[nsp-sec] UDP DDoS

Nick Hale nspsec at rtfmnewbie.com
Tue Mar 13 15:42:46 EDT 2012


I'm going to tentatively agree with what Jose said.  They're probably comp'd accounts on the host.  I've reached out to our customer (2 of them,
actually...) and will see what I can dig up and share.

-NH


On 3/13/2012 14:40, Jose Nazario wrote:
> manual inspection suggests that those are web servers. i'd suspect compromised web sites with PHP or perl scripts (bots, maybe) running on them. if so, they're likely not spoofing their source IPs. 
> 
> On Mar 13, 2012, at 3:36 PM, Dave Monnier wrote:
> 
>> ----------- nsp-security Confidential --------
>>
>> Hi, Nick.
>>
>> Thanks much for offering to help!
>>
>> Here's what I've got for those hosts.
>>
>> Date first seen          Duration Proto       Src IP Addr    Flows(%)
>>  Packets(%)       Bytes(%)         pps      bps   bpp
>> 2012-03-11 18:56:44.662 90197.871 any     173.192.220.101     1077( 9.5)
>>   6.1 M(20.2)    8.5 G(26.3)       68   752457  1382
>> 2012-03-11 18:56:44.663 90188.868 any      173.192.222.69      962( 8.4)
>>   5.4 M(17.9)    7.5 G(23.3)       60   667783  1383
>> 2012-03-11 18:56:44.213 90170.961 any       208.43.81.118      881( 7.7)
>>   4.9 M(16.1)    6.7 G(20.9)       54   597904  1380
>> 2012-03-11 18:56:44.323 90174.761 any     174.120.229.130      528( 4.6)
>>   3.2 M(10.7)    4.4 G(13.7)       36   393969  1367
>>
>> Sorry for the line wrapping.
>>
>> If you can verify them as sources that would be awesome.
>>
>> They all look to be Linux systems and host a bunch of domains.
>>
>> Thanks!
>> -Dave
>>
>> On 3/13/12 3:32 PM, Nick Hale wrote:
>>> Hi Dave,
>>>
>>> Can you give me any more info on the 36351/21844 hosts?  I'll start digging into what I can on this end. (sample pcaps would be wonderful too, if
>>> possible).
>>>
>>> Regards,
>>> Nick
>>> SoftLayer
>>>
>>>
>>>
>>> On 3/13/2012 14:25, Dave Monnier wrote:
>>>> ----------- nsp-security Confidential --------
>>>>
>>>>
>>>>
>>>>
>>>> Team,
>>>>
>>>> Looking for the source of a UDP-based attack against these IP:
>>>>
>>>> 202.163.115.10
>>>> 202.163.115.11
>>>> 61.5.158.117
>>>> 61.5.158.121
>>>> 61.5.158.124
>>>> 61.5.158.114
>>>>
>>>> Leaders by percentage look to be:
>>>> 36351   | 173.192.220.101  | SOFTLAYER - SoftLayer Technologies Inc.
>>>> 36351   | 173.192.222.69   | SOFTLAYER - SoftLayer Technologies Inc.
>>>> 36351   | 208.43.81.118    | SOFTLAYER - SoftLayer Technologies Inc.
>>>> 21844   | 174.120.229.130  | THEPLANET-AS - ThePlanet.com Internet
>>>> 19066   | 173.199.150.228  | WIREDTREE - Cogswell Enterprises Inc.
>>>> 30217   | 216.87.163.170   | DESYNC - Desync Networks
>>>>
>>>> SRC/DST ports are all over.
>>>>
>>>> Thanks!
>>>> -Dave
>>>>
>>>>
>>>>
>>>>
>>>>
>>>>
>>>> _______________________________________________
>>>> nsp-security mailing list
>>>> nsp-security at puck.nether.net
>>>> https://puck.nether.net/mailman/listinfo/nsp-security
>>>>
>>>> Please do not Forward, CC, or BCC this E-mail outside of the nsp-security
>>>> community. Confidentiality is essential for effective Internet security counter-measures.
>>>> _______________________________________________
>>
>>
>> -- 
>> Dave Monnier
>> Team Cymru
>> https://www.team-cymru.org/
>> PGP: https://www.cymru.com/dmonnier/0x7C1AAE55_pub.asc
>>
>>
>>
>>
>> _______________________________________________
>> nsp-security mailing list
>> nsp-security at puck.nether.net
>> https://puck.nether.net/mailman/listinfo/nsp-security
>>
>> Please do not Forward, CC, or BCC this E-mail outside of the nsp-security
>> community. Confidentiality is essential for effective Internet security counter-measures.
>> _______________________________________________
> 
> _____________________________
> jose nazario, ph.d. jose at arbor.net
> sr. manager of security research, arbor networks
> blog:    http://asert.arbor.net/
> twitter: @arbornetworks
> 



More information about the nsp-security mailing list