[nsp-sec] (AS33626 - upstreams AS701, AS2914, AS3356, AS27524) ns1.dsredirection.com and ns2.dsredirection.com - Might be 0wned?!??!?
Tino Steward
tsteward at us.ntt.net
Mon May 12 09:58:30 EDT 2008
2914 ack'd
On Thu, May 08, 2008 at 04:49:00PM -0500, Brian Eckman wrote:
> ----------- nsp-security Confidential --------
>
> Two nameservers are being used to return the IP address 208.73.212.12 for
> any query. Earlier today, the RUS-CERT Passive DNS Database reportedly (a
> trusted source told me) knew of only one name for that IP address. Now it
> knows well over 500 (and probably over 1,000).
>
> 500 names pointing to it:
> http://cert.uni-stuttgart.de/stats/dns-replication.php?query=208.73.212.12&submit=Query
>
> Other evidence:
>
> > nslookup www.google.com NS1.DSREDIRECTION.COM
> Server: NS1.DSREDIRECTION.COM
> Address: 204.13.160.15#53
>
> Name: www.google.com
> Address: 208.73.212.12
>
> > host NS1.DSREDIRECTION.COM
> NS1.DSREDIRECTION.COM has address 204.13.160.15
>
> > host NS2.DSREDIRECTION.COM
> NS2.DSREDIRECTION.COM has address 204.13.161.15
>
>
> AS | IP | AS Name
> 33626 | 204.13.160.15 | OVERSEE-DOT-NET - Oversee.net
> 33626 | 204.13.161.15 | OVERSEE-DOT-NET - Oversee.net
> 33626 | 208.73.212.12 | OVERSEE-DOT-NET - Oversee.net
>
> PEER_AS | IP | AS Name
> 701 | 204.13.161.15 | UUNET - MCI Communications Services, Inc. d/b/a
> Verizon Business
> 2914 | 204.13.161.15 | NTT-COMMUNICATIONS-2914 - NTT America, Inc.
> 3356 | 204.13.161.15 | LEVEL3 Level 3 Communications
> 27524 | 204.13.161.15 | XEEX-COMMUNICATIONS - Xeex
>
>
> Many of the domain names using ns1.dsredirection.com and
> ns2.dsredirection.com as authoritative are shady looking - a number are
> obvious typo-squatting, such as gmal.com (gmail), wikipeda.org (wikipedia),
> and such.
>
> This stinks really badly - but I don't have solid proof of massive evilness
> outside of what I've presented thus far. Can anyone (Cymru, perhaps?) look
> into it some more - I gotta get home for parent duties...
>
> Thanks,
> Brian
> --
> Brian Eckman, Security Analyst
> University of Minnesota
> Office of Information Technology
> Security & Assurance
>
>
> _______________________________________________
> nsp-security mailing list
> nsp-security at puck.nether.net
> https://puck.nether.net/mailman/listinfo/nsp-security
>
> Please do not Forward, CC, or BCC this E-mail outside of the nsp-security
> community. Confidentiality is essential for effective Internet security counter-measures.
> _______________________________________________
--
Tino T. Steward SNA1 - Security & Abuse tsteward at us.ntt.net
NTT Communications Global IP Network Operations Center
214-853-7344 (Ph.) 214.800.7771 (Fax)
AUP online: http://www.nttamerica.com/legal/internet/acceptable_policy.html
AUP online: http://www.ntt.net/library/pdf/AUP.pdf
Check http://www.cert.org for some of the latest documented exploits and your OS manufacturer for the latest security patches.
Intruder detection: http://www.cert.org/tech_tips/intruder_detection_checklist.html
Latest viruses: http://www.cert.org
Recovering from a compromised host: http://www.cert.org/tech_tips/win-UNIX-system_compromise.html
More information about the nsp-security
mailing list