[nsp-sec] [OT?] REQUESTING INFO Re: coordinated slow ssh crack attempts II
Jose Nazario
jose at arbor.net
Thu Sep 11 10:50:33 EDT 2008
stepping back up a bit on this thread, SSH scanning in general ..
i think i see a small handful of tools recycled and used by a few groups.
mostly the same MO, maybe some differences in the password list and such.
how many groups are we seeing do this? a few? i tied a few back to
romania, not sure if it's the same team or one team blatantly ripping off
another.
aside from playing whack a mole, what can we do to shut these puppies
down?
is anyone looking at blocking access to the HTTP/FTP server for the crack
kit that gets loaded on a popped box? this isn't a worm, it's classic late
90's: bruting -> login -> download from a central site and execute the
loop again.
--
-------------------------------------------------------------
jose nazario, ph.d. <jose at arbor.net>
security researcher, office of the CTO, arbor networks
v: (734) 821 1427 http://asert.arbornetworks.com/
More information about the nsp-security
mailing list