you brought a known-infected laptop into your office and plugged it into
your LAN?  uhhh... okay.....

http://www.dban.org/

the port 443 connection is probably command and control for some variety of
rootkit/APT.



On Tue, Feb 9, 2016 at 10:00 AM, Glen Waldrop <gwl...@cngwireless.net>
wrote:

> I’ve got a customer with a bugged laptop. Not biggie, sending spam.
>
> I haven’t quite tracked that down yet, looks like it is logging into a
> remote server on 443, nothing obvious.
>
> What I’ve noticed that brought me to bring this to the list is that it is
> currently 192.168.0.50 on my office network, probing 192.168.1.4 through 6
> on SNMP (doesn’t exist on my network, only on my sandbox that this laptop
> can’t see at all, nothing has been on my sandbox in weeks), also pinging my
> edge, though not my local edge, my network edge on it’s internal IP of
> 10.0.11.1.
>
> The customer’s IP address is on the 10.0.22.0/24 subnet, two hops to
> 10.0.11.0/24. At my office it is two hops from 192.168.0.0/24 to
> 10.0.11.1.
>
> If it was some form of a hack you’d figured they’d go by my public IP,
> though I suppose they’re looking for the possibility of not being secured
> on the inside.
>
> Just throwing this out there, looked interesting and weird to me.
>
>

Reply via email to