June 2009 Archives by subject
Starting: Mon Jun 1 09:20:03 EDT 2009
Ending: Tue Jun 30 03:55:30 EDT 2009
Messages: 224
- [nsp-sec] (N)ACK 217 Re: UDP DDoS to PDNS1.ULTRADNS.NET and PDNS5.ULTRADNS.INFO
Brian Eckman
- [nsp-sec] *.cn:8080 infected sites
Dirk Stander
- [nsp-sec] *.cn:8080 infected sites
Dirk Stander
- [nsp-sec] *.cn:8080 infected sites
Shelton, Steve
- [nsp-sec] *.cn:8080 infected sites
David Reader
- [nsp-sec] *.cn:8080 infected sites
Dave Burke
- [nsp-sec] 41,000+ likely Bifrose infections
Paul Dokas
- [nsp-sec] 41,000+ likely Bifrose infections
David Freedman
- [nsp-sec] 41,000+ likely Bifrose infections
Vidar Østmo
- [nsp-sec] 41,000+ likely Bifrose infections
Dirk Stander
- [nsp-sec] 41,000+ likely Bifrose infections
Klaus Moeller
- [nsp-sec] 41,000+ likely Bifrose infections
Gabriel Iovino
- [nsp-sec] 41,000+ likely Bifrose infections
Taka Mizuguchi
- [nsp-sec] 41,000+ likely Bifrose infections
Taka Mizuguchi
- [nsp-sec] 41,000+ likely Bifrose infections - ACK many
Zane Jarvis
- [nsp-sec] 48 hour vetting: Jason Gardiner (DirecPath, AS31939)
Scott A. McIntyre
- [nsp-sec] [ACK+Info] HTTP Bot C&C Hits - 2009-06-15
Scott A. McIntyre
- [nsp-sec] [ACK] UDP DDoS to PDNS1.ULTRADNS.NET and PDNS5.ULTRADNS.INFO
Jason Chambers
- [nsp-sec] [Confidential] Webmail issue.
Scott A. McIntyre
- [nsp-sec] [Confidential] Webmail issue.
Huopio Kauto
- [nsp-sec] [Confidential] Webmail issue.
Scott A. McIntyre
- [nsp-sec] [OT] Organizational update
Rob Thomas
- [nsp-sec] [Suspected Spam] ACK 15659 - RE: 41, 000+ likely Bifrose infections
Odd Stoltenberg
- [nsp-sec] ACK .. sorta .. RE: Compromised ftp accounts
Marc Kneppers
- [nsp-sec] ACK10782: Compromised ftp accounts
Helmut Springer
- [nsp-sec] ACK 109 ftp credentials
Chip Ho
- [nsp-sec] ACK1103/1161: ZeuS botnet (s288421667.onlinehome.us)
Wim Biemolt
- [nsp-sec] ACK 1103 ftp credentials
SURFcert - Peter
- [nsp-sec] ACK 1103 ftp credentials 20090629
SURFcert - Peter
- [nsp-sec] ACK 11854 ftp credentials 20090629
Mike Palladino
- [nsp-sec] ACK 14618 Re: HTTP Bot C&C Hits - 2009-06-15
Dave Burke
- [nsp-sec] ACK151: ZeuS botnet (s288421667.onlinehome.us)
Helmut Springer
- [nsp-sec] ACK 15659: ftp credentials
Andreas Lorentzen
- [nsp-sec] ACK 15659: HTTP Bot C&C Hits - 2009-06-15
Andreas Lorentzen
- [nsp-sec] ACK 174 RE: Compromised ftp accounts
Shelton, Steve
- [nsp-sec] ACK 174 RE: ftp credentials
Shelton, Steve
- [nsp-sec] ACK 174 RE: ftp credentials 20090629
Shelton, Steve
- [nsp-sec] ACK 174 RE: HTTP Bot C&C Hits - 2009-06-15
Shelton, Steve
- [nsp-sec] ACK 1798 HTTP Bot C&C Hits - 2009-06-15
Jon K. Miyake
- [nsp-sec] ACK 2116/3307 Re: heavy udp fragments attack
sthaug at nethelp.no
- [nsp-sec] ACK 2119 ftp credentials
bjorn.jensen at telenor.com
- [nsp-sec] ACK 2572 HTTP Bot C&C Hits
Young, Beth A.
