To report a botnet PRIVATELY please email: [EMAIL PROTECTED]
----------





Which hosting company? (hopefully not mine)

 

I have a few contacts…

 

 

++++++++++++++++++

Marcel Chastain

Security Administration

iPower, Inc.

 

 

-----Original Message-----
From: David Leinbach [mailto:[EMAIL PROTECTED]
Sent:
Friday, April 14, 2006 1:54 PM
To: [email protected]
Subject: [botnets] Perl-Based Botnet

 

This one seems to be propegating using a vulnerability in the <a href="" href="http://www.horde.org/" target="_blank" >http://www.horde.org/">Horde</a> framework <= 3.0.9, 3.1.0 as detailed at <a href="" http://www.milw0rm.com/exploits/1660"> http://www.milw0rm.com/exploits/1660</a>.  It causes the web server to download a perl script and run it.  The script connects to the following IRC server and listens.  I modified the bot to output what is happening and not to actually execute any of the malicious commands but have not observed any malicious acts yet.

Server: 81.3.28.133
Port: 4444
Channel: #hor
Nick: hor-${PID}

The admins seem to be "spart" and "hacked".  I also observed a copy of the script that connects to 209.59.131.211 instead but was not able to connect to that one myself.

I have contacted the web host that is hosting the perl scripts and alerted them to it.  I have not heard back yet.

David

Which hosting company? (hopefully not mine)

 

I have a few contacts…

 

 

++++++++++++++++++

Marcel Chastain

Security Administration

iPower, Inc.

 

 

-----Original Message-----
From: David Leinbach [mailto:[EMAIL PROTECTED]
Sent:
Friday, April 14, 2006 1:54 PM
To: [email protected]
Subject: [botnets] Perl-Based Botnet

 

This one seems to be propegating using a vulnerability in the <a href="" href="http://www.horde.org/" target="_blank" >http://www.horde.org/">Horde</a> framework <= 3.0.9, 3.1.0 as detailed at <a href="" http://www.milw0rm.com/exploits/1660"> http://www.milw0rm.com/exploits/1660</a>.  It causes the web server to download a perl script and run it.  The script connects to the following IRC server and listens.  I modified the bot to output what is happening and not to actually execute any of the malicious commands but have not observed any malicious acts yet.

Server: 81.3.28.133
Port: 4444
Channel: #hor
Nick: hor-${PID}

The admins seem to be "spart" and "hacked".  I also observed a copy of the script that connects to 209.59.131.211 instead but was not able to connect to that one myself.

I have contacted the web host that is hosting the perl scripts and alerted them to it.  I have not heard back yet.

David

Attachment: PGPexch.htm.asc
Description: PGP signature

_______________________________________________
To report a botnet PRIVATELY please email: [EMAIL PROTECTED]
All list and server information are public and available to law enforcement 
upon request.
http://www.whitestar.linuxbox.org/mailman/listinfo/botnets

Reply via email to