[nsp-sec] Strange targeted increase in TCP-445 scanning

Matthew.Swaar at us-cert.gov Matthew.Swaar at us-cert.gov
Wed Mar 31 22:02:00 EDT 2010


A single Federal Agency is receiving an anomalous amount of TCP-445
scanning.  This network has gone from experiencing ~60k inbound flows to
TCP-445 per day to over 120M in less than a month.  The IP space of the
network in question suggests a potential answer, but I'm not sure that I
completely buy it yet.  (And I still have folks looking for a the always
possible "sensor issue", although I think I've managed to rule out a
routing loop.)

In the past, we've observed failed "parking"/beheading attempts (done
via DNS entries for the C2) involving RFC3927 address space showing up
at this network (169.252./15; easy to typo "253" in the 2nd octet vice
254) but this usually involves a single IP/Port.  What we're seeing now
looks like attempted propagation moreso than C2.  So, that means the
miscreant has to:
	1.  Mistakenly release malware with RFC3927 address space in
place of all valid IPv4 address space in the (assumed) "remote
target-selection" function.	
	2.  Typo the 2nd octet.
	3.  Not notice that the malware isn't spreading (or isn't
spreading as expected) for ~30 days.

This is certainly possible...but I'd prefer a "one mistake" answer.
I've attached a few graphs showing the recent increase, and I've also
attached a .txt file with some recent sources.  Since this activity
could be spoofed, I'm not sending the IPS out for remediation (so I
haven't included timestamps) but if anyone does see an ASN of theirs in
the list, could you look for TCP-445 syn-scanning to 169.253./16 and let
me know what's causing this?

Password on the zipped .ppt file is '445st4t3' without the quotes.
 
Very Respectfully,

US-CERT Ops Center
888-282-0870
POC: Matt Swaar - Analyst
-------------- next part --------------
An embedded and charset-unspecified text was scrubbed...
Name: 445_sources.txt
URL: <https://puck.nether.net/mailman/private/nsp-security/attachments/20100331/e5709266/attachment-0001.txt>


More information about the nsp-security mailing list