-----Original Message-----
From: [email protected] [mailto:[email protected]] 
Sent: Saturday, November 19, 2011 7:16 AM
To: [email protected]
Cc: [email protected]
Subject: [clean-mx-viruses-1091636](209.190.61.25)-->([email protected]) viruses 
sites (1 so far) within your network, please close them! status: As of 
2011-11-19 13:16:21 CET

Dear abuse team,

please help to close these offending viruses sites(1) so far.

status: As of 2011-11-19 13:16:21 CET
http://support.clean-mx.de/clean-mx/[email protected]&response=alive

(for full uri, please scroll to the right end ... 


We detected many active cases dated back to 2007, so please look at the date 
column below.
You may also subscribe to our MalwareWatch list 
http://lists.clean-mx.com/cgi-bin/mailman/listinfo/viruswatch

This information has been generated out of our comprehensive real time 
database, tracking worldwide viruses URI's

most likely also affected pages for these ip may be found via passive dns 
please have a look on these other domains correlated to these ip
example: see  http://www.bfk.de/bfk_dnslogger.html?query=209.190.61.25 

If your review this list of offending site, please do this carefully, pay 
attention for redirects also!
Also, please consider this particular machines may have a root kit installed !
So simply deleting some files or dirs or disabling cgi may not really solve the 
issue !

Advice: The appearance of a Virus Site on a server means that someone intruded 
into the system. The server's owner should disconnect and not return the system 
into service until an audit is performed to ensure no data was lost, that all 
OS and internet software is up to date with the latest security fixes, and that 
any backdoors and other exploits left by the intruders are closed. Logs should 
be preserved and analyzed and, perhaps, the appropriate law enforcement 
agencies notified.

DO NOT JUST DELETE THE FILES. IF YOU DO NOT FIX THE SECURITY PROBLEM, THEY WILL 
BE BACK!

You may forward my information to law enforcement, CERTs, other responsible 
admins, or similar agencies.

+-----------------------------------------------------------------------
+------------------------

|date                           |id     |virusname      |ip             |domain 
        |Url|
+-----------------------------------------------------------------------
+------------------------
|2011-11-19 13:00:20 CET        |1091636        |HTML/Crypted.Gen       
|209.190.61.25  |latestfashionstrends.com       
|http://latestfashionstrends.com/wp-includes/js/jquery.js
+-----------------------------------------------------------------------
+------------------------


Your email address has been pulled out of whois concerning this offending 
network block(s).
If you are not concerned with anti-fraud measurements, please forward this mail 
to the next responsible desk available...


If you just close(d) these incident(s) please give us a feedback, our automatic 
walker process may not detect a closed case

explanation of virusnames:
==========================
unknown_html_RFI_php    not yet detected by scanners as RFI, but pure php code 
for injection
unknown_html_RFI_perl   not yet detected by scanners as RFI, but pure perl code 
for injection
unknown_html_RFI_eval   not yet detected by scanners as RFI, but suspect 
javascript obfuscationg evals
unknown_html_RFI        not yet detected by scanners as RFI, but trapped by our 
honeypots as remote-code-injection
unknown_html    not yet detected by scanners as RFI, but suspious, may be in 
rare case false positive
unknown_exe     not yet detected by scanners as malware, but high risk!
all other names malwarename detected by scanners
==========================


yours

Gerhard W. Recher
(Geschäftsführer)

NETpilot GmbH

Wilhelm-Riehl-Str. 13
D-80687 München

GSM: ++49 171 4802507

Handelsregister München: HRB 124497

w3: http://www.clean-mx.de
e-Mail:   mailto:[email protected]
PGP-KEY:   Fingerprint: A4E317B6DC6494DCC9616366A75AB34CDD0CE552 id: 0xDD0CE552
Location: http://www.clean-mx.de/downloads/abuse-at-clean-mx.de.pub.asc

Attachment: signature.asc
Description: signature.asc

_______________________________________________
Users mailing list
[email protected]
http://lists.policyd.org/mailman/listinfo/users

Reply via email to