[nsp-sec] Fast flux or Botnet - Facebook Phish | malware - ns1.castlebin.com | 8.12.160.183 - AS40935 RELYNET - RelyNet Inc
Nicholas Ianelli
ni at cert.org
Wed Mar 11 16:58:55 EDT 2009
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
I have a facebook contact. Are you guys cool with me passing the info
over (minus the nsp-sec stuff)?
If so, lemme know if you want me to pull your info as well.
nick
Shelton, Steve wrote:
> ----------- nsp-security Confidential --------
>
> Joel,
>
> It is related, and evidence seems to point to a root-kit with very
> little or limited detection.
>
> Reference: http://www.dynamoo.com/blog/
>
> VBA32 3.12.10.1 2009.03.11 suspected of
> Embedded.Rootkit.Win32.Agent.ex
>
> http://www.virustotal.com/analisis/b86d98263fc6987f2960ceb738b758c1
> http://www.threatexpert.com/report.aspx?md5=a31cdc595075e6802647bc261350
> c1bd
>
> Steve
>
> -----Original Message-----
> From: Joel Rosenblatt [mailto:joel at columbia.edu]
> Sent: Wednesday, March 11, 2009 2:12 PM
> To: nsp-security at puck.nether.net
> Cc: Shelton, Steve
> Subject: Re: [nsp-sec] Fast flux or Botnet - Facebook Phish | malware -
> ns1.castlebin.com | 8.12.160.183 - AS40935 RELYNET - RelyNet Inc
>
> Hi,
>
> Here is a copy of a facebook malware invitation we started receiving ..
> I would not be surprised if it were related:
>
> Return-Path: <euwr at bouzouk.com>
> Received: from lmtpproxyd (tempeh-eth1.cc.columbia.edu [128.59.33.153])
> by weisswurst.cc.columbia.edu (Cyrus v2.3.13) with LMTPA;
> Wed, 11 Mar 2009 11:58:18 -0400
> X-Sieve: CMU Sieve 2.3
> Received: from tempeh.cc.columbia.edu ([unix socket])
> by mail.columbia.edu (Cyrus v2.3.13) with LMTPA;
> Wed, 11 Mar 2009 11:58:18 -0400
> X-Sieve: CMU Sieve 2.3
> Received: from gorgonzola.cc.columbia.edu (gorgonzola.cc.columbia.edu
> [128.59.28.174])
> by tempeh.cc.columbia.edu (8.13.1/8.13.1) with ESMTP id
> n2BFwIMt021566;
> Wed, 11 Mar 2009 11:58:18 -0400
> Received: from [123.97.194.128] ([123.97.194.128])
> by gorgonzola.cc.columbia.edu (8.14.3/8.14.1) with ESMTP id
> n2BFw7Fx006255;
> Wed, 11 Mar 2009 11:58:16 -0400 (EDT)
> Received: from [123.97.194.128] by mail.bouzouk.com; Wed, 11 Mar 2009
> 23:58:16 +0800
> Date: Wed, 11 Mar 2009 23:58:16 +0800
> From: "Facebook Mail" <messageserver45 at facebook.com>
> X-Mailer: The Bat! (v2.00.6) Business
> Reply-To: euwr at bouzouk.com
> X-Priority: 3 (Normal)
> Message-ID: <083691248.81117996959512 at bouzouk.com>
> To: copyright-reports at columbia.edu
> Subject: FaceBook message: Magnificent Girls extremely dancing (Last
> rated by Lavonne Lugo)
> MIME-Version: 1.0
> Content-Type: text/plain;
> charset=iso-8859-2
> Content-Transfer-Encoding: 7bit
> X-No-Spam-Score: exempt from filtering
> X-Scanned-By: MIMEDefang 2.65 on 128.59.28.174
>
> Messages from Your Friends on Facebook, March 11, 2009
>
> You have 1 Personal Message:
> Video title: "Amanda is dancing on Striptease Dance Party, March 10,
> 2009! We're absolutely shocked!".
>
>
> Proceed to view full video message:
>
> http://facebook.shared.referencenumber.personalid-6kpw3vjxm.asp.centredo
> wnloadpatch.com/home.htm?/mixed/application=f1o3587jdiimktu
>
>
>
> Message ID: FB-kpy2olo9g7nd4j7
> 2009 Facebook community, Message Center.
