To report a botnet PRIVATELY please email: [EMAIL PROTECTED]
----------
On 10/6/07, James Pleger <[EMAIL PROTECTED]> wrote:
> To report a botnet PRIVATELY please email: [EMAIL PROTECTED]
> ----------
> This looks like standard ftp bruteforcing...
>
> Typical targets of this attacks are MS FTP Servers, they will target
> the administrator account, so they can get that account password, and
> then upload files and execute them, or otherwise compromise the box.
>
> I have seen this activity for many years, and more likely than not
> isn't a targeted attack.
>
> On 10/6/07, Peter Dambier <[EMAIL PROTECTED]> wrote:
> > To report a botnet PRIVATELY please email: [EMAIL PROTECTED]
> > ----------
> > Good morning,
> >
> > I have put the logs from my mailer and ftp-server
> > together with my router and VoIP:
> >
> > Oct 5 12:09:34 voipd[406]: query_local_ipaddress: 62.227.220.143
> >
> > netdate("Oct-5","23:38:06","time3 +0.234 Fri Oct 5
> > 23:38:03.000").
> > xinetd_open("Oct-6","00:31:58","ftp","203.112.196.130").
> > ftp_connect("Oct-6","00:32:02","203.112.196.130").
> > ftp_complained("([EMAIL PROTECTED]) [WARNING] Authentication failed for
> > user [Administrator]","Oct-6","00:32:03").
> > ftp_complained("([EMAIL PROTECTED]) [ERROR] Too many authentication
> > failures","Oct-6","00:33:00").
> > xinetd_close("Oct-6","00:33:00","ftp").
> > xinetd_open("Oct-6","00:33:00","ftp","203.112.196.130").
> > ftp_connect("Oct-6","00:33:01","203.112.196.130").
> > ftp_complained("([EMAIL PROTECTED]) [WARNING] Authentication failed for
> > user [Administrator]","Oct-6","00:33:02").
> > ftp_complained("([EMAIL PROTECTED]) [WARNING] Authentication failed for
> > user [Administrator]","Oct-6","00:33:06").
> > ftp_complained("([EMAIL PROTECTED]) [WARNING] Authentication failed for
> > user [Administrator]","Oct-6","00:33:13").
> > ftp_complained("([EMAIL PROTECTED]) [ERROR] Too many authentication
> > failures","Oct-6","00:33:53").
> > xinetd_close("Oct-6","00:33:53","ftp").
> > xinetd_open("Oct-6","00:33:54","ftp","203.112.196.130").
> > ...
> > xinetd_close("Oct-6","03:06:22","ftp").
> > xinetd_open("Oct-6","03:06:23","ftp","203.112.196.130").
> > ftp_connect("Oct-6","03:06:33","203.112.196.130").
> > ftp_complained("([EMAIL PROTECTED]) [WARNING] Authentication failed for
> > user [Administrator]","Oct-6","03:06:34").
> > ftp_complained("([EMAIL PROTECTED]) [WARNING] Authentication failed for
> > user [Administrator]","Oct-6","03:07:20").
> > ftp_complained("([EMAIL PROTECTED]) [ERROR] Too many authentication
> > failures","Oct-6","03:07:36").
> > xinetd_close("Oct-6","03:07:36","ftp").
> >
> >
> > Oct 6 03:08:22 dsld[381]: EVENT(80): Die Internetverbindung wird kurz
> > unterbrochen, um der Zwangstrennung durch den Anbieter zuvorzukommen.
> > Oct 6 03:08:23 dsld[381]: Channel 0 closed (physical)
> > Oct 6 03:08:23 dsld[381]: internet: disconnected
> > Oct 6 03:08:23 dsld[381]: EVENT(23): Internetverbindung wurde getrennt.
> > Oct 6 03:08:24 multid[360]: ONLINE: now offline
> > Oct 6 03:08:24 voipd[406]: connstatus 5 -> 3
> > Oct 6 03:08:24 dsld[381]: internet: connecting
> > Oct 6 03:08:24 dsld[381]: internet: 00:04:0e:6d:8a:43
> > Oct 6 03:08:24 dsld[381]: internet: 00:04:0e:6d:8a:43
> > Oct 6 03:08:24 dsld[381]: PPP led: off (value=0)
> > Oct 6 03:08:24 dsld[381]: Channel 0 up (physical outgoing)
> > Oct 6 03:08:25 voipd[406]: connstatus 3 -> 4
> > Oct 6 03:08:25 dsld[381]: internet: set_snd_ipaddr: 62.227.245.7
> > Oct 6 03:08:25 dsld[381]: internet: connected
> > Oct 6 03:08:25 dsld[381]: PPP led: on (value=1)
> > Oct 6 03:08:25 dsld[381]: EVENT(22): Internetverbindung wurde erfolgreich
> > hergestellt. IP-Adresse: 62.227.245.7, DNS-Server: 217.237.150.51 und
> > 217.237.148.22, Gateway: 217.0.116.228
> > Oct 6 03:08:26 multid[360]: DDNS: echnaton.serveftp.com: checking ip
> > address
> > Oct 6 03:08:26 multid[360]: dns: echnaton.serveftp.com: query
> > Oct 6 03:08:26 multid[360]: ONLINE: now online 62.227.245.7
> > Oct 6 03:08:26 voipd[406]: connstatus 4 -> 5
> >
> >
> > netdate("Oct-6","03:38:05","time3 +0.290 Sat Oct 6
> > 03:38:02.000").
