[nsp-sec] ACK 3561 - 41,000+ likely Bifrose infections

Smith, Donald Donald.Smith at qwest.com
Thu Jun 4 16:44:41 EDT 2009


Paul, and team, in an effort to validate this I did a netflow report.
I see some 39115 to 1971 traffic. 1971 is one of the check in ports listed for bifrose on the symantec writeup so I believe I have verified at least some of the IPs in your report.
http://www.symantec.com/security_response/writeup.jsp?docid=2004-101214-5358-99&tabid=2

220.227.66.11 was the IP address listening on 1971.
I didn't see any tcp 81 traffic or 1999 (from the wikepedia article on bifrose).
http://en.wikipedia.org/wiki/Bifrost_(trojan_horse)

Is there anything else I can look for?


(coffee != sleep) & (!coffee == sleep)
Donald.Smith at qwest.com gcia   


> -----Original Message-----
> From: nsp-security-bounces at puck.nether.net
> [mailto:nsp-security-bounces at puck.nether.net] On Behalf Of Paul Dokas
> Sent: Monday, June 01, 2009 12:32 PM
> To: NSP-SEC
> Subject: [nsp-sec] 41,000+ likely Bifrose infections
> 
> ----------- nsp-security Confidential --------
> 
> One of our users complained last Friday about an inbound DoS attack
> against
> one of their web servers (https://128.101.65.204/).  Looking over the
> logs,
> we found that tons of hosts from all over the world were hitting the
> HTTPS
> front page, but not trying to login at all.  Thanks to RobT and his
> remarkable
> malware database, he was able to tell me that there are variants of
> Bifrose
> that are using this site to check for Internet connectivity.
> 
> I pulled our flows for midnight -> 4am June 01 local time (GMT-5) and
> found
> the following list of 41,000+ IPs.  I suspect that there is a good
> chance that
> all of these hosts have some form of malware on them.
> 
>   https://asn.cymru.com/nsp-sec/upload/1243876952.whois.txt
> 
> Like I said, the times are all GMT-5 (Central US).  The 
> number after the
> timestamp is the count of flows seen over that time period.
> 
> 
> Paul
> -- 
> Paul Dokas                                     dokas at oitsec.umn.edu
> ======================================================================
> Don Juan Matus:  "an enigma wrapped in mystery wrapped in a tortilla."
> 
> 
> _______________________________________________
> nsp-security mailing list
> nsp-security at puck.nether.net
> https://puck.nether.net/mailman/listinfo/nsp-security
> 
> Please do not Forward, CC, or BCC this E-mail outside of the
> nsp-security
> community. Confidentiality is essential for effective 
> Internet security
> counter-measures.
> _______________________________________________
> 
> This message contains information which may be confidential 
> and/or privileged. Unless you are the intended recipient (or 
> authorized to receive for the intended recipient), you may 
> not read, use, copy or disclose to anyone the message or any 
> information contained in the message. If you have received 
> the message in error, please advise the sender by reply 
> e-mail and delete the message and any attachment(s) thereto 
> without retaining any copies.
> 
> 
> _______________________________________________
> nsp-security mailing list
> nsp-security at puck.nether.net
> https://puck.nether.net/mailman/listinfo/nsp-security
> 
> Please do not Forward, CC, or BCC this E-mail outside of the 
> nsp-security
> community. Confidentiality is essential for effective 
> Internet security counter-measures.
> _______________________________________________
> 
> 


More information about the nsp-security mailing list