- [nsp-sec] ACK 2828 Compromised ftp accounts
Yiming Gong
- [nsp-sec] ACK 3356 `Re: HTTP Bot C&C Hits - 2009-06-15
David Rossbach
- [nsp-sec] ACK 3356 Re: Compromised ftp accounts
David Rossbach
- [nsp-sec] ACK 3356 Re: ftp credentials
David Rossbach
- [nsp-sec] ACK3356 Re: ftp credentials 20090629
David Rossbach
- [nsp-sec] ACK 3356 Re: ZeuS botnet (s288421667.onlinehome.us)
David Rossbach
- [nsp-sec] ACK 3561 - 41,000+ likely Bifrose infections
Buchanan, Mark
- [nsp-sec] ACK 3561 - 41,000+ likely Bifrose infections
Smith, Donald
- [nsp-sec] ACK 3561 - 41,000+ likely Bifrose infections
Paul Dokas
- [nsp-sec] ACK 3561 - HTTP Bot C&C Hits - 2009-06-15
Buchanan, Mark
- [nsp-sec] ACK44038 ZeuS botnet (s288421667.onlinehome.us)
Jan Boogman
- [nsp-sec] ACK 6805 AW: ftp credentials 20090629
Henner Vogt
- [nsp-sec] ACK 8928 Compromised ftp accounts
Mike Hellers
- [nsp-sec] ACK: 2119 HTTP Bot C&C Hits - 2009-06-15
bjorn.jensen at telenor.com
- [nsp-sec] ACK: 41,000+ likely Bifrose infections
Rodolfo Baader
- [nsp-sec] ACK: HTTP Bot C&C Hits - 2009-06-15
Rodolfo Baader
- [nsp-sec] ACK : Re: HTTP Bot C&C Hits - 2009-06-15
Michael Van Norman
- [nsp-sec] ACK: ZeuS botnet (s288421667.onlinehome.us)
Rodolfo Baader
- [nsp-sec] ACK AS 1221 Compromised ftp accounts
Chisholm, Glenn L
- [nsp-sec] ACK AS 1221 ftp credentials
Chisholm, Glenn L
- [nsp-sec] ACK AS852 - RE: 41,000+ likely Bifrose infections
Chris Calvert
- [nsp-sec] ACK AS852 - RE: ftp credentials
Chris Calvert
- [nsp-sec] ACK AS852 - RE: ftp credentials 20090629
Chris Calvert
- [nsp-sec] ACK Compromised ftp accounts
Zoe O'Connell
- [nsp-sec] ACK Compromised ftp accounts
Eric S. Johnson
- [nsp-sec] ACK ftp credentials
Matthew.Swaar at us-cert.gov
- [nsp-sec] ACK Re: 41,000+ likely Bifrose infections
Stephen Fromm
- [nsp-sec] ACK RE: 41,000+ likely Bifrose infections
Matthew.Swaar at us-cert.gov
- [nsp-sec] ACK Re: 41,000+ likely Bifrose infections
Taka Mizuguchi
- [nsp-sec] ACK RE: [OFFENSIVE] ftp credentials
Krista Hickey
- [nsp-sec] ACK Re: Compromised ftp accounts
Justin M. Streiner
- [nsp-sec] ACK RE: ZeuS botnet (s288421667.onlinehome.us)
Matthew.Swaar at us-cert.gov
- [nsp-sec] ACK UDP DDoS to PDNS1.ULTRADNS.NET and PDNS5.ULTRADNS.INFO
Tom Sands
- [nsp-sec] Adding Destination Address to Conficker C Reports
Tim Wilde
- [nsp-sec] Adding Destination Address to Conficker C Reports
SURFcert - Peter
- [nsp-sec] Adding Destination Address to Conficker C Reports
Nicholas Ianelli
- [nsp-sec] Adding Destination Address to Conficker C Reports
Tim Wilde
- [nsp-sec] Adding Destination Address to Conficker C Reports
SURFcert - Peter
- [nsp-sec] Adding Destination Address to Conficker C Reports
Tim Wilde
- [nsp-sec] Adding Destination Address to Conficker C Reports
Nicholas Ianelli
- [nsp-sec] AS5587/AS2529 WCP please (or AS1299)
Nicholas Ianelli
- [nsp-sec] AS5587/AS2529 WCP please (or AS1299)
Lehmuskallio, Arttu
- [nsp-sec] attn Google, gmail drop box in .edu phish
RuthAnne Bevier
- [nsp-sec] attn Google, gmail drop box in .edu phish
Peter Moody
- [nsp-sec] Attn google - gmail drop box - rfi attack
Rodolfo Baader
- [nsp-sec] Attn google - gmail drop box - rfi attack
Chris Morrow
- [nsp-sec] C&C at 91.212.41.252
BATTLES, TIMOTHY A (TIM), ATTLABS
