[nsp-sec] >37,000 Drone large botnet
Phil Rosenthal
pr at isprime.com
Wed Mar 6 20:54:38 EST 2013
Hello all,
We've got a DDoS going against one of our customers at this time.
*We are having no problem filtering the attack within our network, so please DO NOT blackhole anything on ISPrime's network.*
We are posting this merely to help the community eliminate a large and dangerous botnet.
This Botnet seems to be very intelligent/adaptive.
We have discovered that the attack stops when we kill the webserver on the victim IP, but quickly starts back up again after restarting the webserver, and further that when we have filters in place to mitigate the attack, it levels out to only about 1Gbps (just to be annoying I guess?), but when the filters are removed, the attack increases to larger than 16Gbps.
The source IP's of the attack seem to be slowly rolling through a huge list, so each drone seems to remain idle for several minutes at a time, while others are carrying on the attack -- i assume to minimize disruption to the attack source networks and minimize the risk of detection.
Also interesting is the huge number of IP addresses in 2.0.0.0/8 3.0.0.0/8 and 4.0.0.0/8. Initially we believed the attack to be spoofed, but because of the high frequency of specific /32's within those /8's, we now believe that the attack is not spoofed (but would love evidence to the contrary).
Attached to this email is a list of all IP's we have detected so far (though we know there are more IP's we have not yet detected due to this rolling nature). Perhaps we will post a follow-up later on if we are able to detect signifigant new IP addresses.
We would love commentary from responsible parties for the below ASN's to confirm that you do in fact see attack behavior.
The attack is TCP/80 SYN (varying sizes, 40, 44, and also some >1000 byte syn packets) , UDP/80
Victim IP is 64.111.213.29
Since we have effectively filtered the attack, we are seeing the attack only very sporadically now -- approximately 20 seconds every 5 minutes, so you would probably have to look at historical graphs for this anomaly.
The list of ASN's we see in this attack are (first number is number of hits, second number is ASN, sorted from most to least):
Hits ASN
15780 3215
7398 12576
4466 30722
1775 44957
979 3257
725 80
370 20940
329 31377
324 44034
301 3320
292 1273
288 29355
266 5607
254 3356
239 5384
238 1299
232 41440
221 12400
197 13285
193 5511
161 6762
156 3269
151 12874
144 3292
130 4436
113 25019
111 3243
110 4837
109 4134
100 6799
85 12880
72 3301
68 286
64 8402
61 NA
54 12638
52 3549
47 3209
46 16232
44 44178
40 16625
29 44244
28 9158
26 9198
26 3352
23 21788
21 48159
20 2119
17 3216
17 24608
16 6739
16 34164
12 9808
9 4812
8 4847
7 8997
7 4808
6 58313
6 56465
6 4538
6 15600
5 9318
5 4766
5 20825
5 197043
4 50810
4 38283
4 3786
4 35819
4 12222
3 9394
3 8966
3 719
3 6939
3 42689
3 35805
3 29247
3 24445
3 23650
3 17621
3 12683
2 9803
2 6813
2 56046
2 56041
2 5410
2 49687
2 45899
2 44050
2 40676
2 37943
2 35908
2 29761
2 29691
2 29286
2 28802
2 2856
2 24400
2 24085
2 20454
2 18450
2 18403
2 17816
2 17638
2 12332
1 Bulk
1 9845
1 9801
1 9272
1 9116
1 8708
1 8473
1 7643
1 7506
1 7018
1 61408
1 59703
1 59581
1 59441
1 59395
1 58688
1 58450
1 58243
1 57858
1 56047
1 56005
1 53845
1 51430
1 5089
1 50512
1 4835
1 4802
1 4788
1 47764
1 4760
1 47206
1 4645
1 45668
1 45528
1 45223
1 44574
1 42337
1 39906
1 39603
1 39020
1 38248
1 37986
1 37963
1 3790
1 36351
1 35662
1 35193
1 3491
1 34296
1 33934
1 33070
1 32613
1 3261
1 31721
1 31200
1 30217
1 30058
1 29456
1 28719
1 26464
1 25653
1 25233
1 25160
1 25151
1 24863
1 24530
1 24453
1 23974
1 23771
1 21844
1 21243
1 20978
1 20853
1 198885
1 18978
1 18881
1 18429
1 17974
1 17820
1 17672
1 17557
1 17547
1 17501
1 17444
1 16397
1 16276
1 15003
1 13768
1 132510
1 131353
1 10938
1 10029
1 10026
-------------- next part --------------
A non-text attachment was scrubbed...
Name: 37kbotnet-march-6-2013
Type: application/octet-stream
Size: 4276578 bytes
Desc: not available
URL: <https://puck.nether.net/mailman/private/nsp-security/attachments/20130306/20593a1f/attachment-0001.obj>
More information about the nsp-security
mailing list