August 2011 Archives by date
Starting: Mon Aug 1 16:01:59 EDT 2011
Ending: Wed Aug 31 15:47:48 EDT 2011
Messages: 223
- [nsp-sec] Yahoo contact offline
Nick Hilliard
- [nsp-sec] Google spreadsheet phish
David Freedman
- [nsp-sec] Daily Reports Summary for week ending 2011-08-01
Tim Wilde
- [nsp-sec] Dropbox at Gmail
Torsten Voss
- [nsp-sec] Dropbox at Gmail
Peter Moody
- [nsp-sec] Google spreadsheet phish
Chris Morrow
- [nsp-sec] gmail phishing drop box
Jon Lewis
- [nsp-sec] gmail phishing drop box
Chris Morrow
- [nsp-sec] Compromised clusters used for bitcoin mining
Leif Nixon
- [nsp-sec] Compromised clusters used for bitcoin mining
Jose Nazario
- [nsp-sec] zapto.org high dns query rate possible attack and 0/0 ??
Smith, Donald
- [nsp-sec] zapto.org high dns query rate possible attack and 0/0 ??
Stephen Gill
- [nsp-sec] Google spreadsheet phish
Jon Lewis
- [nsp-sec] zapto.org high dns query rate possible attack and 0/0 ??
Smith, Donald
- [nsp-sec] Google spreadsheet phish
Chris Morrow
- [nsp-sec] zapto.org high dns query rate possible attack and 0/0 ??
Stephen Gill
- [nsp-sec] Compromised clusters used for bitcoin mining
Leif Nixon
- [nsp-sec] what to do when a muni doesn't take a potential breach seriously
John Brown
- [nsp-sec] what to do when a muni doesn't take a potential breach seriously
Chris Morrow
- [nsp-sec] zapto.org high dns query rate possible attack and 0/0 ??
Smith, Donald
- [nsp-sec] what to do when a muni doesn't take a potential breach seriously
Eli Dart
- [nsp-sec] zapto.org high dns query rate possible attack and 0/0 ??
Stephen Gill
- [nsp-sec] zapto.org high dns query rate possible attack and 0/0 ??
Smith, Donald
- [nsp-sec] google spreadsheet phish
James J. Barlow
- [nsp-sec] google spreadsheet phish
Chris Morrow
- [nsp-sec] Infected Cisco Information Packet and Warranty CDs
Thomas Hungenberg
- [nsp-sec] Google spreadsheet phish
Daniel Robert Adinolfi
- [nsp-sec] ATTN: Yahoo.cn - Fwd: God bless you as you reply
Daniel Robert Adinolfi
- [nsp-sec] Google spreadsheet phish
Peter Moody
- [nsp-sec] #RefRef
King, Link
- [nsp-sec] #RefRef
Jason Chambers
- [nsp-sec] Google spreadsheet phish
Gabriel Iovino
- [nsp-sec] Google spreadsheet phish
Chris Morrow
- [nsp-sec] Google spreadsheet phish
Jon Lewis
- [nsp-sec] Google spreadsheet phish
Chris Morrow
- [nsp-sec] Google spreadsheet phish
Ryan Pavely
- [nsp-sec] Google spreadsheet phish
Chris Morrow
- [nsp-sec] Google Spreadsheet Phish
Warren Raquel
- [nsp-sec] Google Spreadsheet Phish
Warren Raquel
- [nsp-sec] Google Spreadsheet Phish
Chris Morrow
- [nsp-sec] Google Spreadsheet Phish
Chris Morrow
- [nsp-sec] [verifingscencses at gmail.com, verification at google-eupgrading.com, support-details at google.com]
William Allen Simpson
- [nsp-sec] #RefRef
Dave Burke
- [nsp-sec] #RefRef
King, Link
- [nsp-sec] #RefRef
Jose Nazario
- [nsp-sec] Google spreadsheet phish (from optushome.com.au)
CERT-UT - Peter
- [nsp-sec] MS ASN alert system?
Hank Nussbacher
- [nsp-sec] MS ASN alert system?
David Freedman
- [nsp-sec] [infosdescomptes at gmail.com]
William Allen Simpson
- [nsp-sec] MS ASN alert system?