- [nsp-sec] C&C at 91.212.41.252
Rob Thomas
- [nsp-sec] C&C at 91.212.41.252
Huopio Kauto
- [nsp-sec] Charter
Dave Mitchell
- [nsp-sec] Charter
Dave Mitchell
- [nsp-sec] Charter
Chris Morrow
- [nsp-sec] China Telecom AS4134 Security Contact
Scalzo, Frank
- [nsp-sec] China Telecom AS4134 Security Contact
Gong, Yiming
- [nsp-sec] Coming Service Outage 061209 (IRC)
Dave Monnier
- [nsp-sec] Compromised ftp accounts
Thomas Hungenberg
- [nsp-sec] Compromised ftp accounts
Dirk Stander
- [nsp-sec] Compromised ftp accounts
Dave Burke
- [nsp-sec] Compromised ftp accounts
Wes Young
- [nsp-sec] Compromised ftp accounts
Gabriel Iovino
- [nsp-sec] Compromised ftp accounts
Sean Crandall
- [nsp-sec] Compromised ftp accounts
Huopio Kauto
- [nsp-sec] Compromised ftp accounts---ACK Sprint AS#1239
Mohamed, Liban [NTK]
- [nsp-sec] Compromised ftp accounts - ACK AU ASNs
Zane Jarvis
- [nsp-sec] Daily Reports Summary for week ending 2009-06-01
Tim Wilde
- [nsp-sec] Daily Reports Summary for week ending 2009-06-08
Tim Wilde
- [nsp-sec] Daily Reports Summary for week ending 2009-06-15
Tim Wilde
- [nsp-sec] Daily Reports Summary for week ending 2009-06-22
Tim Wilde
- [nsp-sec] Daily Reports Summary for week ending 2009-06-29
Tim Wilde
- [nsp-sec] DNS DDoS - "." query reply flood
Jose Nazario
- [nsp-sec] DNS DDoS - "." query reply flood
Rob Thomas
- [nsp-sec] DNS DDoS - "." query reply flood
Jose Nazario
- [nsp-sec] DNS DDoS - "." query reply flood
White, Gerard
- [nsp-sec] DOS attack against engineering.columbia.edu (128.59.48.55)
Joel Rosenblatt
- [nsp-sec] DOS attack against engineering.columbia.edu (128.59.48.55)
Joel Rosenblatt
- [nsp-sec] DOS attack against engineering.columbia.edu (128.59.48.55)
Dirk Stander
- [nsp-sec] DOS attack against engineering.columbia.edu (128.59.48.55)
Rob Thomas
- [nsp-sec] fake av on AS10929 - NETELLIGENT
Niels Provos
- [nsp-sec] fake av on AS48841, AS36351, AS13237, AS39823, AS174, AS29073, AS24940
Niels Provos
- [nsp-sec] fake av on AS48841, AS36351, AS13237, AS39823, AS174, AS29073, AS24940
Rob Thomas
- [nsp-sec] fake av on AS48841, AS36351, AS13237, AS39823, AS174, AS29073, AS24940
Brian Eckman
- [nsp-sec] ftp credentials
Dirk Stander
- [nsp-sec] ftp credentials
Vidar Østmo
- [nsp-sec] ftp credentials
Kistler, Kris
- [nsp-sec] ftp credentials
Gabriel Iovino
- [nsp-sec] ftp credentials
Greg Schwimer
- [nsp-sec] ftp credentials
Tarmo Randel
- [nsp-sec] ftp credentials
Adam Griffiths
- [nsp-sec] ftp credentials
Paul Dokas
- [nsp-sec] ftp credentials
Hank Nussbacher
- [nsp-sec] ftp credentials
Dirk Stander
- [nsp-sec] ftp credentials
Zane Jarvis
- [nsp-sec] ftp credentials
Jussi Eronen
- [nsp-sec] ftp credentials
Serge Droz
- [nsp-sec] ftp credentials 20090629
Dirk Stander
- [nsp-sec] ftp credentials 20090629
Jon Lewis
- [nsp-sec] ftp credentials 20090629
Hank Nussbacher
- [nsp-sec] ftp credentials 20090629
Stephen Gill
- [nsp-sec] ftp credentials 20090629
Tarmo Randel
- [nsp-sec] ftp credentials 20090629
Jussi Eronen
- [nsp-sec] ftp credentials 20090629
Hank Nussbacher
- [nsp-sec] Fwd: [OT] When media goes bananas
Einar Oftedal
- [nsp-sec] heavy udp fragments attack
Jan Boogman
- [nsp-sec] hints about DDoS against 88.80.216.114 (abuse.ch) ?
