[nsp-sec] Bracing For Impact... MS08-067

Nicholas Ianelli ni at cert.org
Thu Oct 23 17:06:44 EDT 2008


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- From malware analysis:

HTTP check in:
59.106.145.58


The following three IPs are pinged with the payload:

abcde12345fghij6789

212.227.93.146
64.233.189.147
202.108.22.44


Bulk mode; whois.cymru.com [2008-10-23 21:06:14 +0000]
4808    | 202.108.22.44    | CHINA169-BJ CNCGROUP IP network China169
Beijing Province Network
8560    | 212.227.93.146   | ONEANDONE-AS 1&1 Internet AG
9370    | 59.106.145.58    | SAKURA-B SAKURA Internet Inc.
15169   | 64.233.189.147   | GOOGLE - Google Inc.



Bulk mode; peer-whois.cymru.com [2008-10-23 21:06:14 +0000]
174     | 212.227.93.146   | COGENT Cogent/PSI
174     | 64.233.189.147   | COGENT Cogent/PSI
1239    | 64.233.189.147   | SPRINTLINK - Sprint
1299    | 212.227.93.146   | TELIANET TeliaNet Global Network
2497    | 59.106.145.58    | IIJ Internet Initiative Japan Inc.
2516    | 59.106.145.58    | KDDI KDDI CORPORATION
2516    | 64.233.189.147   | KDDI KDDI CORPORATION
2828    | 212.227.93.146   | XO-AS15 - XO Communications
2828    | 64.233.189.147   | XO-AS15 - XO Communications
2914    | 212.227.93.146   | NTT-COMMUNICATIONS-2914 - NTT America, Inc.
2914    | 64.233.189.147   | NTT-COMMUNICATIONS-2914 - NTT America, Inc.
3257    | 64.233.189.147   | TISCALI-BACKBONE Tiscali Intl Network BV
3356    | 212.227.93.146   | LEVEL3 Level 3 Communications
3549    | 64.233.189.147   | GBLX Global Crossing Ltd.
3561    | 64.233.189.147   | SAVVIS - Savvis
4565    | 212.227.93.146   | MEGAPATH2-US - MegaPath Networks Inc.
4565    | 64.233.189.147   | MEGAPATH2-US - MegaPath Networks Inc.
4657    | 64.233.189.147   | STARHUBINTERNET-AS Starhub Internet, Singapore
4837    | 202.108.22.44    | CHINA169-BACKBONE CNCGROUP China169 Backbone
7132    | 64.233.189.147   | SBIS-AS - AT&T Internet Services
7473    | 59.106.145.58    | SINGTEL-AS-AP Singapore Telecom
7473    | 64.233.189.147   | SINGTEL-AS-AP Singapore Telecom
10310   | 212.227.93.146   | YAHOO-1 - Yahoo!
10310   | 64.233.189.147   | YAHOO-1 - Yahoo!
11164   | 64.233.189.147   | TRANSITRAIL - National LambdaRail, LLC
11537   | 64.233.189.147   | ABILENE - Internet2
15606   | 212.227.93.146   | NASK-TRANSIT NASK Transit AS
15606   | 64.233.189.147   | NASK-TRANSIT NASK Transit AS
28513   | 64.233.189.147   | Uninet S.A. de C.V.


Nick

Nicholas Ianelli wrote:
> There was a miscreant chatting about this last month, basically stating
> that they found a way to "re-infect" people via ports 135/445. Unclear
> if they had the code to do so, but it would be interesting to see if
> this was already being exploited.
> 
> I'll see what I can dig up.
> 
> Ok, found it, logs dated from 2008.09.02
> 
> falesco found a way of exploiting dcom and lsass again
> so hes put them on a fud bot hes had for month
> selling source for 250 euros
> 249k bots
> for 3500 euros
> 
> If this is true, may be worthwhile getting LE involvement.
> 
> Nick
> 
> White, Gerard wrote:
>> ----------- nsp-security Confidential --------
> 
>> Greetings.
> 
> 
> 
>> As you are all aware (hopefully), Microsoft has recently released a
>> patch outside of their normal cycle.
> 
> 
> 
>> In my opinion, this was probably touched off as a result of a painful
>> decision between releasing a patch
> 
>> that, if reverse-engineered, would touch off heavy miscreant activity -
>> vs. not releasing the patch, and
> 
>> playing the waiting game.
> 
> 
> 
>> So, also in my opinion, it probably won't be long (days?) before
>> miscreants attempt to take advantage
> 
>> of this opportunity...  I would like to ask the community to watch their
>> darknets for spikes in TCP/135, 
> 
>>  & TCP/445.
> 
> 
> 
>> While the basic details are available here:
> 
>> http://www.microsoft.com/technet/security/Bulletin/MS08-067.mspx
> 
> 
> 
>> I Strongly encourage everyone to read better details here:
> 
>> http://blogs.technet.com/swi/
> 
> 
> 
>> GW
> 
>> 855 - Bell Aliant
> 
> 
> 
>> _______________________________________________
>> nsp-security mailing list
>> nsp-security at puck.nether.net
>> https://puck.nether.net/mailman/listinfo/nsp-security
> 
>> Please do not Forward, CC, or BCC this E-mail outside of the nsp-security
>> community. Confidentiality is essential for effective Internet security counter-measures.
>> _______________________________________________
> 
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (MingW32)

iEQEARECAAYFAkkA52QACgkQi10dJIBjZIA2QACgqSKlN9Gbv4Rx/9Jz5b81FG4b
ss4AkNtil2OWanPic6nC4lw84fGjSA==
=/r+C
-----END PGP SIGNATURE-----



More information about the nsp-security mailing list