[nsp-sec] attn YAHOO -- maliciosu FTP site in your network
Dave Mitchell
davem at yahoo-inc.com
Mon Sep 1 14:35:16 EDT 2008
ACK, Yahoo!.
-dave
On Mon, Sep 01, 2008 at 12:50:47AM -0400, Jose Nazario wrote:
> ----------- nsp-security Confidential --------
>
> "md5hash","server ip","server hostname","port","user","password","command"
> "5d2f370fe40603faaa7c4ea9f2c2c000","68.180.151.123","","21","nick5chocolate","default1","STOR cd_keys.txt"
>
> AS | IP | AS Name
> 36752 | 68.180.151.123 | YAHOO-SP1 - Yahoo
>
> FTP dir is live at present ...
>
> -------------------------------------------------------------
> jose nazario, ph.d. <jose at arbor.net> security researcher, office of the
> CTO, arbor networks
> v: (734) 821 1427 http://asert.arbornetworks.com/
>
>
> _______________________________________________
> nsp-security mailing list
> nsp-security at puck.nether.net
> https://puck.nether.net/mailman/listinfo/nsp-security
>
> Please do not Forward, CC, or BCC this E-mail outside of the nsp-security
> community. Confidentiality is essential for effective Internet security counter-measures.
> _______________________________________________
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 186 bytes
Desc: not available
URL: <https://puck.nether.net/mailman/private/nsp-security/attachments/20080901/2e7c7487/attachment-0001.sig>
More information about the nsp-security
mailing list