> > netdate("Oct-6","04:38:04","time3 -0.754 Sat Oct 6
> > 04:38:01.000").
> > xinetd_open("Oct-6","04:47:21","ftp","203.112.196.130").
> > ftp_connect("Oct-6","04:47:22","203.112.196.130").
> > ftp_complained("([EMAIL PROTECTED]) [WARNING] Authentication failed for
> > user [Administrator]","Oct-6","04:47:22").
> > ftp_complained("([EMAIL PROTECTED]) [WARNING] Authentication failed for
> > user [Administrator]","Oct-6","04:48:10").
> > ftp_complained("([EMAIL PROTECTED]) [ERROR] Too many authentication
> > failures","Oct-6","04:48:28").
> > xinetd_close("Oct-6","04:48:28","ftp").
> > xinetd_open("Oct-6","04:48:31","ftp","203.112.196.130").
> > ...
> > xinetd_close("Oct-6","04:56:37","ftp").
> > xinetd_open("Oct-6","04:56:41","ftp","203.112.196.130").
> > ftp_connect("Oct-6","04:56:45","203.112.196.130").
> > ftp_complained("([EMAIL PROTECTED]) [WARNING] Authentication failed for
> > user [Administrator]","Oct-6","04:56:46").
> > ftp_complained("([EMAIL PROTECTED]) [ERROR] Too many authentication
> > failures","Oct-6","04:57:40").
> > xinetd_close("Oct-6","04:57:40","ftp").
> > netdate("Oct-6","05:38:05","time3 +0.251 Sat Oct 6
> > 05:38:02.000").
> >
> >
> > Interestingly enough the attack survived a DSL disconnect
> > and reconnect with changed IPv4 address.
> >
> > The hole of 90 minutes suggests they did not follow me via DNS or SIP.
> >
> > they only tried user [Administrator].
> >
> > nmap says they have no ports open. I did not try the complicated things :)
> >
> >
> > Nothing suspicious in the exim (mailer) log.
> > No other addresses seen.
> >
> > Kind regards
> > Peter and Karin
> >
> > --
> > Peter and Karin Dambier
> > Cesidian Root - Radice Cesidiana
> > Rimbacher Strasse 16
> > D-69509 Moerlenbach-Bonsweiher
> > +49(6209)795-816 (Telekom)
> > +49(6252)750-308 (VoIP: sipgate.de)
> > mail: [EMAIL PROTECTED]
> > mail: [EMAIL PROTECTED]
> > http://iason.site.voila.fr/
> > https://sourceforge.net/projects/iason/
> > http://www.cesidianroot.com/
> >
I think there is probably some truth in the middle of both of your posts.
I have an FTP server at work and at home, and I read the logs pretty
regularly. I see automated scans daily, all using dictionary attacks,
with very similar patterns, enough to suggest that although they are
"only" brute force, they could certainly be automated from a bot
source. All use the exact same dictionary, and are from such disparate
IP sources the theory is an interesting one. They could also be from
an obvious single source, a hacker brute force IP scanning utility,
but since I dont use such things Im not certain.
some examples:
193.34.150.54 Administrator abc123 Bad username and/or password
193.34.150.54 Administrator password Bad username and/or password
193.34.150.54 Administrator passwd Bad username and/or password
host-193-34-150-54.vlan8.argeweb.nl. (netherlands)
60.191.20.228 Administrator abc123 Bad username and/or password
60.191.20.228 Administrator password Bad username and/or password
60.191.20.228 Administrator passwd Bad username and/or password
ns.zjnbptt.net.cn Hangzhou, Zhejiang (China)
221.2.236.42 Administrator abc123 Bad username and/or password
221.2.236.42 Administrator password Bad username and/or password
221.2.236.42 Administrator passwd Bad username and/or password
Also China, but Dongying, Hebei
202.82.18.193 Administrator abc123 Bad username and/or password
202.82.18.193 Administrator password Bad username and/or password
202.82.18.193 Administrator passwd Bad username and/or password
Hong Kong
212.123.8.83 Administrator abc123 Bad username and/or password
212.123.8.83 Administrator password Bad username and/or password
212.123.8.83 Administrator passwd Bad username and/or password
Belgium
I found the origin of the dictionary file they are using simply
because almost all of them start trying passwords with the text from
the dictionary source (laziness?)
as you see here:
140.112.101.41 Administrator been Bad username and/or password
140.112.101.41 Administrator compiled Bad username and/or password
140.112.101.41 Administrator by Bad username and/or password
140.112.101.41 Administrator Solar Bad username and/or password
140.112.101.41 Administrator Designer Bad username and/or password
140.112.101.41 Administrator of
Solar Designer wrote "john the ripper" the password cracker, which of
course comes with a dictionary.
dvsjr
_______________________________________________
To report a botnet PRIVATELY please email: [EMAIL PROTECTED]
All list and server information are public and available to law enforcement
upon request.
http://www.whitestar.linuxbox.org/mailman/listinfo/botnets