[nsp-sec] [SPAM] Re: Two Flashback C&Cs: HE, NTT, Internap, Limelight

Chris Morrow morrowc at ops-netman.net
Thu Apr 19 13:00:52 EDT 2012


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1



On 04/19/2012 11:47 AM, Bill Woodcock wrote:
> ----------- nsp-security Confidential --------
> 
> 
> On Apr 19, 2012, at 8:38 AM, Chip Gwyn wrote:
>> Internap checking in. We're starting to poke around.
> 
> Thanks, Chip.
> 
> Update from Apple:
> 
> There were more than 1,000 domains registered over the course of
> more than a month, for a three-layer C&C redirect and
> load-balancing cloud.  Of those, only ten have, so far, actually
> delivered the final malware payload.  All of the others have been
> bootstrap code or redirection or load-balancing.  The two I passed
> along from last night were two of the ten that have been actually
> observed delivering payload.  The other eight are in process of LE
> takedown through the DNS.  But that leaves a lot more domains that
> could be re-purposed, and Apple's observed domains being
> re-purposed already.  Also, there's an update mechanism, and there
> are infected hosts that have been switched from HTTP C&C to Twitter
> C&C.  Twitter is already working with Apple on that.
> 
> I'm calling HE now.

if Apple has the list of C&C domains... there's a list for getting
those disabled as well. (not nsp-sec)

> 
> 
> _______________________________________________ nsp-security
> mailing list nsp-security at puck.nether.net 
> https://puck.nether.net/mailman/listinfo/nsp-security
> 
> Please do not Forward, CC, or BCC this E-mail outside of the 
> nsp-security community. Confidentiality is essential for effective 
> Internet security counter-measures. 
> _______________________________________________
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12-git43c7d1c (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iD8DBQFPkETDr6swUqhDs2sRAnc3AJ91HFSUVvjOnG2SO137CAreU9gy7wCfbMMV
/PoGK9fwaQchOoRHJoWUhM0=
=WUf1
-----END PGP SIGNATURE-----



More information about the nsp-security mailing list