<< Also, I'd like to explore the possibility of reporting compromised people to 
their ISPs. >>

Well good luck ;)

As I posted earlier, we have been hit by over 200,000 attack attempts over the 
past 2 days.

Here's the analysis from our last 195,264 attack attempts:

Our attacks over the past *24 hours* have originated from *12,007* different IP 
addresses.  Twelve THOUSAND.  That is not a typo.   This is an extremely large 
botnet, pure and simple.   These IP addresses appaer to be largely random folks 
who are using browsers with vulnerabilities.   

Each client, on average, makes 2-4 attack requests.

Here are the origin IPs with the most attacks:

| ip              | attacks | tmp1 | tmp2 |
+-----------------+-------+----------+----------+
| 203.160.1.40    |  1246 |     NULL |     NULL |
| 203.160.1.70    |   596 |     NULL |     NULL |
| 61.164.132.230  |   478 |     NULL |     NULL |
| 211.72.233.9    |   471 |     NULL |     NULL |
| 203.162.3.159   |   462 |     NULL |     NULL |
| 211.72.233.8    |   452 |     NULL |     NULL |
| 211.72.233.10   |   429 |     NULL |     NULL |
| 221.253.217.138 |   319 |     NULL |     NULL |
| 210.112.177.244 |   252 |     NULL |     NULL |
| 59.15.212.125   |   252 |     NULL |     NULL |
| 70.88.218.70    |   240 |     NULL |     NULL |
| 67.86.134.184   |   234 |     NULL |     NULL |
| 125.107.109.47  |   231 |     NULL |     NULL |
| 202.92.190.172  |   225 |     NULL |     NULL |
| 59.114.123.73   |   224 |     NULL |     NULL |
| 12.215.231.131  |   218 |     NULL |     NULL |
| 68.193.151.157  |   200 |     NULL |     NULL |
| 98.28.106.213   |   200 |     NULL |     NULL |
| 122.118.202.29  |   198 |     NULL |     NULL |
| 67.184.18.83    |   196 |     NULL |     NULL |

There have been fewer than 5 attacks from each of 4515 different IPs.

So for those of you trying to stop this sort of thing by blocking IP addresses, 
don't bother.   

Some of those 203.* and 211.* addresses look suspicious, and perhaps are part 
of the botnet control, but who knows...

I have the complete list of 12,000 IP addresses (and counting at the rate of 
500+ new IP addresses each hour) of this botnet available if that's of any use 
to anyone.

Regards


--- On Fri, 8/8/08, Brad Wood <[EMAIL PROTECTED]> wrote:

> From: Brad Wood <[EMAIL PROTECTED]>
> Subject: Re: SQL injection attack on House of Fusion
> To: "CF-Talk" <cf-talk@houseoffusion.com>
> Date: Friday, August 8, 2008, 4:25 PM
> Yeah, I'm well aware of the near impossibility of ever
> tracking IP address 
> to anything useful, but I'm a person who likes data,
> for within mounds of 
> useless data can be found trends.  Most of all, I'm
> just curious.  Also, I'd 
> like to explore the possibility of reporting compromised
> people to their 
> ISPs.  Some US ISPs do have abuse policies that might cause
> them to pressure 
> their users to clean themselves.  A number of these attacks
> could have come 
> from servers for all we know.  Servers are desirable for
> Trojans due to 
> their fast internet connections and 24/7 uptime.
> 
> ~Brad
> 
> ----- Original Message ----- 
> From: "Andy Matthews"
> <[EMAIL PROTECTED]>
> To: "CF-Talk" <cf-talk@houseoffusion.com>
> Sent: Friday, August 08, 2008 3:00 PM
> Subject: RE: SQL injection attack on House of Fusion
> 
> 
> > blocking the IPs would probably stop the attacks, but
> analyzing them is
> > going to be useless. They're either using some
> hacked computer as a proxy,
> > or have some sort of spoofing in place. Unless
> you're really good at
> > forensics, you'll never find their real
> origination point.
> 
> 
> 

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~|
Adobe® ColdFusion® 8 software 8 is the most important and dramatic release to 
date
Get the Free Trial
http://ad.doubleclick.net/clk;203748912;27390454;j

Archive: 
http://www.houseoffusion.com/groups/CF-Talk/message.cfm/messageid:310572
Subscription: http://www.houseoffusion.com/groups/CF-Talk/subscribe.cfm
Unsubscribe: http://www.houseoffusion.com/cf_lists/unsubscribe.cfm?user=89.70.4

Reply via email to