To report a botnet PRIVATELY please email: [EMAIL PROTECTED]
----------
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

I haven't seen a bot doing this before.  Is there a new SSL
vulnerability that I haven't heard about yet?  Or is it likely this bot
is scanning for the OpenSSL vulnerability that came out a long time ago?

Anyway, the C&C is 64.18.128.86

I'm going to kill the zombie now.  I just thought someone might be able
to shed some light on this.

- --
Mason Schmitt
Systems Administrator
Sunwave Cable Internet / Shuswap Internet Junction
ph: (250) 832-9711
www.sunwave.net
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFFuoLSbip6upg8pq8RAtjvAJ48eIOjD9dHaZ8l9kBS1MaFC+4vhQCfVJ5h
BvKUq1Thc8l1RDFjNtecO34=
=eTup
-----END PGP SIGNATURE-----
_______________________________________________
To report a botnet PRIVATELY please email: [EMAIL PROTECTED]
All list and server information are public and available to law enforcement 
upon request.
http://www.whitestar.linuxbox.org/mailman/listinfo/botnets

Reply via email to