[nsp-sec] Linux webserver botnet
Shelton, Steve
sshelton at Cogentco.com
Tue Sep 15 11:27:41 EDT 2009
Thomas,
Thanks for the info, currently see the following and series of DNS
servers facilitating both domains.
> hxxp://red-wolf.ru:8080/ts/in.cgi?open >
hxxp://doxyia.ru:8080/index.php
--- 09/15/09 09:17:48 Mountain Daylight Time
ns1.red-wolf.ru [216.24.153.206]
ns2.red-wolf.ru [74.55.116.90]
ns3.red-wolf.ru [64.235.54.100]
ns4.red-wolf.ru [66.232.147.85]
ns1.doxyia.ru [216.24.153.206]
ns2.doxyia.ru [74.55.116.90]
ns3.doxyia.ru [64.235.54.100]
ns4.doxyia.ru [66.232.147.85]
Bulk mode; whois.cymru.com [2009-09-15 14:40:13 +0000]
9848 | 66.232.147.85 | GNGAS Enterprise Networks
13649 | 216.24.153.206 | ASN-VINS - ViaWest
21844 | 74.55.116.90 | THEPLANET-AS - ThePlanet.com Internet
Services, Inc.
26277 | 64.235.54.100 | PREMIANET - A+Hosting, Inc.
Bulk mode; peer-whois.cymru.com [2009-09-15 14:40:15 +0000]
174 | 216.24.153.206 | COGENT Cogent/PSI
174 | 64.235.54.100 | COGENT Cogent/PSI
701 | 66.232.147.85 | UUNET - MCI Communications Services, Inc.
d/b/a Verizon Business
2828 | 64.235.54.100 | XO-AS15 - XO Communications
2914 | 66.232.147.85 | NTT-COMMUNICATIONS-2914 - NTT America, Inc.
2914 | 74.55.116.90 | NTT-COMMUNICATIONS-2914 - NTT America, Inc.
3356 | 216.24.153.206 | LEVEL3 Level 3 Communications
3356 | 74.55.116.90 | LEVEL3 Level 3 Communications
3491 | 66.232.147.85 | BTN-ASN - Beyond The Network America, Inc.
3549 | 74.55.116.90 | GBLX Global Crossing Ltd.
3561 | 74.55.116.90 | SAVVIS - Savvis
4565 | 74.55.116.90 | MEGAPATH2-US - MegaPath Networks Inc.
6461 | 74.55.116.90 | MFNX MFN - Metromedia Fiber Network
7385 | 64.235.54.100 | INTEGRATELECOM - Integra Telecom, Inc.
9318 | 66.232.147.85 | HANARO-AS Hanaro Telecom Inc.
10026 | 66.232.147.85 | ANC Asia Netcom Corporation
10310 | 74.55.116.90 | YAHOO-1 - Yahoo!
15412 | 66.232.147.85 | FLAG-AS Flag Telecom Global Internet AS
32184 | 216.24.153.206 | RMIX-ASN - Comfluent
I'm currently working on killing off at least two of the DNS servers.
Steve Shelton
Security Engineer
Cogent Communications
-----Original Message-----
From: nsp-security-bounces at puck.nether.net
[mailto:nsp-security-bounces at puck.nether.net] On Behalf Of Thomas
Hungenberg
Sent: Tuesday, September 15, 2009 8:37 AM
To: NSP-SEC List
Subject: Re: [nsp-sec] Linux webserver botnet
----------- nsp-security Confidential --------
Several compromised websites that had an IFRAME pointing to dyndns hosts
(like <hXXp://a2stu.blogdns.com:8080/ts/in.cgi?open>) injected last week
now have an IFRAME pointing to <hXXp://red-wolf.ru:8080/index.php>.
It appears the attackers are updating the injected IFRAMEs.
Currently I do not get any content from the new URL.
16265 | 85.17.237.5 | NL | red-wolf.ru | LEASEWEB LEASEWEB AS
16276 | 91.121.121.6 | FR | red-wolf.ru | OVH OVH
16276 | 91.121.134.229 | FR | red-wolf.ru | OVH OVH
16276 | 91.121.74.84 | FR | red-wolf.ru | OVH OVH
20857 | 80.69.74.73 | NL | red-wolf.ru | TRANSIP-AS TransIP
BV
- Thomas
CERT-Bund Incident Response & Anti-Malware Team
Thomas Hungenberg schrieb:
> ----------- nsp-security Confidential --------
>
>
>
>
------------------------------------------------------------------------
>
> Regarding the article on The Register:
>
> I was working with Roman from abuse.ch on this last week and
> he blogged about it on Friday: <http://www.abuse.ch/?p=1801>
>
> We've seen 1500+ unique dyndns hostnames used with IFRAMEs injected
> into compromised websites so far.
>
> Please find attached a list of dyndns hostnames we have seen that are
> currently resolving (837 hostnames resolving to 105 unique IPs).
> Format: ASN | IP | CC | hostname | AS name
>
> All these IPs most likely are compromised servers that are/were
running
> an nginx proxy on port 8080 (it appears some servers have already been
> cleaned up).
>
>
> - Thomas
>
> CERT-Bund Incident Response & Anti-Malware Team
>
>
> SURFcert - Peter schrieb:
>> ----------- nsp-security Confidential --------
>>
>> Hi,
>>
>> Coincidence or not? Just today I read
>> http://www.theregister.co.uk/2009/09/12/linux_zombies_push_malware/
and
>> at the same time I got a report about a linux web server that was
>> infected and part of a botnet. I have ordered to not re-install that
>> specific server but try to get the services running on another one.
>>
>> The got into the system through an old vulnerable phpMyAdmin version.
>> The strange thing is there shouldn't be any phpMyadmin on that box.
We
>> will sort that out later. We can probably pull the source of the
botnet
>> malware from the logging (at first sight it appears to be a host in
>> Germany). And we probably will get some information about the IRC
>> channel and passwords used to access 82.197.159.61 on port 9999.
>>
>> I hope to be able to get as much as possible out of that host before
I
>> am off on holiday and without e-mail for about two weeks. Important
>> stuff will of course be shared as much as possible.
>>
>
> _______________________________________________
> nsp-security mailing list
> nsp-security at puck.nether.net
> https://puck.nether.net/mailman/listinfo/nsp-security
>
> Please do not Forward, CC, or BCC this E-mail outside of the
nsp-security
> community. Confidentiality is essential for effective Internet
security counter-measures.
> _______________________________________________
>
>
>
>
------------------------------------------------------------------------
>
>
>
> _______________________________________________
> nsp-security mailing list
> nsp-security at puck.nether.net
> https://puck.nether.net/mailman/listinfo/nsp-security
>
> Please do not Forward, CC, or BCC this E-mail outside of the
nsp-security
> community. Confidentiality is essential for effective Internet
security counter-measures.
> _______________________________________________
_______________________________________________
nsp-security mailing list
nsp-security at puck.nether.net
https://puck.nether.net/mailman/listinfo/nsp-security
Please do not Forward, CC, or BCC this E-mail outside of the
nsp-security
community. Confidentiality is essential for effective Internet security
counter-measures.
_______________________________________________
More information about the nsp-security
mailing list