[nsp-sec] Cisco customers experiencing grief from 212.73.150.63
Rabbi Rob Thomas
robt at cymru.com
Thu Sep 19 16:49:58 EDT 2019
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Dear Dario,
I agree with Gerard, our sensors show the same. I'm waiting for
another query to complete, but initial results for the past 24-ish
hours show it visiting DE, BH, ES, FR, IN, SA, and BG. Very few of
those visits were to non-responsive targets.
It's an odd one in that this TCP 443 activity is all we see it doing.
It isn't being used as a proxy, visiting other sites on other ports,
etc. Again, that's for the past 24-ish hours.
Possibly more to come!
Be well,
Rob.
On 9/19/19 4:04 PM, White, Gerard wrote:
> ----------- nsp-security Confidential --------
>
> Greetings.
>
> Definitely not port scanning, this /32 is doing "selective" hits...
> appears to be operating on a specific "list" of targets. Makes 2
> attempts per target using 2 sequential TCP sockets.
>
> GW
>
> -----Original Message----- From: nsp-security
> <nsp-security-bounces at puck.nether.net> On Behalf Of Dario Ciccarone
> (dciccaro) Sent: September-19-19 2:08 PM To:
> nsp-security at puck.nether.net Subject: [EXT][nsp-sec] Cisco
> customers experiencing grief from 212.73.150.63
>
> ----------- nsp-security Confidential --------
>
> Folks:
>
> As the subject says – some of our customers are having a hard time
> of it thanks to 212.73.150.63. This IP address is connecting to our
> customers’ ASA devices on port 443/tcp, and triggering CSCvi16029 –
> which was released as part of a Cisco Security Advisory back in
> 2018 -
> https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/
cisco-sa-20180606-asaftd
>
> We have seen a significant spike in crashes in the last two weeks,
> and TAC has been able to track those down to connections from this
> IP address. The vulnerability characteristics are such that we can
> rule out these crash being triggered “by accident” – we are pretty
> sure these connections are either attempts to find Cisco ASA
> devices affected by this vulnerability, OR attempts to exploit a
> similar vulnerability in someone’s else device. But they’re
> certainly not benign.
>
> We have contacted the abuse contact listed in WHOIS
> ('abuse at vpsag.com') but we have NOT YET received an answer to our
> contact attempts. I’m hence reaching out to the nsp-sec
> constituency with two questions :
>
>
> 1. Is this netblock, or this SP, in any way known for hosting
> miscreants ? (and yes, we’re also working w/ TALOS on this) 2.
> Does anyone here have a method to reach out the owner of this
> netblock, which has been tried before and been successful ? Our
> request would be for this activity to stop, or at least, being able
> to talk to whoever is sending these probes to try to make them
> stop. We have seen before similar behavior when universities or
> individuals attempt Internet-wide scans for “something”, and that
> something may end triggering a vulnerability in our devices.
>
> Yes, TAC is indicating customers to deploy ACLs to drop connections
> from this IP address – that still leaves an unknown number of
> customers open to exploitation: those that have not crashed but
> will eventually crash when they get their turn.
>
> Thanks in advance for any help you can provide !
>
> Dario
>
>
>
>
> _______________________________________________ nsp-security
> mailing list nsp-security at puck.nether.net
> https://puck.nether.net/mailman/listinfo/nsp-security
>
> Please do not Forward, CC, or BCC this E-mail outside of the
> nsp-security community. Confidentiality is essential for effective
> Internet security counter-measures.
> _______________________________________________
> ----------------------------------------------------------------------
- --------
>
>
External Email: Please use caution when opening links and attachments /
Courriel externe: Soyez prudent avec les liens et documents joints
>
>
> _______________________________________________ nsp-security
> mailing list nsp-security at puck.nether.net
> https://puck.nether.net/mailman/listinfo/nsp-security
>
> Please do not Forward, CC, or BCC this E-mail outside of the
> nsp-security community. Confidentiality is essential for effective
> Internet security counter-measures.
> _______________________________________________
>
- --
Rabbi Rob Thomas Team Cymru
"It is easy to believe in freedom of speech for those with whom we
agree." - Leo McKern
-----BEGIN PGP SIGNATURE-----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=d5TU
-----END PGP SIGNATURE-----
More information about the nsp-security
mailing list