[nsp-sec] Multiple DDoS attacks
Smith, Donald
Donald.Smith at qwest.com
Mon Jul 6 18:20:12 EDT 2009
I am seeing icmp floods (mostly echo requests) in our netflow towards some of Matt's victim ips.
The UDP port 80 is consistent wrt src_interface so I will agree with Matt that this isn't spoofed (or is spoofed locally ). There are some resets that appear to be responses to the syn's so I believe the OSes involved are not listening they are just blindly sending out syns and when they get a response they send back a reset (implies packet crafting).
Several of my top hitters are listed in the url below so I can validate the ips.
(coffee != sleep) & (!coffee == sleep)
Donald.Smith at qwest.com gcia
> -----Original Message-----
> From: nsp-security-bounces at puck.nether.net
> [mailto:nsp-security-bounces at puck.nether.net] On Behalf Of
> Dave Mitchell
> Sent: Monday, July 06, 2009 4:01 PM
> To: Tim Wilde
> Cc: nsp-security at puck.nether.net
> Subject: Re: [nsp-sec] Multiple DDoS attacks
>
> ----------- nsp-security Confidential --------
>
> Out of curiosity, mixed with these syn floods are you seeing valid HTTP
GETS / and some ICMP floods?
-dave
On Mon, Jul 06, 2009 at 05:56:19PM -0400, Tim Wilde wrote:
> ----------- nsp-security Confidential --------
>
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> On 7/6/2009 3:43 PM, Matthew.Swaar at us-cert.gov wrote:
> > Fun weekend... Several customers of mine are getting some packet love
> > that began on 4 July and is ongoing. I'm still pulling traffic to
> > isolate attack vectors, but one that we've already confirmed is TCP/UDP
> > 80.
> >
> > The UDP-80 traffic appears to be a pseudo-random byte size. The TCP-80
> > traffic appears to be a SYN flood. I have a ton of source Ips, but it's
> > entirely likely that they're being spoofed. (I'll go ahead and build a
> > list anyways, in case they aren't. That will come later.)
>
> Folks,
>
> Posting a source IP list for the UDP/80 side of this DDoS attack on
> behalf of Matt. You can find the full list (1.6MB ASN sorted) here:
>
> https://www.cymru.com/nsp-sec/Owned/swaar-udpdos-2009-07-06.txt
>
> Timestamps are the last time that IP was seen hitting one of the victim
> hosts on UDP/80, in GMT. Each of these IPs generated at least 10k
> packets to any of 3 victim IPs, and should be relatively free of FPs.
>
> I've included a list of all ASNs represented within the file below my
> signature.
>
> Please follow-up on-list or directly to Matt so he can answer questions
> about the source data for the list as appropriate.
>
> Regards,
> Tim Wilde
>
> - --
> Tim Wilde, Senior Software Engineer, Team Cymru, Inc.
> twilde at cymru.com | +1-630-230-5433 | http://www.team-cymru.org/
>
More information about the nsp-security
mailing list