[nsp-sec] 23 Gbps DNS DDoS against Akamai
Gilmore, Patrick
patrick at akamai.com
Tue Sep 18 22:53:30 EDT 2012
The attack seems to be abating. We're down to 6 Gbps and dropping.
Let's hope they don't resume any time soon. If they do, I'll let you all know. And either way, please clean the IP addresses listed. A fresh list with ASN / organization is appended.
--
TTFN,
patrick
558 | 67.222.22.63 | NET2EZ - Net2EZ
1659 | 192.192.155.219 | ERX-TANET-ASN1 Tiawan Academic Network (TANet) Information Center
2012 | 157.181.21.212 | ELTENET ELTENET
4657 | 203.117.178.12 | STARHUBINTERNET-AS StarHub Internet Exchange
4808 | 118.186.68.208 | CHINA169-BJ CNCGROUP IP network China169 Beijing Province Network
4812 | 114.80.245.137 | CHINANET-SH-AP China Telecom (Group)
4837 | 116.255.150.136 | CHINA169-BACKBONE CNCGROUP China169 Backbone
6400 | 200.88.112.60 | CompañÃa Dominicana de Teléfonos, C. por A. - CODETEL
7540 | 202.181.178.7 | HKCIX-AS-AP HongKong Commercial Internet Exchange
9198 | 178.91.94.6 | KAZTELECOM-AS JSC Kazakhtelecom
9394 | 222.59.180.75 | CRNET CHINA RAILWAY Internet(CRNET)
9811 | 58.30.226.145 | BJGY srit corp.,beijing.
9929 | 210.51.4.147 | CNCNET-CN China Netcom Corp.
12968 | 85.128.44.3 | CDP Crowley Data Poland, sp. z o.o.
13618 | 209.59.234.118 | CARONET-ASN - Carolina Internet, Ltd.
16010 | 80.241.247.195 | RUSTAVI2ONLINEAS Caucasus Online LLC
16265 | 85.17.231.237 | LEASEWEB LeaseWeb B.V.
16276 | 176.31.245.35 | OVH OVH Systems
16276 | 188.165.202.194 | OVH OVH Systems
17429 | 58.30.226.145 | BGCTVNET BEIJING GEHUA CATV NETWORK CO.LTD
18450 | 67.220.203.242 | WEBNX - WebNX
19066 | 96.30.29.128 | WIREDTREE - Cogswell Enterprises Inc.
20882 | 80.75.239.69 | INFORM-AS Inform Media Kft.
21219 | 93.183.204.25 | DATAGROUP PRIVATE JOINT STOCK COMPANY _DATAGROUP_
21229 | 212.40.65.18 | DRAVANET-AS Dravanet Co Ltd.
21844 | 174.120.70.155 | THEPLANET-AS - ThePlanet.com Internet Services, Inc.
21844 | 67.19.27.250 | THEPLANET-AS - ThePlanet.com Internet Services, Inc.
23724 | 118.186.68.208 | CHINANET-IDC-BJ-AP IDC, China Telecommunications Corporation
28788 | 62.133.206.72 | UNILOGICNET-AS Unilogic Networks B.V. Autonomous System
29134 | 217.31.57.177 | IGNUM-AS Ignum s.r.o.
29278 | 212.92.23.213 | DENINET-HU-AS Deninet KFT
30496 | 207.7.90.34 | COLO4 - Colo4, LLC
31815 | 205.186.141.33 | MEDIATEMPLE - Media Temple, Inc.
32392 | 76.162.253.103 | OPENTRANSFER-ECOMMERCE - Ecommerce Corporation
32613 | 70.38.17.16 | IWEB-AS - iWeb Technologies Inc.
36351 | 159.253.137.106 | SOFTLAYER - SoftLayer Technologies Inc.
36351 | 74.86.183.201 | SOFTLAYER - SoftLayer Technologies Inc.
37943 | 116.255.150.136 | CNNIC-GIANT ZhengZhou GIANT Computer Network Technology Co., Ltd
41550 | 91.207.44.25 | HBUA-AS HostBizUa network
41828 | 91.185.193.184 | TUSMOBIL TUSMOBIL network
45538 | 112.78.2.180 | ODS-AS-VN Online data services
45538 | 112.78.2.2 | ODS-AS-VN Online data services
45538 | 112.78.6.45 | ODS-AS-VN Online data services
198030 | 91.228.236.4 | SHANTYR Private Entrepreneur Shantyr Yuriy
On Sep 18, 2012, at 21:42 , "Gilmore, Patrick" <patrick at akamai.com> wrote:
> This appears to be against Bank of America.
>
> We're seeing
> * 500-byte and other sized UDP packets filled with "A".
> * Real DNS queries.
> * TCP SYN flood to port 53.
>
> Below are some of the most common source / dest pairs, a packet of As, and a few other smatterings of info. Anything anyone can do to stop this at the source would help. Thanx.
