[nsp-sec] Ack5400 - Stolen FTP credentials

Schaminee, Jacques (eu.bt.net) jacques.schaminee at eu.bt.net
Tue Feb 15 11:14:53 EST 2011


Thanks Dirk!

Ack 5400.

Rgrds -
----------------------------
Jacques Schaminee
Manager Security & Network Management | NCCA Security | Security Operations
| BT Operate
Minerva Building    | Herikerbergweg 2    | 1101 CM AMSTERDAM Z-O   | The
Netherlands
Tel. +31 88 212 8008  || Mob. +31 6 5581 6489
Email: jacques.schaminee at bt.com


-----Original Message-----
From: nsp-security-bounces at puck.nether.net
[mailto:nsp-security-bounces at puck.nether.net] On Behalf Of Dirk Stander
Sent: Tue, 15 February 2011 14:35
To: Nsp-Security
Subject: [nsp-sec] Stolen FTP credentials

----------- nsp-security Confidential --------

Hi Teams,

please find attached a list of stolen FTP-credentials, which have
been used to inject IFrames (pointing to visions7[.]net or axstat[.]com)
into legitimate web sites.

The format of the list is:
<ASN> | <IP> | <CC> | <domain name> <user> <pass> | <AS desc>

    kind regards, Dirk Stander (1&1 Internet AG) :.

...
...


_______________________________________________
nsp-security mailing list
nsp-security at puck.nether.net
https://puck.nether.net/mailman/listinfo/nsp-security

Please do not Forward, CC, or BCC this E-mail outside of the nsp-security
community. Confidentiality is essential for effective Internet security
counter-measures.
_______________________________________________




More information about the nsp-security mailing list