[nsp-sec] ddos against amazon ec2 customer

Joel Rosenblatt joel at columbia.edu
Wed Mar 3 09:40:40 EST 2010


Hi,

I don't see flows toward them, but I'm seeing flows from one of them (last 5 minutes)

Joel

Calling flowdumper with the following filter:
filter-primitive general-ip
 type ip-address-prefix
 permit 184.73.22.252/32
 permit 184.72.3.89/32
 permit 184.72.1.208/32
 permit 204.236.183.133/32

filter-definition snoopy
 match ip-source-address general-ip
 or
 match ip-destination-address general-ipRunning the following files through the filter:
/hmt/sirius1/netflow/flows/saved//ft-v05.2010-03-03.093000-0500


--------------------------------------------------------------------------------

For all non-ICMP traffic, output is


date time srcip.srcport -> dstip.dstport protocol packets bytes

--------------------------------------------------------------------------------

2010/03/03 09:29:24 204.236.183.133.53 -> 156.111.189.104.28893 17 1 198
2010/03/03 09:29:24 204.236.183.133.53 -> 156.111.189.110.30429 17 1 198
2010/03/03 09:29:24 204.236.183.133.53 -> 156.111.189.147.39901 17 1 198
2010/03/03 09:29:24 204.236.183.133.53 -> 156.111.189.151.40925 17 1 198
2010/03/03 09:29:24 204.236.183.133.53 -> 156.111.189.152.41181 17 1 198
2010/03/03 09:29:24 204.236.183.133.53 -> 156.111.189.153.41437 17 1 198
2010/03/03 09:29:24 204.236.183.133.53 -> 156.111.189.161.43485 17 1 198
2010/03/03 09:29:24 204.236.183.133.53 -> 156.111.189.187.50141 17 1 198
2010/03/03 09:29:24 204.236.183.133.53 -> 156.111.189.20.7389 17 1 198
2010/03/03 09:29:24 204.236.183.133.53 -> 156.111.189.30.9949 17 1 198
2010/03/03 09:29:24 204.236.183.133.53 -> 156.111.189.72.20701 17 1 198
2010/03/03 09:29:44 204.236.183.133.53 -> 156.111.77.47.12957 17 1 198
2010/03/03 09:29:55 204.236.183.133.53 -> 128.59.154.161.4480 17 1 198
2010/03/03 09:29:55 204.236.183.133.53 -> 128.59.154.207.16256 17 1 198
2010/03/03 09:29:55 204.236.183.133.53 -> 128.59.154.31.36735 17 1 198
2010/03/03 09:29:55 204.236.183.133.53 -> 128.59.154.53.42367 17 1 198
2010/03/03 09:29:56 204.236.183.133.53 -> 128.59.154.180.9344 17 1 198
2010/03/03 09:29:56 204.236.183.133.53 -> 128.59.154.183.10112 17 1 198
2010/03/03 09:29:56 204.236.183.133.53 -> 128.59.154.242.25216 17 1 198
2010/03/03 09:29:56 204.236.183.133.53 -> 128.59.154.37.38271 17 1 198
2010/03/03 09:29:56 204.236.183.133.53 -> 128.59.154.51.41855 17 1 198
2010/03/03 09:32:11 204.236.183.133.53 -> 156.111.194.132.36121 17 1 198
2010/03/03 09:32:11 204.236.183.133.53 -> 156.111.194.208.55577 17 1 198
2010/03/03 09:32:11 204.236.183.133.53 -> 156.111.194.64.18713 17 1 198
2010/03/03 09:32:12 204.236.183.133.53 -> 156.111.227.138.38053 17 1 198
2010/03/03 09:32:12 204.236.183.133.53 -> 156.111.227.221.59301 17 1 198
2010/03/03 09:32:12 204.236.183.133.53 -> 156.111.227.233.62373 17 1 198
2010/03/03 09:32:12 204.236.183.133.53 -> 156.111.227.239.63909 17 1 198
2010/03/03 09:32:12 204.236.183.133.53 -> 156.111.227.58.17573 17 1 198


--On Wednesday, March 03, 2010 12:24 PM +0000 Dave Burke <dave at amazon.com> wrote:

