Re: [botnets] Capital One Bank News - Read About the Latest updates(fwd)

2008-08-29 Thread Michael Molsner
Hello, Here some more of those: hxxp://demurf.com/login.html hxxp://dexoim.com/login.html hxxp://himmdea.com/login.html hxxp://hunerim.com/login.html hxxp://jerrrood.com/login.html hxxp://jimmedy.com/login.html hxxp://jioece.com/login.html hxxp://jioeres.com/login.html

[botnets] Malware-links-290808

2008-08-29 Thread Michael Molsner
Hello, Following links were alive at time of check (Fri Aug 29 07:12:41 UTC) hx xp://87.229.108.47/index100.html hx xp://87.229.108.47/video66.exe hx xp://alderechoyalreves.com/adm/adn.php hx xp://alderechoyalreves.com/adm/l/link.php hx xp://atecnic.com/adm/adn.php hx

Re: [botnets] [EMAIL PROTECTED]: URL formats]

2008-08-29 Thread Paul Herring
On Fri, Aug 29, 2008 at 6:04 AM, T Biehn [EMAIL PROTECTED] wrote: Heartily Disagree, Standards are (usually) parse-friendly. I really don't feel like inventing some new indicator for your scripts of dubious worth. They aren't meant to be indicators. Any scripts (I imagine - I don't have any

Re: [botnets] [URL formats]

2008-08-29 Thread David Harley
I tend to use hxxp[s]:// -and- some random spaces. Substituting for the xx's and stripping the spaces isn't usually going to be a problem for scripting. -- David Harley BA CISSP FBCS CITP Director of Malware Intelligence ESET LLC I think it's better to add some SPACEes in the URL, kind of

[botnets] URL format thread killed: back to scheduled programming

2008-08-29 Thread Gadi Evron
When a proposal on the subject is created, it will be shared with all of you. For now... we are here to share, so let's share. Gadi. ___ botnets@, the public's dumping ground for maliciousness All list and server information are public and

Re: [botnets] [phishing] XP update phish/malware

2008-08-29 Thread Michael Molsner
- Original Message - H -- if the collective we thinks 12 hours is a quick response time for this sort of thing, it's no wonder we're losing so badly... The 'sort of thing' in the mentioned case were 'just' redirecting spam.Takedown was _anywhere_ within 12 h, no exact tracking

Re: [botnets] URL formats -blacklist=censorship

2008-08-29 Thread Dave Ellingsberg
Tell me how this works for a large site that has one piece of malware! badhost.com contains every wiki ever written and cause badguys.com slipped on SQL trick in and redirect then we should block everything in badhost.com. Does not work this way in an edu domain, somebody will cry academic

Re: [botnets] botnets Digest, Vol 26, Issue 7

2008-08-29 Thread Big R
-- Message: 1 Date: Thu, 28 Aug 2008 7:59:35 -0700 From: Steven Adair [EMAIL PROTECTED] Subject: Re: [botnets] [phishing] XP update phish/malware To: Discini, Sonny [EMAIL PROTECTED] Cc: [EMAIL PROTECTED], Steve Pirk

[botnets] danmec download point

2008-08-29 Thread Brack o'Malley
I harvested 1700 sql injection attempts by danmec related infectors. targets included 200 exposed honeypots (er, oops , I mean client maintained servers) dispersed across widely varied address ranges. In every case this URL was the download point: http://www0.douhunqn.cn/csrss/w.js brack

Re: [botnets] URL formats -blacklist=censorship

2008-08-29 Thread Johannes Ullrich
May I remind everybody that the purpose of this list is to share information. What you do with this information is up to you (more or less). If you use it as a blacklist: fine, I hope you know what you are doing... On Fri, Aug 29, 2008 at 10:09 AM, [EMAIL PROTECTED] wrote: Tell me how this

Re: [botnets] [URL formats]

2008-08-29 Thread David Harley
Well, if it's really a problem, the spaces don't have to be random, but it shouldn't be difficult in most scripting languages to strip spaces in a string that shouldn't contain any spaces. -- David Harley BA CISSP FBCS CITP Director of Malware Intelligence ESET LLC -Original Message-

Re: [botnets] [URL formats]

2008-08-29 Thread freed0
Spaces suck because they are never in the same place and then you cannot really easily automate the import process into whatever system you may have that would work on it. I think that the hxxp[x] solution is an easy and fine one that it easy for everyone to use. Using any other type of

Re: [botnets] URL formats -blacklist=censorship

2008-08-29 Thread John C. A. Bambenek, GCIH, CISSP
I work in an edu (for a couple more weeks at least), we'll block hacked wikis. Why? Because we understand that giving people a platform for attack just isn't good policy. We need not have the internet controlled by the bottom-feeders out of some ridiculous fear of censorship or hindering

[botnets] Malware hosting site

2008-08-29 Thread Dean De Beer
This site appears to be run by the authors to host their malware. It's been around for a long time now. I track it on and off to see if they add any new exploits. Since it's inception they have refined the code and exploits. I've been looking at it for about 8 months on and off but I think it's

[botnets] nepethes / honeypot dump list: volunteers and instructions

2008-08-29 Thread Gadi Evron
Hi all. The honey pot dump mailing list is ready. Point your servers to report to; [EMAIL PROTECTED] To get us started I am quoting Jeremy, who came up with the idea of us pointing our nepethes sensors to a mailing list. He is providing with simple instructions on how to get started using

Re: [botnets] danmec download point

2008-08-29 Thread Joe Stewart
On Friday 29 August 2008, Brack o'Malley wrote: I harvested 1700 sql injection attempts by danmec related infectors. targets included 200 exposed honeypots (er, oops , I mean client maintained servers) dispersed across widely varied address ranges. In every case this URL was the download

[botnets] Malware hosting site

2008-08-29 Thread Dean De Beer
Resend. Not sure if the last email went through. This site appears to be run by the authors to host their malware. It's been around for a long time now. I track it on and off to see if they add any new exploits. Since it's inception they have refined the code and exploits. I've been looking at it

[botnets] Washington Post: Atrivo/Intercage, why are we peering with the American RBN?

2008-08-29 Thread Gadi Evron
This Washington Post story came out today: http://voices.washingtonpost.com/securityfix/2008/08/report_slams_us_host_as_major.html I have some thoughts relating more to network operations, but some of you may be interested in following up on this. In the story, Brian Krebs discusses the SF