Hank Nussbacher
- [nsp-sec] MS ASN alert system?
Hank Nussbacher
- [nsp-sec] MS ASN alert system?
Kurt Jaeger
- [nsp-sec] Contact at AS20773 - Hosteurope GMBH
Leif Nixon
- [nsp-sec] MS ASN alert system?
Hank Nussbacher
- [nsp-sec] Google spreadsheet phish (from optushome.com.au)
Peter Moody
- [nsp-sec] SSH hack ?
Kurt Jaeger
- [nsp-sec] 27977/tcp scans
Jose Nazario
- [nsp-sec] Chinanet SIP attack
Saunders, D'Wayne S
- [nsp-sec] SSH hack ?
Kurt Jaeger
- [nsp-sec] Chinanet SIP attack
Nicholas Ianelli
- [nsp-sec] Daily Reports Summary for week ending 2011-08-08
Tim Wilde
- [nsp-sec] Anyone have a contact for Abovenet UK?
Mike O'Connor
- [nsp-sec] Paging Yahoo
Wentworth, Brett
- [nsp-sec] Phishing at AS14618 (AMAZON)
David Jiménez
- [nsp-sec] contact at AS1239 needed, need to nuke 80.81.192.0/23 prefix
Gert Doering
- [nsp-sec] contact at AS1239 needed, need to nuke 80.81.192.0/23 prefix
Gert Doering
- [nsp-sec] For your consideration: Detlev O. Matthies - DFN Cert
Chris Morrow
- [nsp-sec] For your consideration: Detlev O. Matthies - DFN Cert
Torsten Voss
- [nsp-sec] For your consideration: Detlev O. Matthies - DFN Cert
Leif Nixon
- [nsp-sec] Google spreadsheets
Gabriel Iovino
- [nsp-sec] Google spreadsheets
Chris Morrow
- [nsp-sec] Google spreadsheets
Gabriel Iovino
- [nsp-sec] Google spreadsheets
Chris Morrow
- [nsp-sec] Google spreadsheets
Jon Lewis
- [nsp-sec] Daily Reports Summary for week ending 2011-08-15
Tim Wilde
- [nsp-sec] Stolen FTP credentials
Thomas Hungenberg
- [nsp-sec] ACK 174 RE: Stolen FTP credentials
Shelton, Steve
- [nsp-sec] ACK 33383, 6900 : Stolen FTP credentials
Helmut Springer
- [nsp-sec] ACK 378: Stolen FTP credentials
Rafi Sadowsky
- [nsp-sec] Ack 6830, 8404, 13646: Stolen FTP credentials
Fronenbroek, Kick
- [nsp-sec] Stolen FTP credentials
Jon Lewis
- [nsp-sec] ACK AS8419 Stolen FTP credentials
Zoe O'Connell
- [nsp-sec] Stolen FTP credentials
David Freedman
- [nsp-sec] Stolen FTP credentials - ACK 3561/16941
Buchanan, Mark
- [nsp-sec] Stolen FTP credentials - ACK: 2119
Helge Aksdal
- [nsp-sec] ACK AS852 - RE: Stolen FTP credentials
Chris Calvert
- [nsp-sec] Stolen FTP credentials - ACK 109
Chip Ho
- [nsp-sec] ACK 26496 - Re: Stolen FTP credentials
Greg Schwimer
- [nsp-sec] Stolen FTP credentials ACK AS209, AS5668 & AS32855
Hicks, Howard
- [nsp-sec] Stolen FTP credentials -- ACK 36351/21844
Nick Hale
- [nsp-sec] ACK 3549 RE: Stolen FTP credentials
Ramsey, Andrew
- [nsp-sec] Stolen FTP credentials
Dirk Stander
- [nsp-sec] Stolen FTP credentials
jim deleskie
- [nsp-sec] Stolen FTP credentials - Proxy ACK: 1680, 5486, 8551, 9116, 25003
Doron Shikmoni
- [nsp-sec] Stolen FTP credentials
Gabriel Iovino
- [nsp-sec] DNSSEC for epa.gov
Jason Gardiner
- [nsp-sec] ACK: Stolen FTP credentials
Rodolfo Baader
- [nsp-sec] ACK RE: Stolen FTP credentials
Matthew.Swaar at us-cert.gov
- [nsp-sec] DNSSEC for epa.gov
Aaron Hughes
- [nsp-sec] DNSSEC for epa.gov
Matthew.Swaar at us-cert.gov
- [nsp-sec] DNSSEC for epa.gov
Michael Sinatra
- [nsp-sec] DNSSEC for epa.gov
Jason Gardiner
