UDP port 4000 traffic: likely a new worm

2004-03-20 Thread Johannes B. Ullrich
Looks like there may be a worm going around hitting systems that run
BlackIce. Common characteristics of the packets: Source port 4000 (but
random target port) and the string 
"insert witty message here".

details will be posted here:
http://isc.sans.org/diary.html
as I get them together.


-- 
CTO SANS Internet Storm Center   http://isc.sans.org
phone: (617) 837 2807  [EMAIL PROTECTED] 

contact details: http://johannes.homepc.org/contact.htm


signature.asc
Description: This is a digitally signed message part


popupad spam wrapup.

2003-12-04 Thread Johannes B. Ullrich
Thanks everyone here on this list who helped track down this!
We just published a (hopefully more or less final) "Diary" on 
this topic at http://isc.sans.org/diary.html (see below for text).

As it turns out, at least one particular version of the software
distributed by PopAdStop.com did include a Trojan component sending
out popup spam.

-
   
 
  For over a week, we had been tracking an increase in port 1026-1031
UDP traffic. More detailed investigation revealed a component in this
traffic with the following characteristics:
   

(*) The payload consisted of two zero bytes
(*) A large number of sources participated in these scans
(*) the scans came from valid IPs, and the source port did not appear 
to be crafted.
   

   This is different from most popup spam sent to this port. Most popup
spam is sent by only a small number of sources. And usually uses a fixed
source port.

   While popup spam in itself is not any more dangerous then e-mail
spam, and more of an annoyance, the large number of sources hinted to
the fact that it is likely sent from unsuspecting exploited systems
("Zombies").

   The connection with popup spam was made later, by allowing a honeypot
to respond to the two byte probe. The result was an ad sent by the
probing host.

PACKET DUMP (IP Addresses are obfuscated)

11:57:11.361783 IP w.x.y.z.1974 > a.b.c.d.1030: udp 2
0x   4500 001e c33d  6a11 8094 wwxx yyzz[EMAIL PROTECTED]
0x0010   aabb ccdd 07b6 0406 000a e720  
0x0020          ..
11:57:11.363913 IP 129.170.248.252.1030 > w.x.y.z.1974: udp 84
0x   4500 0070 0169  8011 2c17 aabb ccddE..p.i,.
0x0010   wwxx yyzz 0406 07b6 005c aa23 0406 [EMAIL PROTECTED]
0x0020   1000       
0x0030          
0x0040          
0x0050     52f7 c93f    R..?
0x0060      0400   0800 001c
11:57:11.477413 IP w.x.y.z.1975 > 129.170.248.252.1026: udp 519
0x   4500 0223 c350  6a11 7e7c wwxx yyzzE..#.P..j.~|[EMAIL PROTECTED]
0x0010   aabb ccdd 07b7 0402 020f 43b2 0400 0800..C.
0x0020   1000       
0x0030     f891 7b5a 00ff d011 a9b2 00c0..{Z
0x0040   4fb6 e6fc 82f5 b0ec e32c 41ec 173c 5a07O,A..http://www.neweststuff.com/versinfo.dat .
Recent version of the application do not show any further outbound
traffic.

However, earlier version of the application did start to send the
typical two zero bytes and popup spam. We have been made available
the following trace from an infected system:

1. connection to popadstop.com, port 80 (http)

e.f.g.h 066.225.219.162 6 1485 80 88472 4249 17:27:21.5791
e.f.g.h 066.225.219.162 6 1486 80 15401 1203 17:27:27.9025
e.f.g.h 066.225.219.162 6 1489 80 4802 1159 17:28:16.9154
e.f.g.h 066.225.219.162 6 1490 80 1331056 25025 17:28:41.2205 
e.f.g.h 066.225.219.162 6 1491 80 824 408 17:29:20.3522

2. connection to neweststuff.com, port 80 (http)
e.f.g.h 216.058.174.211 6 1492 80 746 410 17:29:20.4347
(snip one min)

3. scanning for port 1026-1030

e.f.g.h x.x.x.x 17 1528 1026 0 44 17:30:20.0967
e.f.g.h x.x.x.x 17 1529 1030 0 44 17:30:20.0979 
e.f.g.h y.y.y.y 17 1528 1026 0 44 17:30:20.1787 
e.f.g.h y.y.y.y 17 1529 1030 0 44 17:30:20.1790 

Summary
---

An earlier version of the software distributed by
PopAdStuff did actively scan and send popup spam
from unsuspecting user's system.