Rolf Gartmann
- [nsp-sec] hints about DDoS against 88.80.216.114 (abuse.ch) ?
Rob Thomas
- [nsp-sec] hints about DDoS against 88.80.216.114 (abuse.ch) ?
Thomas Hungenberg
- [nsp-sec] hints about DDoS against 88.80.216.114 (abuse.ch) ?
Jose Nazario
- [nsp-sec] hints about DDoS against 88.80.216.114 (abuse.ch) ?
Rolf Gartmann
- [nsp-sec] HTTP Bot C&C Hits - 2009-06-15
Tim Wilde
- [nsp-sec] HTTP Bot C&C Hits - 2009-06-15
Vidar Østmo
- [nsp-sec] HTTP Bot C&C Hits - 2009-06-15
David Freedman
- [nsp-sec] HTTP Bot C&C Hits - 2009-06-15
Gabriel Iovino
- [nsp-sec] HTTP Bot C&C Hits - 2009-06-15
Chisholm, Glenn L
- [nsp-sec] I bid farewall!
m.campisano at comcast.net
- [nsp-sec] identity theft c&c (AS 48841, 49017, 44050, 8492)
Tom Fischer
- [nsp-sec] IRC bot C&C
Gabriel Iovino
- [nsp-sec] ISOI #7
Smith, Donald
- [nsp-sec] live.com username/password dropbox: database-helpdesk001 at live.com
sthaug at nethelp.no
- [nsp-sec] live.com username/password dropbox: m_crist at live.com
sthaug at nethelp.no
- [nsp-sec] Live Paypal phish
Tarmo Randel
- [nsp-sec] Live Paypal phish
Fronenbroek, Kick
- [nsp-sec] Live Paypal phish
Tim Wilde
- [nsp-sec] Looking for feedback
Janish, Nathan
- [nsp-sec] malware on .cn domains: AS8560, AS25532, AS35830, AS16340, AS12322, AS7992, AS20923, AS13618
Niels Provos
- [nsp-sec] malware on .cn domains: AS8560, AS25532, AS35830, AS16340, AS12322, AS7992, AS20923, AS13618
Dirk Stander
- [nsp-sec] malware site and C&C's on port 9191
SURFcert - Peter
- [nsp-sec] malware site and C&C's on port 9191
Dave Monnier
- [nsp-sec] Mebroot/Torpig (AS 25653, 15083, 32475)
Tom Fischer
- [nsp-sec] NACK AS25: UDP DDoS to PDNS1.ULTRADNS.NET and PDNS5.ULTRADNS.INFO
Michael Sinatra
- [nsp-sec] Net Scan from AS21844
Hicks, Howard
- [nsp-sec] Packets to watch for, or: DNS and IP fragmentation
Florian Weimer
- [nsp-sec] Phishing dropbox @gmail.com
Torsten Voss
- [nsp-sec] Phishing dropbox @gmail.com
Peter Moody
- [nsp-sec] phishing dropbox at @live.com
SURFcert - Peter
- [nsp-sec] phishing dropbox at @live.com
Monika Machado
- [nsp-sec] Phishing dropbox at live.com
Daniel Adinolfi
- [nsp-sec] Q: have you seen activity from this range?
Marc Kneppers
- [nsp-sec] Q: have you seen activity from this range?
Dave Monnier
- [nsp-sec] Q: have you seen activity from this range?
Jose Nazario
- [nsp-sec] Q: have you seen activity from this range?
Matthew.Swaar at us-cert.gov
- [nsp-sec] Q: have you seen activity from this range?
Daniel Schwalbe
- [nsp-sec] root query DNS ddos - affecting russian ISP ...