- [nsp-sec] DNSSEC for epa.gov
Michael Sinatra
- [nsp-sec] Third party image content on gstatic.com
Florian Weimer
- [nsp-sec] ACK 680, 41289 Re: Stolen FTP credentials
Torsten Voss
- [nsp-sec] For your Consideration: Thomas Gardner (LLNW)
Chris Morrow
- [nsp-sec] Stolen FTP credentials
Serge Droz
- [nsp-sec] Attn Google: more spreadsheet phishing
Daniel Robert Adinolfi
- [nsp-sec] Attn Google: more spreadsheet phishing
Peter Moody
- [nsp-sec] Stolen FTP credentials -- ACK 36351/21844
Tino Steward
- [nsp-sec] Compromised bitcoin miners
Leif Nixon
- [nsp-sec] ACK 174 RE: Compromised bitcoin miners
Shelton, Steve
- [nsp-sec] Attn Gmail: "nkprm345 at gmail.com" dropbox used in phish
RuthAnne Bevier
- [nsp-sec] Compromised bitcoin miners
Nick Hale
- [nsp-sec] Compromised bitcoin miners
CERT-UT - Peter
- [nsp-sec] DDoS attack - SYN Flood - Target: 209.242.125.24 port 80/TCP
Nicholas Ianelli
- [nsp-sec] Compromised bitcoin miners
Dirk Stander
- [nsp-sec] ATTN Google, phish dropbox at caltechalerts at gmail.com
RuthAnne Bevier
- [nsp-sec] ATTN Google, phish dropbox at caltechalerts at gmail.com
Chris Morrow
- [nsp-sec] ACK 2914 Re: Compromised bitcoin miners
Tino Steward
- [nsp-sec] DDoS attack - SYN Flood - Target: 209.242.125.24 port 80/TCP
Yiming Gong
- [nsp-sec] DDoS attack - SYN Flood - Target: 209.242.125.24 port 80/TCP
Jose Nazario
- [nsp-sec] Ack AS209 Compromised bitcoin miners
Hicks, Howard
- [nsp-sec] [DDoS - City of New York]
James J. Barlow
- [nsp-sec] [DDoS - City of New York]
Marc Kneppers
- [nsp-sec] ACK AS852 - RE: [DDoS - City of New York]
Chris Calvert
- [nsp-sec] [DDoS - City of New York]
White, Gerard
- [nsp-sec] [DDoS - City of New York]
Joel Rosenblatt
- [nsp-sec] [DDoS - City of New York]
Marc Kneppers
- [nsp-sec] [DDoS - City of New York]
Joel Rosenblatt
- [nsp-sec] ACK AS209 [DDoS - City of New York]
Hicks, Howard
- [nsp-sec] [DDoS - City of New York]
Aaron Hughes
- [nsp-sec] Proxy ACK for AS5778 & 11398 [DDoS - City of New York]
Hicks, Howard
- [nsp-sec] Daily Reports Summary for week ending 2011-08-22
Tim Wilde
- [nsp-sec] Proxy ACK for AS5778 & 11398 [DDoS - City of New York]
Smith, Donald
- [nsp-sec] Proxy ACK for AS5778 & 11398 [DDoS - City of New York]
Smith, Donald
- [nsp-sec] [DDoS - City of New York]
Mike Seddon
- [nsp-sec] [DDoS - City of New York]
Rob Thomas
- [nsp-sec] Vetting for your consideration: Robert Jonsson (CERT.se, AS41884 & so on)
Scott A. McIntyre
- [nsp-sec] Vetting for your consideration: Robert Jonsson (CERT.se, AS41884 & so on)
Huopio Kauto
- [nsp-sec] Vetting for your consideration: Robert Jonsson (CERT.se, AS41884 & so on)
Harri Sylvander
- [nsp-sec] ACK AS8419 [DDoS - City of New York]
Zoe O'Connell
- [nsp-sec] [DDoS - City of New York]
Yoshitaka Inoue
- [nsp-sec] Vetting for your consideration: Robert Jonsson (CERT.se, AS41884 & so on)
Wim Biemolt
- [nsp-sec] Vetting for your consideration: Robert Jonsson (CERT.se, AS41884 & so on)
Leif Nixon
- [nsp-sec] Compromised bitcoin miners
Gabriel Iovino
- [nsp-sec] [DDoS - City of New York]
Young, Beth A.
