[nsp-sec] Conficker Remediation Effort (try this again)
Barry Greene
bgreene at juniper.net
Fri Mar 27 19:05:01 EDT 2009
[mailer strips out the PDF.]
Hi Team,
Jose, Don, and I are helping on the Conficker Working Group. As part of the
"fight" against Conficker, we using some techniques that we all know. The
attached document list out a brief description of what the Conficker Working
Group is trying to achieve along with offers to get based ASN reports on
Conficker infected machines.
I've uploaded the PDF to the NSP-Wiki (
https://puck.nether.net/nsp-security/wiki/images/0/06/Conficker_Information_
Sheet_for_Network_Providers-20090327-03.pdf
You need your nsp-sec E-mail/password from the mailing list tool to access.
Please look through the resources from Arbor Networks, Shawdowserver.org,
and Team CYMRU to insure the ASN reports are working for you.
This document is not confidential, but as mentioned, clueing in the bad guys
would warrant discretion. The intent of the document is for it to be used
inside your organizations, so it is A-OK to pass to your team, your boss,
your boss's boss, etc.
If you have any questions, please ping Jose, Don, or I. We're on-line and on
the NSP-SEC sIRC channel.
Thanks,
Barry
Barry Raveendran Greene
Director, Juniper Security Incident Response Team (SIRT)
Tel (Office): +1 408 936-6887
Tel (Cell): +1 408 218-4669
E-mail: bgreene at juniper.net
!
Chat Locations:
AIM: Barry R Greene
MSN: BarryRGreene
Yahoo: BarryRGreene
Skype: barrygreene
Jabber: barryrgreene at jabber.tisf.net
MSN: BarryRGreene at hotmail.com
PGP: 0x16BF45F3
More information about the nsp-security
mailing list