>
> ------------------------------------------------------------------------
> -----------
>
>
> Joel Rosenblatt
>
> Joel Rosenblatt, Manager Network & Computer Security
> Columbia Information Security Office (CISO)
> Columbia University, 612 W 115th Street, NY, NY 10025 / 212 854 3033
> http://www.columbia.edu/~joel
>
>
> --On Wednesday, March 11, 2009 4:04 PM -0400 "Shelton, Steve"
> <sshelton at Cogentco.com> wrote:
>
>> ----------- nsp-security Confidential --------
>>
>> All,
>>
>> I just spotted what appears to be a fast flux - botnet serving up
>> Phished | malware sites referencing Facebook.
>>
>> We had a customer with an exploited server that was auth for
>> centredownloadpatch.com and needplaeradobe.com for a short stint. Both
>> domains have numerous A' records and very low TTL, so this is likely
>> fastflux or botnet related.
>>
>> Note that ns2.castlebin.com appears to be pointed at a DOD network
> /32,
>> which is lame delegation and once I impacted the routing for what was
>> ns1.castlebin.com on our end, 8.12.160.183 took up the slack with a
>> matter of minutes it seemed.
>>
>> 03/11/09 13:49:19 whois ns1.castlebin.com at whois.internic.net
>>
>> whois -h whois.internic.net ns1.castlebin.com ...
>>
>> Whois Server Version 2.0
>>
>> Server Name: NS1.CASTLEBIN.COM
>> IP Address: 8.12.160.183
>> Registrar: BIZCN.COM, INC.
>>
>>
>> Wed Mar 11 20:38:54 2009
>>
>> centredownloadpatch.com. 202 IN A 76.122.72.90
>> centredownloadpatch.com. 202 IN A 66.138.7.3
>> centredownloadpatch.com. 202 IN A 68.220.37.205
>> centredownloadpatch.com. 202 IN A 69.234.146.136
>> centredownloadpatch.com. 202 IN A 75.57.61.217
>>
>> Wed Mar 11 20:47:06 2009
>>
>> needplaeradobe.com. 1800 IN A 66.138.7.3
>> needplaeradobe.com. 1800 IN A 69.234.146.136
>> needplaeradobe.com. 1800 IN A 75.57.61.217
>> needplaeradobe.com. 1800 IN A 75.118.162.91
>> needplaeradobe.com. 1800 IN A 76.122.72.90
>>
>>
>> Some current URL[s] I see are:
>>
>>
> hxxp://facebook.shared.cebmainservlet.personalid-o2pirj9c8.logon.centred
>> ownloadpatch.com/home.htm?/permissions/application=5639sgmlqzd4mrb
>>
>> Or
>>
>>
> hxxp://facebook.shared.cebmainservlet.personalid-o2pirj9c8.logon.centred
>> ownloadpatch.com/../Adobe_Player11.exe
>>
>>
>> 6389 | 68.220.37.205 | BELLSOUTH-NET-BLK - BellSouth.net Inc.
>> 7132 | 69.234.146.136 | SBIS-AS - AT&T Internet Services
>> 7132 | 75.57.61.217 | SBIS-AS - AT&T Internet Services
>> 7725 | 76.122.72.90 | CCH-AS7 - Comcast Cable Communications
>> Holdings, Inc
>> 13368 | 66.138.7.3 | JCP - James Cable Partners
>> 29895 | 75.118.162.91 | WOW-INTERNET-COL - WideOpenWest Finance
> LLC
>> 40935 | 8.12.160.183 | RELYNET - RelyNet Inc.
>>
>> Steve Shelton
>> Network Security Engineer
>> Cogent Communications
>>
>>
>> _______________________________________________
>> nsp-security mailing list
>> nsp-security at puck.nether.net
>> https://puck.nether.net/mailman/listinfo/nsp-security
>>
>> Please do not Forward, CC, or BCC this E-mail outside of the
> nsp-security
>> community. Confidentiality is essential for effective Internet
> security counter-measures.
>> _______________________________________________
>>
>
>
>
> Joel Rosenblatt, Manager Network & Computer Security
> Columbia Information Security Office (CISO)
> Columbia University, 612 W 115th Street, NY, NY 10025 / 212 854 3033
> http://www.columbia.edu/~joel
>
>
>
> _______________________________________________
> nsp-security mailing list
> nsp-security at puck.nether.net
> https://puck.nether.net/mailman/listinfo/nsp-security
>
> Please do not Forward, CC, or BCC this E-mail outside of the nsp-security
> community. Confidentiality is essential for effective Internet security counter-measures.
> _______________________________________________
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (MingW32)
iEYEARECAAYFAkm4Jg8ACgkQi10dJIBjZIA9iACZAVUxTIc5vtX78SCzHfSII+7M
JoYAoKxPUfzqr2ueBIzKaFGgeQTwzDS9
=+XvC
-----END PGP SIGNATURE-----
More information about the nsp-security
mailing list