- [nsp-sec] [DDoS - City of New York]
CERT-UT - Peter
- [nsp-sec] DDoS attack - SYN Flood - Target: 209.242.125.24 port 80/TCP
Tino Steward
- [nsp-sec] ACK AS8419 [DDoS - City of New York]
Smith, Donald
- [nsp-sec] [DDoS - City of New York]
Rob Thomas
- [nsp-sec] ACK 2914 Re: [DDoS - City of New York]
Tino Steward
- [nsp-sec] For your Consideration: Thomas Gardner (LLNW)
Guy Tal
- [nsp-sec] ACK AS1221 [DDoS - City of New York]
Saunders, D'Wayne S
- [nsp-sec] Bitcoin Miner/BadMiner - Active Peer list
Nicholas Ianelli
- [nsp-sec] For your consideration: Detlev O. Matthies - DFN Cert
Wim Biemolt
- [nsp-sec] Bitcoin Miner/BadMiner - Active Peer list
Carles Fragoso
- [nsp-sec] ACK [DDoS - City of New York]
Taka Mizuguchi
- [nsp-sec] Can people please use cymru verbose format? (was Re: Bitcoin Miner/BadMiner - Active Peer list)
Nick Hilliard
- [nsp-sec] [DDoS - City of New York]
Joel Rosenblatt
- [nsp-sec] Bitcoin Miner/BadMiner - Active Peer list
Sweeney, William- CIPS
- [nsp-sec] Google spreadsheet
Helge Aksdal
- [nsp-sec] Can people please use cymru verbose format? (was Re: Bitcoin Miner/BadMiner - Active Peer list)
Smith, Donald
- [nsp-sec] PROXY ACK AS1680, AS8551, AS9116 Bitcoin Miner/BadMiner - Active Peer list
Rafi Sadowsky
- [nsp-sec] DoS vulnerability in Apache HTTPD 1.3/2.x
Thomas Hungenberg
- [nsp-sec] DoS vulnerability in Apache HTTPD 1.3/2.x
Jose Nazario
- [nsp-sec] DoS vulnerability in Apache HTTPD 1.3/2.x
Jose Nazario
- [nsp-sec] ATTN Google, gmail dropbox at accountverifier14 at gmail.com
RuthAnne Bevier
- [nsp-sec] Google spreadsheet
Peter Moody
- [nsp-sec] Google spreadsheet
Gabriel Iovino
- [nsp-sec] ltwltter.com phishing site, Attention twitter and anyone who can help get this shutdown
Aaron Hughes
- [nsp-sec] google docs phish site
RuthAnne Bevier
- [nsp-sec] Help with Phishing page at AS 32244
Gabriel Iovino
- [nsp-sec] Help with Phishing page at AS 32244
Gabriel Iovino
- [nsp-sec] google docs phish site
Peter Moody
- [nsp-sec] Daily Reports Summary for week ending 2011-08-29
Tim Wilde
- [nsp-sec] Google Certificate Problems?
Jason Gardiner
- [nsp-sec] Google Certificate Problems?
Chris Morrow
- [nsp-sec] Google Certificate Problems?
Chris Morrow
- [nsp-sec] Google Certificate Problems?
Florian Weimer
- [nsp-sec] Google Certificate Problems?
Nick Hilliard
- [nsp-sec] Google Certificate Problems?
Leif Nixon
- [nsp-sec] Google Certificate Problems?
CERT-UT - Peter
- [nsp-sec] Google Certificate Problems?
