[nsp-sec] DNS based DDoS attack - Got Flow to: 174.129.223.8 and 174.129.223.37

Nicholas Ianelli ni at centergate.net
Thu Apr 23 15:43:41 EDT 2009


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Dave,

Correct me if I'm wrong, but at this time, there doesn't appear to be a
shift in the attack vector towards these two hosts:

ns-1.name.com: 174.129.223.8
ns-2.name.com: 174.129.223.37

The DDoS traffic is still hitting:

ns1.name.com - 174.129.223.247, 4.79.81.159
ns2.name.com - 38.97.225.164, 38.97.225.183

ns3.name.com - 174.129.245.204, 174.129.246.33, 4.79.81.160, 79.125.9.95
174.129.208.119, 174.129.219.85, 174.129.223.249

ns4.name.com - 174.129.209.94, 174.129.209.102

Which, unless people can look at the actual traffic, not sure what can
really be done until the traffic hits ns-1 and ns-2

Nick

Dave Burke wrote:
> Hi,
> 
> 174.129/16 is Amazon-EC2, we are actively working on this all day (problems
> with our mitigation fleet have bogged me down all day, so didn't get to send
> out a mail).
> 
> I have PCAP's this morning from the attack, and it was 2.2M spoofed IP
> addresses from 113.x.x.x , 132.x.x.x etc.
> 
> This morning's attack began at 07:37:26UTC and we're still seeing packet love
> coming in via level3 at the moment.
> 
> Any help appreciated from us too :-)
> 
> dave
> 
> Nicholas Ianelli wrote:
>> ----------- nsp-security Confidential --------
> 
>> Team,
> 
>> I've just been made aware of another DNS based DDoS attack. The sources
>> appear to be spoofed, but I'll work on getting source IPs to verify with.
> 
>> Can you please check to see if you have traffic (port 53/UDP) to:
> 
>> ns-1.name.com: 174.129.223.8
>> ns-2.name.com: 174.129.223.37
> 
>> As it stands now, I'm under the impression that the domain below is the
>> only one pointing to the above two NS servers, so if you see traffic,
>> pretty good indication it's malicious.
> 
>> Domain being queried for: www.pai999.net
> 
>> ;; ANSWER SECTION:
>> www.pai999.net.         300     IN      A       112.213.97.201
> 
> 
>> name.com has moved this off of their regular name servers, though their
>> still may be some residual and I'm waiting for verification on that:
> 
>> ns1.name.com - 174.129.223.247, 4.79.81.159
>> ns2.name.com - 38.97.225.164, 38.97.225.183
> 
> 
> 
>> Queries look like:
> 
>> 10:56:32.385121 IP 120.87.201.46.15657 > 38.97.225.183.domain:  43583+
>> ANY? www.pai999.net. (32)
>>       0x0000:  4500 003c 633c 0000 7511 98d6 7857 c92e  E..<c<..u...xW..
>>       0x0010:  2661 e1b7 3d29 0035 0028 94f6 aa3f 0100  &a..=).5.(...?..
>>       0x0020:  0001 0000 0000 0000 0377 7777 0670 6169  .........www.pai
>>       0x0030:  3939 3903 6e65 7400 00ff 0001            999.net.....
> 
>> 10:56:32.385387 IP 202.76.73.75.16157 > 38.97.225.183.domain:  8334+
>> ANY? www.pai999.net. (32)
>>       0x0000:  4500 003c dc48 0000 7511 4db8 ca4c 494b  E..<.H..u.M..LIK
>>       0x0010:  2661 e1b7 3f1d 0035 0028 4aa2 208e 0100  &a..?..5.(J.....
>>       0x0020:  0001 0000 0000 0000 0377 7777 0670 6169  .........www.pai
>>       0x0030:  3939 3903 6e65 7400 00ff 0001            999.net.....
> 
>> Any assistance would be greatly appreciated, would love to track the C2
>> down.
> 
>> Cheers,
>> Nick
> 
> _______________________________________________
> nsp-security mailing list
> nsp-security at puck.nether.net
> https://puck.nether.net/mailman/listinfo/nsp-security
> 
> Please do not Forward, CC, or BCC this E-mail outside of the nsp-security
> community. Confidentiality is essential for effective Internet security
> counter-measures.
> _______________________________________________

Amazon Data Services Ireland Limited registered office: Riverside One,
Sir John Rogerson's Quay, Dublin 2, Ireland. Registered in Ireland.
Registration number 390566.


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (MingW32)

iEYEARECAAYFAknwxO0ACgkQi10dJIBjZIAXOgCg6bKmn7MAoqUuZEg/dzXGv94L
KDUAoJTaDC14+QohG2lvMjWDu3VaYnFX
=a8sW
-----END PGP SIGNATURE-----



More information about the nsp-security mailing list