[nsp-sec] Stolen FTP credentials - Ack 855

White, Gerard Gerard.White at bellaliant.ca
Tue Feb 15 11:32:22 EST 2011


Thanks Mr. Stander!  Much Appreciated!

GW
855 - Bell Aliant

-----Original Message-----
From: nsp-security-bounces at puck.nether.net [mailto:nsp-security-bounces at puck.nether.net] On Behalf Of Dirk Stander
Sent: February-15-11 10:05 AM
To: Nsp-Security
Subject: [nsp-sec] Stolen FTP credentials

----------- nsp-security Confidential --------

Hi Teams,

please find attached a list of stolen FTP-credentials, which have
been used to inject IFrames (pointing to visions7[.]net or axstat[.]com)
into legitimate web sites.

The format of the list is:
<ASN> | <IP> | <CC> | <domain name> <user> <pass> | <AS desc>

    kind regards, Dirk Stander (1&1 Internet AG) :.

855 | 209.128.7.114 | CA | ftp.rutter.ca Rutter Rut***** | CANET-ASN-4 - Bell Aliant Regional Communications, Inc.


-------------- next part --------------
A non-text attachment was scrubbed...
Name: PGP.sig
Type: application/pgp-signature
Size: 183 bytes
Desc: not available
URL: <https://puck.nether.net/mailman/private/nsp-security/attachments/20110215/1eeeb06b/attachment-0001.sig>


More information about the nsp-security mailing list