Chris Morrow
- [nsp-sec] HUGH SPAM attack against AS3320 last week => maybe over 280000 bots involved
Peter.Quick at t-systems.com
- [nsp-sec] Morto worm C&C (RDP Scanner)
Joel Rosenblatt
- [nsp-sec] [ACK AS52] Morto worm C&C (RDP Scanner)
Jason Chambers
- [nsp-sec] ACK 2572 Morto worm C&C (RDP Scanner)
Young, Beth A.
- [nsp-sec] ACK: RE: Morto worm C&C (RDP Scanner)
Krista Hickey
- [nsp-sec] Morto worm C&C (RDP Scanner)
Gerry Sneeringer
- [nsp-sec] Morto worm C&C (RDP Scanner)
Robert
- [nsp-sec] Morto worm C&C (RDP Scanner)
Hicks, Howard
- [nsp-sec] Morto worm C&C (RDP Scanner) - ACK 2119
Helge Aksdal
- [nsp-sec] Morto worm C&C (RDP Scanner)
Joel Rosenblatt
- [nsp-sec] AS25 ACK Re: Morto worm C&C (RDP Scanner)
Michael Sinatra
- [nsp-sec] Morto worm C&C (RDP Scanner)
Mike Seddon
- [nsp-sec] Morto worm C&C (RDP Scanner)
Nick Hale
- [nsp-sec] ack: Morto worm C&C (RDP Scanner)
Wim Biemolt
- [nsp-sec] ACK 15659: Morto worm C&C (RDP Scanner)
Andreas Lorentzen
- [nsp-sec] ACK AS1221 & AS4768 Morto worm C&C (RDP Scanner)
Saunders, D'Wayne S
- [nsp-sec] Bitcoin Miner/BadMiner - Live Peer list
Nicholas Ianelli
- [nsp-sec] Bitcoin Miner/BadMiner - Peer list
Nicholas Ianelli
- [nsp-sec] dropping off nsp-sec
Pekka Savola
- [nsp-sec] Phishing email from hud.gov -- Received: from hlanuep901.hud.gov
Russell Fulton
- [nsp-sec] ack 1103: Bitcoin Miner/BadMiner - Live Peer list
Wim Biemolt
- [nsp-sec] ack 1103: Bitcoin Miner/BadMiner - Peer list
Wim Biemolt
- [nsp-sec] Morto worm C&C (RDP Scanner)
Carles Fragoso
- [nsp-sec] Morto worm C&C (RDP Scanner)
Thomas Hungenberg
- [nsp-sec] ACK 174 RE: Morto worm C&C (RDP Scanner)
Shelton, Steve
- [nsp-sec] Paging Google - Spreadsheet phish
Daniel Robert Adinolfi
- [nsp-sec] Morto worm C&C (RDP Scanner)
Andrew Korty
- [nsp-sec] Bitcoin Miner/BadMiner - Peer list
Gabriel Iovino
- [nsp-sec] Morto worm C&C (RDP Scanner)
Nicholas Ianelli
- [nsp-sec] ACK: RE: Bitcoin Miner/BadMiner - Peer list
Krista Hickey
- [nsp-sec] ACK AS852 - RE: Bitcoin Miner/BadMiner - Live Peer list
Chris Calvert
- [nsp-sec] Paging Google - Spreadsheet phish
Peter Moody
- [nsp-sec] ACK 2914 Re: Morto worm C&C (RDP Scanner)
Tino Steward
- [nsp-sec] ACK: Morto worm C&C (RDP Scanner)
Rodolfo Baader
- [nsp-sec] ACK812 Morto worm C&C (RDP Scanner)
Philip Taylor
- [nsp-sec] Any contacts over at AS4645 HKNet Company Limited
Nicholas Ianelli
- [nsp-sec] Contacts at AS45634 - SPARKSTATION-SG-AP 10 Science Park Road
Nicholas Ianelli
- [nsp-sec] Morto worm C&C (RDP Scanner)
Yiming Gong
- [nsp-sec] Morto worm C&C (RDP Scanner)
Michael Sinatra
Last message date:
Wed Aug 31 15:47:48 EDT 2011
Archived on: Thu Jan 22 18:52:18 EST 2015
This archive was generated by
Pipermail 0.09 (Mailman edition).