[nsp-sec] Korean DDoS update - List confidential

YoungBaek Kim ybkim at krcert.or.kr
Thu Jul 30 22:04:43 EDT 2009


Thank you for your report.
It's very helpful to us, KrCERT.

----- Original Message ----- 
From: "Rodney Joffe" <rjoffe at centergate.com>
To: "NSP-SEC List" <nsp-security at puck.nether.net>
Sent: Friday, July 31, 2009 12:54 AM
Subject: [nsp-sec] Korean DDoS update - List confidential


> ----------- nsp-security Confidential --------
> 
>


--------------------------------------------------------------------------------


> Cross-posted for obvious reasons as well (we really need to reduce the  
> number of campfires we all sit around ;-))
> 
> As if we don't have enough fun going on this week :-)
> 
> This comes to you from our own Nick Ianelli. He has been persistently  
> looking at the KR DDoS from all angles, including recovering files  
> from a botted system's disk image, and on the weekend, with help from  
> a friend "in Pittsburgh" he stumbled on an encrypted binary that  
> appeared to have an additional set of C&C IP addresses in it. He  
> watched some of his systems, and lo and behold, the suckers are  
> actually updating every 24 hours with mostly new C&C IP addresses.  
> Like clockwork. He then validated that some of these C2 systems are in  
> fact live and active and responding :-).
> 
> So while it appeared that the botnet was down, and we missed  
> recovering data from the original 3 C&C IP addresses, looks like we're  
> back in the game.
> 
> We've passed the recent data back to the LE folks who are working  
> this, and we wanted to give you all the data so you can join the  
> project ;-)
> 
> However, please do NOT disturb the systems that may show up in your  
> networks without coordinating with the LE people. They're working on  
> official processes. Some of you in the US may already have been  
> "ping'd" by them. If you *do* have a C&C system in your network,  
> please contact Nick or me, and we'll put you in touch with the Fed LE  
> lead on this, as he would like to hear from you asap.
> 
> There is too much blurb, so I am attaching a pdf of the company report  
> Nick prepared. You should be able to cut and paste from it in case you  
> want to copy hashes, IP addresses etc. Let Nick know if you insist on  
> having it in plain text.
> 
> Nick rocks!
> 
> Regards
> Rodney
> 
>


--------------------------------------------------------------------------------


> 
>


--------------------------------------------------------------------------------


> 
> 
> _______________________________________________
> nsp-security mailing list
> nsp-security at puck.nether.net
> https://puck.nether.net/mailman/listinfo/nsp-security
> 
> Please do not Forward, CC, or BCC this E-mail outside of the nsp-security
> community. Confidentiality is essential for effective Internet security counter-measures.
> _______________________________________________


More information about the nsp-security mailing list