>
> --
> TTFN,
> patrick
>
>
> Destinations:
> ns10.bac.com 96.6.112.196
> ns11.bac.com 184.85.248.67
> ns12.bac.com 193.108.91.121
>
> Top Attackers:
> 58.30.226.145
> 62.133.206.72
> 67.19.27.250
> 67.220.203.242
> 67.222.22.63
> 70.38.17.16
> 74.86.183.201
> 76.162.253.103
> 80.241.247.195
> 80.75.239.69
> 85.128.44.3
> 85.17.231.237
> 91.185.193.184
> 91.207.44.25
> 91.228.236.4
> 93.183.204.25
> 96.30.29.128
> 112.78.2.180
> 112.78.2.2
> 112.78.6.45
> 114.80.245.137
> 116.255.150.136
> 118.186.68.208
> 157.181.21.212
> 159.253.137.106
> 174.120.70.155
> 176.31.245.35
> 178.91.94.6
> 188.165.202.194
> 192.192.155.219
> 200.88.112.60
> 202.181.178.7
> 203.117.178.12
> 205.186.141.33
> 207.7.90.34
> 209.59.234.118
> 209.59.234.118
> 210.51.4.147
> 212.40.65.18
> 212.92.23.213
> 217.31.57.177
> 222.59.180.75
>
> 00:58:59.903927 IP 80.241.247.195.39088 > 96.6.112.196.53: 16705 op8+ [b2&3=0x4141] [16705a] [16705q] [16705n] [16705au][|domain]
> 0x0000: 4508 0587 f82d 4000 2e11 35b1 50f1 f7c3 E....- at ...5.P...
> 0x0010: 6006 70c4 98b0 0035 0573 5bfd 4141 4141 `.p....5.s[.AAAA
> 0x0020: 4141 4141 4141 4141 4141 4141 4141 4141 AAAAAAAAAAAAAAAA
> 0x0030: 4141 4141 4141 4141 4141 4141 4141 4141 AAAAAAAAAAAAAAAA
> 0x0040: 4141 4141 4141 4141 4141 4141 4141 4141 AAAAAAAAAAAAAAAA
> 0x0050: 4141 4141 4141 4141 4141 4141 4141 4141 AAAAAAAAAAAAAAAA
> 0x0060: 4141 4141 4141 4141 4141 4141 4141 4141 AAAAAAAAAAAAAAAA
> 0x0070: 4141 4141 4141 4141 4141 4141 4141 4141 AAAAAAAAAAAAAAAA
> 0x0080: 4141 4141 4141 4141 4141 4141 4141 4141 AAAAAAAAAAAAAAAA
> 0x0090: 4141 4141 4141 4141 4141 4141 4141 4141 AAAAAAAAAAAAAAAA
> 0x00a0: 4141 4141 4141 4141 4141 4141 4141 4141 AAAAAAAAAAAAAAAA
> 0x00b0: 4141 4141 4141 4141 4141 4141 4141 4141 AAAAAAAAAAAAAAAA
> 0x00c0: 4141 4141 4141 4141 4141 4141 4141 4141 AAAAAAAAAAAAAAAA
> 0x00d0: 4141 4141 4141 4141 4141 4141 4141 4141 AAAAAAAAAAAAAAAA
> 0x00e0: 4141 4141 4141 4141 4141 4141 4141 4141 AAAAAAAAAAAAAAAA
> 0x00f0: 4141 4141 4141 4141 4141 4141 4141 4141 AAAAAAAAAAAAAAAA
> 0x0100: 4141 4141 4141 4141 4141 4141 4141 4141 AAAAAAAAAAAAAAAA
> 0x0110: 4141 4141 4141 4141 4141 4141 4141 4141 AAAAAAAAAAAAAAAA
> 0x0120: 4141 4141 4141 4141 4141 4141 4141 4141 AAAAAAAAAAAAAAAA
> 0x0130: 4141 4141 4141 4141 4141 4141 4141 4141 AAAAAAAAAAAAAAAA
> 0x0140: 4141 4141 4141 4141 4141 4141 4141 4141 AAAAAAAAAAAAAAAA
> 0x0150: 4141 4141 4141 4141 4141 4141 4141 4141 AAAAAAAAAAAAAAAA
> 0x0160: 4141 4141 4141 4141 4141 4141 4141 4141 AAAAAAAAAAAAAAAA
> 0x0170: 4141 4141 4141 4141 4141 4141 4141 4141 AAAAAAAAAAAAAAAA
> 0x0180: 4141 4141 4141 4141 4141 4141 4141 4141 AAAAAAAAAAAAAAAA
> 0x0190: 4141 4141 4141 4141 4141 4141 4141 4141 AAAAAAAAAAAAAAAA
> 0x01a0: 4141 4141 4141 4141 4141 4141 4141 4141 AAAAAAAAAAAAAAAA
> 0x01b0: 4141 4141 4141 4141 4141 4141 4141 4141 AAAAAAAAAAAAAAAA
> 0x01c0: 4141 4141 4141 4141 4141 4141 4141 4141 AAAAAAAAAAAAAAAA
> 0x01d0: 4141 4141 4141 4141 4141 4141 4141 4141 AAAAAAAAAAAAAAAA
> 0x01e0: 4141 4141 4141 4141 4141 4141 4141 4141 AAAAAAAAAAAAAAAA
> 0x01f0: 4141 AA
>
> Offset from top of IP packet 0x001c = 0x41414141
>
> dst 96.6.112.196 dst port 53, proto udp, total length > 512
>
> Offset 2=0x0587
>
>
> * Seeing "Unparsed header count wrong" coming from some IP addresses; attack may be attempting to fill the pipe with garbage packets.
> - DNS server: 23.62.229.69
> - Attacking IP: 190.54.12.101: SANTIAGO, CL (ADX_S.A. @ adx.cl AS 6429)
> - 112.78.2.184: TRUONGDINH, VN (Cong_ty_Co_phan_Dich_vu_du_lieu_Truc_tuyen @ vdrs.net AS 45538)
>
More information about the nsp-security
mailing list