[nsp-sec] ACK Stolen FTP credentials
Torsten Voss
voss at dfn-cert.de
Wed Feb 16 11:48:15 EST 2011
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Hi Dirk,
thanks and ACK for ASN 553, 680, 2857, 8365, 12816, 20633, 29484
Cheers,
Torsten
Am 15.02.2011 14:35, schrieb Dirk Stander:
> ----------- nsp-security Confidential --------
>
> Hi Teams,
>
> please find attached a list of stolen FTP-credentials, which have
> been used to inject IFrames (pointing to visions7[.]net or axstat[.]com)
> into legitimate web sites.
>
> The format of the list is:
> <ASN> | <IP> | <CC> | <domain name> <user> <pass> | <AS desc>
>
> kind regards, Dirk Stander (1&1 Internet AG) :.
>
> _______________________________________________
> nsp-security mailing list
> nsp-security at puck.nether.net
> https://puck.nether.net/mailman/listinfo/nsp-security
>
> Please do not Forward, CC, or BCC this E-mail outside of the nsp-security
> community. Confidentiality is essential for effective Internet security counter-measures.
> _______________________________________________
- --
Dipl.-Ing.(FH) Torsten Voss (Incident Response Team), Phone +49 40 808077-634
DFN-CERT Services GmbH, https://www.dfn-cert.de, Phone +49 40 808077-590
Sitz / Register: Hamburg, AG Hamburg, HRB 88805, Ust-IdNr.: DE 232129737
Sachsenstrasse 5, 20097 Hamburg/Germany, CEO: Dr. Klaus-Peter Kossakowski
Automatische Warnmeldungen https://www.cert.dfn.de/autowarn
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.12 (GNU/Linux)
Comment: Using GnuPG with SUSE - http://enigmail.mozdev.org/
iQEVAwUBTVv/zyXNv0Upg26pAQLoWggAh7dhqZGZNJrzGjzj5i3ozK8x6bAqw/lz
NxhYlypfOU2YxJIkn3nvsdp3fDusdZERJjIVVO0FNY7LOgtuoztWVHYdNFPWia5D
Y57X4zvdk+fPoiAHIH8FA0PiDGtE5lbz8vBl1x1vsJN++cCtUrTmZe/FPx4SEvlV
0Dq841ggGtjhm+V1XxFAjagdUq88TVq0PdDyP82y7DAuMB09MlA9UQfPFWfj6SoZ
1EMrtOzbPjkHc+vaio2DrTGMPMkUlkRNGlHvI1o9hneeXTaQEXVLm+EC+bCjS2in
8llZ8mAyY//BDWeuuaOj0V7b9+loc8zxJ3VYrbmAAFOKsJLefNbPyQ==
=QrTj
-----END PGP SIGNATURE-----
More information about the nsp-security
mailing list