[nsp-sec] Multiple DDoS attacks

Dave Mitchell davem at yahoo-inc.com
Mon Jul 6 18:25:52 EDT 2009


The valid HTTP GETS also had the following requests:

url=/statusf.html                                                                                              
url=/red1.jpg                                                                                                  
url=/status                                                                                                   
url=/htbin/lfeedback.php                                                                                      
url=/setting.doc                                                                                              
url=/setting.xls                                                                                              
url=/

We found a large concentration of this to be sourced out of .KR. 

We're gathering the full list on our end as well. 

-dave          

On Mon, Jul 06, 2009 at 04:20:12PM -0600, Smith, Donald wrote:
> I am seeing icmp floods (mostly echo requests) in our netflow towards some of Matt's victim ips.
> 
> The UDP port 80 is consistent wrt src_interface so I will agree with Matt that this isn't spoofed (or is spoofed locally ). There are some resets that appear to be responses to the syn's so I believe the OSes involved are not listening they are just blindly sending out syns and when they get a response they send back a reset (implies packet crafting).
> 
> Several of my top hitters are listed in the url below so I can validate the ips.
> 
> 
> 
> (coffee != sleep) & (!coffee == sleep)
> Donald.Smith at qwest.com gcia   
> 
> > -----Original Message-----
> > From: nsp-security-bounces at puck.nether.net 
> > [mailto:nsp-security-bounces at puck.nether.net] On Behalf Of 
> > Dave Mitchell
> > Sent: Monday, July 06, 2009 4:01 PM
> > To: Tim Wilde
> > Cc: nsp-security at puck.nether.net
> > Subject: Re: [nsp-sec] Multiple DDoS attacks
> > 
> > ----------- nsp-security Confidential --------
> > 
> > Out of curiosity, mixed with these syn floods are you seeing valid HTTP
> GETS / and some ICMP floods?
> 
> -dave
> 
> On Mon, Jul 06, 2009 at 05:56:19PM -0400, Tim Wilde wrote:
> > ----------- nsp-security Confidential --------
> > 
> > -----BEGIN PGP SIGNED MESSAGE-----
> > Hash: SHA1
> > 
> > On 7/6/2009 3:43 PM, Matthew.Swaar at us-cert.gov wrote:
> > > Fun weekend... Several customers of mine are getting some packet love
> > > that began on 4 July and is ongoing.  I'm still pulling traffic to
> > > isolate attack vectors, but one that we've already confirmed is TCP/UDP
> > > 80.
> > > 
> > > The UDP-80 traffic appears to be a pseudo-random byte size.  The TCP-80
> > > traffic appears to be a SYN flood.  I have a ton of source Ips, but it's
> > > entirely likely that they're being spoofed.  (I'll go ahead and build a
> > > list anyways, in case they aren't.  That will come later.)
> > 
> > Folks,
> > 
> > Posting a source IP list for the UDP/80 side of this DDoS attack on
> > behalf of Matt.  You can find the full list (1.6MB ASN sorted) here:
> > 
> > 	https://www.cymru.com/nsp-sec/Owned/swaar-udpdos-2009-07-06.txt
> > 
> > Timestamps are the last time that IP was seen hitting one of the victim
> > hosts on UDP/80, in GMT.  Each of these IPs generated at least 10k
> > packets to any of 3 victim IPs, and should be relatively free of FPs.
> > 
> > I've included a list of all ASNs represented within the file below my
> > signature.
> > 
> > Please follow-up on-list or directly to Matt so he can answer questions
> > about the source data for the list as appropriate.
> > 
> > Regards,
> > Tim Wilde
> > 
> > - -- 
> > Tim Wilde, Senior Software Engineer, Team Cymru, Inc.
> > twilde at cymru.com | +1-630-230-5433 | http://www.team-cymru.org/
> > 
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 186 bytes
Desc: not available
URL: <https://puck.nether.net/mailman/private/nsp-security/attachments/20090706/c1abfbee/attachment-0001.sig>


More information about the nsp-security mailing list