"Erik van Straten" <[EMAIL PROTECTED]> wrote: > I've observed a rapid increase in 3127/tcp scans from seemingly > random IP's. They're sequentially scanning our IP's, bottom-up.
As have many others: http://www.dshield.org/port_report.php?port=3127 > These seem to match Kasperky's Doomjuice (published ~ 3 hours ago): > http://www.viruslist.com/eng/alert.html?id=930701 > > Details, incl. address generation algorithm: > http://www.viruslist.com/eng/viruslist.html?id=930677 > > Supposedly it also causes a DDoS agains Microsoft. > > Note that this one seems to differ from Symantec's Deadhat: > http://sarc.com/avcenter/venc/data/w32.hllw.deadhat.html > > According to Symantec's description, Deadhat scans 3127/tcp, 3128/tcp > and 1080/tcp (I've seen one or two of those). Yes -- Deadhat (more correctly known as Vesser) was found late Friday or early Saturday (depending on your TZ) but this new one, DoomJuice, (incorrectly originally classified as a Mydoom variant and thus called Mydoom.C by some) has only been isolated and analysed in the last few hours... -- Nick FitzGerald Computer Virus Consulting Ltd. Ph/FAX: +64 3 3529854 _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