Jose Nazario
- [nsp-sec] Scans from Columbia University CS department
Joel Rosenblatt
- [nsp-sec] Scans from Columbia University CS department
Smith, Donald
- [nsp-sec] Scans from Columbia University CS department
Joel Rosenblatt
- [nsp-sec] SORBS
BATTLES, TIMOTHY A (TIM), ATTLABS
- [nsp-sec] SUSPECT: Compromised ftp accounts
David Freedman
- [nsp-sec] SUSPECT: Compromised ftp accounts
David Freedman
- [nsp-sec] SUSPECT: Compromised ftp accounts
Thomas Hungenberg
- [nsp-sec] SUSPECT: ftp credentials
David Freedman
- [nsp-sec] SUSPECT: ftp credentials 20090629
David Freedman
- [nsp-sec] theplanet.com
Jared Mauch
- [nsp-sec] Trojan-Dropper.Win32.Peace.dz
Chris Calvert
- [nsp-sec] UDP DDoS to PDNS1.ULTRADNS.NET and PDNS5.ULTRADNS.INFO
Nicholas Ianelli
- [nsp-sec] UDP DDoS to PDNS1.ULTRADNS.NET and PDNS5.ULTRADNS.INFO
Nicholas Ianelli
- [nsp-sec] UDP DDoS to PDNS1.ULTRADNS.NET and PDNS5.ULTRADNS.INFO
David Freedman
- [nsp-sec] UDP DDoS to PDNS1.ULTRADNS.NET and PDNS5.ULTRADNS.INFO
sthaug at nethelp.no
- [nsp-sec] UDP DDoS to PDNS1.ULTRADNS.NET and PDNS5.ULTRADNS.INFO
sthaug at nethelp.no
- [nsp-sec] UDP DDoS to PDNS1.ULTRADNS.NET and PDNS5.ULTRADNS.INFO
Yiming Gong
- [nsp-sec] UDP DDoS to PDNS1.ULTRADNS.NET and PDNS5.ULTRADNS.INFO
RuthAnne Bevier
- [nsp-sec] UDP DDoS to PDNS1.ULTRADNS.NET and PDNS5.ULTRADNS.INFO
David Freedman
- [nsp-sec] UDP DDoS to PDNS1.ULTRADNS.NET and PDNS5.ULTRADNS.INFO
Matthew.Swaar at us-cert.gov
- [nsp-sec] UDP DDoS to PDNS1.ULTRADNS.NET and PDNS5.ULTRADNS.INFO
Joel Rosenblatt
- [nsp-sec] UDP DDoS to PDNS1.ULTRADNS.NET and PDNS5.ULTRADNS.INFO
Krista Hickey
- [nsp-sec] UDP DDoS to PDNS1.ULTRADNS.NET and PDNS5.ULTRADNS.INFO
Nicholas Ianelli
- [nsp-sec] UDP DDoS to PDNS1.ULTRADNS.NET and PDNS5.ULTRADNS.INFO
Mike Tancsa
- [nsp-sec] Zbot encryption key?
Daniel Adinolfi
- [nsp-sec] Zbot encryption key?
Nicholas Ianelli
- [nsp-sec] Zbot encryption key?
Lawrence Baldwin
- [nsp-sec] ZeuS botnet (s288421667.onlinehome.us)
Dirk Stander
- [nsp-sec] ZeuS botnet (s288421667.onlinehome.us)
Hicks, Howard
- [nsp-sec] ZeuS botnet (s288421667.onlinehome.us)
Smith, Donald
- [nsp-sec] ZeuS botnet (s288421667.onlinehome.us)
Tarmo Randel
- [nsp-sec] ZeuS botnet (s288421667.onlinehome.us)
Klaus Moeller
- [nsp-sec] ZeuS botnet (s288421667.onlinehome.us)
Tom Fischer
- [nsp-sec] ZeuS botnet (s288421667.onlinehome.us)
Tom Fischer
- [nsp-sec] ZeuS botnet (s288421667.onlinehome.us)
Ståhl Jouni
- [nsp-sec] ZeuS botnet (s288421667.onlinehome.us)
Gabriel Iovino
- [nsp-sec] ZeuS botnet (s288421667.onlinehome.us)
Smith, Donald
- [nsp-sec] ZeuS botnet (s288421667.onlinehome.us)
David Freedman
- [nsp-sec] ZeuS botnet (s288421667.onlinehome.us)
Marius Urkis
- [nsp-sec] ZeuS botnet (s288421667.onlinehome.us) - ACK AU ASNs
Zane Jarvis
Last message date:
Tue Jun 30 03:55:30 EDT 2009
Archived on: Thu Jan 22 18:52:06 EST 2015
This archive was generated by
Pipermail 0.09 (Mailman edition).