[nsp-sec] ACK 855 & Customers: Stolen FTP credentials
White, Gerard
Gerard.White at bellaliant.ca
Tue Apr 19 07:07:17 EDT 2011
Thank you kind sir!
GW
-----Original Message-----
From: nsp-security-bounces at puck.nether.net [mailto:nsp-security-bounces at puck.nether.net] On Behalf Of Thomas Hungenberg
Sent: April-19-11 5:39 AM
To: nsp-security at puck.nether.net
Subject: [nsp-sec] Stolen FTP credentials
----------- nsp-security Confidential --------
Hi,
please find below a list of stolen FTP login credentials found in several lists
on a server used for malicious activity. Unfortunately, I don't have information
on when and how the credentials were stolen, but the filenames and timestamps
of the lists indicate that they were harvested earlier this month.
Format: ASN | IP | CC | hostname | username | sanitized password | AS desc
- Thomas
CERT-Bund Incident Response & Anti-Malware Team
-------------- next part --------------
A non-text attachment was scrubbed...
Name: PGP.sig
Type: application/pgp-signature
Size: 183 bytes
Desc: not available
URL: <https://puck.nether.net/mailman/private/nsp-security/attachments/20110419/1fd13f71/attachment-0001.sig>
More information about the nsp-security
mailing list