> ----------- nsp-security Confidential --------
>
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> Hi,
>
> We currently have a customer getting hit with a large DDoS attack.
> Can you please check if you have flows towards ..
>
> 184.73.22.252 ( Eastern USA, Syn Flood)
> 184.72.3.89 ( Northern California, Syn Flood )
> 184.72.1.208 ( Northern California, UDP/53 Flood )
> 204.236.183.133 ( Nortern California, UDP/53 Flood )
>
> The Syn flood pkt lengths are really nice round numbers (950/850/450/650
> bytes). The majority of the source IPs are associated with China.
>
> The attacks started about 09:54:19UTC this morning and are still ongoing.
>
> If you go have flows towards those IPs, please drop the traffic on the
> floor towards them for a few hours.
>
> Sample srcIPs..
> 4134    | 121.12.168.249   | CHINANET-BACKBONE No.31,Jin-rong Street
> 4134    | 121.12.170.24    | CHINANET-BACKBONE No.31,Jin-rong Street
> 4134    | 121.12.170.59    | CHINANET-BACKBONE No.31,Jin-rong Street
> 4134    | 121.12.174.177   | CHINANET-BACKBONE No.31,Jin-rong Street
> 4134    | 121.12.174.36    | CHINANET-BACKBONE No.31,Jin-rong Street
> 4134    | 122.224.33.106   | CHINANET-BACKBONE No.31,Jin-rong Street
> 4134    | 122.224.33.156   | CHINANET-BACKBONE No.31,Jin-rong Street
> 4134    | 122.224.33.69    | CHINANET-BACKBONE No.31,Jin-rong Street
> 4134    | 122.224.33.70    | CHINANET-BACKBONE No.31,Jin-rong Street
> 4134    | 122.224.33.81    | CHINANET-BACKBONE No.31,Jin-rong Street
> 4134    | 122.224.33.90    | CHINANET-BACKBONE No.31,Jin-rong Street
> 4134    | 122.224.33.93    | CHINANET-BACKBONE No.31,Jin-rong Street
> 4134    | 124.232.142.72   | CHINANET-BACKBONE No.31,Jin-rong Street
> 4134    | 124.232.143.169  | CHINANET-BACKBONE No.31,Jin-rong Street
> 4134    | 125.64.17.229    | CHINANET-BACKBONE No.31,Jin-rong Street
> 4134    | 125.64.34.84     | CHINANET-BACKBONE No.31,Jin-rong Street
> 4134    | 218.22.112.16    | CHINANET-BACKBONE No.31,Jin-rong Street
> 4134    | 218.22.143.25    | CHINANET-BACKBONE No.31,Jin-rong Street
> 4134    | 218.5.203.247    | CHINANET-BACKBONE No.31,Jin-rong Street
> 4134    | 221.236.5.136    | CHINANET-BACKBONE No.31,Jin-rong Street
> 4134    | 222.85.146.6     | CHINANET-BACKBONE No.31,Jin-rong Street
> 4134    | 60.169.10.111    | CHINANET-BACKBONE No.31,Jin-rong Street
> 4134    | 60.169.10.239    | CHINANET-BACKBONE No.31,Jin-rong Street
> 4134    | 60.169.10.37     | CHINANET-BACKBONE No.31,Jin-rong Street
> 4134    | 60.169.10.73     | CHINANET-BACKBONE No.31,Jin-rong Street
> 4134    | 60.191.240.132   | CHINANET-BACKBONE No.31,Jin-rong Street
> 4134    | 61.139.68.1      | CHINANET-BACKBONE No.31,Jin-rong Street
> 4134    | 61.191.60.170    | CHINANET-BACKBONE No.31,Jin-rong Street
> 4134    | 61.191.61.153    | CHINANET-BACKBONE No.31,Jin-rong Street
> 4134    | 61.191.62.114    | CHINANET-BACKBONE No.31,Jin-rong Street
> 4837    | 221.208.255.229  | CHINA169-BACKBONE CNCGROUP China169 Backbone
> 17633   | 58.57.6.88       | CHINATELECOM-SD-AS-AP ASN for Shandong
> Provincial Net of CT
>
>
>
> thanks!
> dave
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG/MacGPG2 v2.0.14 (Darwin)
> Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
>
> iEYEARECAAYFAkuOVRkACgkQvMJ1IGjTxcEEPQCgy0Kj2U+C0dMe0AqoKA2wuHlf
> fhEAoKjHXJw4z6YzKikx+oK3DuZ3P428
> =pjIZ
> -----END PGP SIGNATURE-----
>
>
>
> Amazon Data Services Ireland Limited registered office: Riverside One, Sir John Rogerson's Quay, Dublin 2, Ireland. Registered in Ireland. Registration
> number 390566.
>
>
>
>
> _______________________________________________
> nsp-security mailing list
> nsp-security at puck.nether.net
> https://puck.nether.net/mailman/listinfo/nsp-security
>
> Please do not Forward, CC, or BCC this E-mail outside of the nsp-security
> community. Confidentiality is essential for effective Internet security counter-measures.
> _______________________________________________
>



Joel Rosenblatt, Manager Network & Computer Security
Columbia Information Security Office (CISO)
Columbia University, 612 W 115th Street, NY, NY 10025 / 212 854 3033
http://www.columbia.edu/~joel




More information about the nsp-security mailing list