[nsp-sec] Stolen FTP credentials - Ack 855
White, Gerard
Gerard.White at bellaliant.ca
Tue Feb 15 11:32:22 EST 2011
Thanks Mr. Stander! Much Appreciated!
GW
855 - Bell Aliant
-----Original Message-----
From: nsp-security-bounces at puck.nether.net [mailto:nsp-security-bounces at puck.nether.net] On Behalf Of Dirk Stander
Sent: February-15-11 10:05 AM
To: Nsp-Security
Subject: [nsp-sec] Stolen FTP credentials
----------- nsp-security Confidential --------
Hi Teams,
please find attached a list of stolen FTP-credentials, which have
been used to inject IFrames (pointing to visions7[.]net or axstat[.]com)
into legitimate web sites.
The format of the list is:
<ASN> | <IP> | <CC> | <domain name> <user> <pass> | <AS desc>
kind regards, Dirk Stander (1&1 Internet AG) :.
855 | 209.128.7.114 | CA | ftp.rutter.ca Rutter Rut***** | CANET-ASN-4 - Bell Aliant Regional Communications, Inc.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: PGP.sig
Type: application/pgp-signature
Size: 183 bytes
Desc: not available
URL: <https://puck.nether.net/mailman/private/nsp-security/attachments/20110215/1eeeb06b/attachment-0001.sig>
More information about the nsp-security
mailing list