[nsp-sec] 10Gbps distributed UDP flood against 62.50.74.234(AS8928)
robert
robert at servalens.com
Thu Jun 3 18:29:56 EDT 2010
William,
I sunk that domain internally on 4/27 but haven't seen any hits yet.
The only tie I could make for the muza-flowers.com domain was
muza-flowers.com =>
(150.48.6.196|151.231.100.159|189.120.233.193|190.192.2.57|48.34.204.49)
=> go-thailand-now.com (bubnix/bredolab?)
On the flow side
I observed 600 or so hosts hitting 62.50.74.234 on UDP ports with about
1.5GB of packets.
I also saw attackers flooding mchost.ru (91.205.41.173/178.208.73.57)
Packet sizes are all over the place. (avg 625 bytes)
Hosts were from 34 countries.
Top:
TWN
USA
ISR
THA
Still haven't isolated a CNC though.
Robert
Salusky, William wrote:
> ----------- nsp-security Confidential --------
>
> Having only one traffic source makes this a highly probable false
> positive, but I see some potential C2 comms to the following making my
> spidey senses tingle.
>
> Can anyone else chime in on the legitimacy/evilness of the following?
>
>
> POST /forums.php?fid=149 HTTP/1.1
> Host: muza-flowers.biz
>
> POST /download.php?file=7700233c371b36cd43401a5b22520444 HTTP/1.1
> Host: muza-flowers.biz
>
> POST /search.php?doc_id=440ac345ef5336aa53f11f2c0d88dfd8 HTTP/1.1
> Host: muza-flowers.biz
>
> POST /topic.php?tid=117 HTTP/1.1
> Host: muza-flowers.biz
>
>
>
> More troublesome is that the above requests to muza-flowers.biz
> targetted the following IP's (in a span of a few minutes):
>
> 27645 | 66.79.162.138 | ASN-NA-MSG-01 - Managed Solutions Group,
> Inc.
> 32392 | 96.0.203.82 | OPENTRANSFER-ECOMMERCE - Ecommerce
> Corporation
>
>
> Yet I resolved the hostname perhaps 10 minutes after the actual client
> connectivity was observed, resulting in:
>
> 28573 | 189.120.233.193 | NET Servicos de Comunicao S.A.
>
>
> ----
> William Salusky
> Princ. Technical Security Engineer - AOL Information Technology Security
> CERT team
> 703-265-4924 (office) : 571-480-1933 (mobile)
>
>
>
>> -----Original Message-----
>> From: nsp-security-bounces at puck.nether.net
>> [mailto:nsp-security-bounces at puck.nether.net] On Behalf Of
>> Salusky, William
>> Sent: Thursday, June 03, 2010 4:40 PM
>> To: Mike Hellers; nsp-security at puck.nether.net
>> Subject: Re: [nsp-sec] 10Gbps distributed UDP flood against
>> 62.50.74.234(AS8928)
>>
>> ----------- nsp-security Confidential --------
>>
>> I see *one* single active dial-up user participating. If
>> only there were one other active participant, finding a comms
>> structure [if there is one] would be simple.
>>
>> I'll keep an eye on this one to see if anything distinct stands out.
>> Aside from the UDP flood toward the 62.x, the client in
>> question is also running a Limewire p2p client so needless to
>> say it's a very noisy little pipe.
>>
>> ----
>> William Salusky
>> Princ. Technical Security Engineer - AOL Information
>> Technology Security CERT team
>> 703-265-4924 (office) : 571-480-1933 (mobile)
>>
>>
>>
>>> -----Original Message-----
>>> From: nsp-security-bounces at puck.nether.net
>>> [mailto:nsp-security-bounces at puck.nether.net] On Behalf Of Mike
>>> Hellers
>>> Sent: Thursday, June 03, 2010 11:17 AM
>>> To: nsp-security at puck.nether.net
>>> Subject: [nsp-sec] 10Gbps distributed UDP flood against
>>> 62.50.74.234 (AS8928)
>>>
>>> ----------- nsp-security Confidential --------
>>>
>>> Hi,
>>>
>>>
>>>
>>> We have experienced a rather large, and distributed attack
>> against one
>>> of our customers over the past couple of hours, it is
>> actually still
>>> going on at this time. We have seen overall traffic levels above
>>> 10Gbps, mainly UDP traffic from and towards a range of ports.
>>>
>>> The targeted host is primarily 62.50.74.234.
>>>
>>> I would appreciate to hear if anybody else has some additional
>>> information they can provide us with, especially if this was
>>> controlled by known C&C.
>>>
>>>
>>>
>>> ...mike
>>>
>>>
>>>
>>> --
>>>
>>> Mike Hellers
>>>
>>> Interoute Communications Ltd.
>>>
>>> Tel +44 20 7025 9396
>>>
>>> Mob +44 7817 101 736
>>>
>>>
>>>
>>> _______________________________________________
>>> nsp-security mailing list
>>> nsp-security at puck.nether.net
>>> https://puck.nether.net/mailman/listinfo/nsp-security
>>>
>>> Please do not Forward, CC, or BCC this E-mail outside of the
>>> nsp-security community. Confidentiality is essential for effective
>>> Internet security counter-measures.
>>> _______________________________________________
>>>
>>
>>
>> _______________________________________________
>> nsp-security mailing list
>> nsp-security at puck.nether.net
>> https://puck.nether.net/mailman/listinfo/nsp-security
>>
>> Please do not Forward, CC, or BCC this E-mail outside of the
>> nsp-security community. Confidentiality is essential for
>> effective Internet security counter-measures.
>> _______________________________________________
>>
>
>
>
> _______________________________________________
> nsp-security mailing list
> nsp-security at puck.nether.net
> https://puck.nether.net/mailman/listinfo/nsp-security
>
> Please do not Forward, CC, or BCC this E-mail outside of the nsp-security
> community. Confidentiality is essential for effective Internet security counter-measures.
> _______________________________________________
>
More information about the nsp-security
mailing list