-- 
CTO SANS Internet Storm Center   http://isc.sans.org
phone: (617) 786 1563
  fax: (617) 786 1550  [EMAIL PROTECTED]



signature.asc
Description: This is a digitally signed message part


port 1026-1031 traffic

2003-12-01 Thread Johannes B. Ullrich

Well, for the last week there has been an odd increase in port
1026-1031 traffic. While everything points to popup spam, there
are a few issues that are 'odd':

- increase in sources that cause this traffic.
- "natural" source ports vs. crafted source port which is typical
  for popup spam
- 2-byte '00 00' payload

(more details: http://isc.sans.org/diary.html )

As it very much looks like that the origin are compromised
Windows systems (some appear to be behind NAT routers), I posted
a list with IPs at
http://feeds.dshield.org/port1026.dat

The list is sorted by IP. If any of these systems live on your network,
your help in tracking down the root cause of all this traffic is
appreciated. Its (not yet) a big deal. But maybe its one of the few
times we can stay ahead of the problem. Also, at this point it shouldn't
be too hard to track these systems (its only about 5,000 unique sources)

the columns of the data file:
- ip address
- first time seen on this day (GMT)
- last time seen on this day (GMT)
- number of packets detected
- date

The filter applied to the list:
- the hosts sent traffic to port 1026-1031
- the source port was not 666 or 4177
- it happened today or yesterday (today: Dec. 2nd).

-- 
CTO SANS Internet Storm Center   http://isc.sans.org
phone: (617) 786 1563
  fax: (617) 786 1550  [EMAIL PROTECTED]



signature.asc
Description: This is a digitally signed message part


DShield reports by AS for 'Blaster' and other issues

2003-08-29 Thread Johannes B. Ullrich

I setup a 'real time' report by AS to assist networks
in finding infected systems. The URL:

http://www.dshield.org/asreport.php

  This report is intended for automated parsing, so it comes as a simple
tab delimited table with brief 'usage' header. You can filter by target
port, protocol and AS. The AS number is required.

  The AS lookup is somewhat experimental. So feedback is appreciated.

-- 
SANS - Internet Storm Center
http://isc.sans.org
PGP Key: http://isc.sans.org/jullrich.txt


signature.asc
Description: This is a digitally signed message part


Re: Arbor Networks DoS defense product

2002-05-15 Thread Johannes B. Ullrich



> What about timing?  What about breaking up
> segements of the network to be  scanned by different hosts?  

Its realy a matter of getting a sizable 'line mine net' up. With
dshield, I hope to ultimately have a couple in each AS, probably with
some local
aggregation.

The trick is that you use other people's line mines. It doesn't help you
to use your own. Scan & exploit often come in one package so by the time
you figure out you are scanned, you probably already lost a few hosts.
The trick with distributed (or 'collaborative' as I think it is better
called) intrusion detection is that whoever gets scanned first tells
everyone else.

Also: This has to be automated. Because whoever gets hit first is
probably too busy cleaning up to worry about posting all the gorry
details on this or any other list.


> How many
> hits on the linemines constitute blocking?  Are you blocking hosts or
> networks?  

up to you... Setting too much of a policy would make the system
predictable and vulnerable. (attacker knows: only scan 99 hosts from
each zombie...)

> Either way, what about dynamic ips?  

blocking a network will take care of them. Other than that: for a
DSL/cable line the IP will not change much, and for a dialup line they
would have to hangup&dial a lot to get a good IP distribution.

> What about scans done
> from different networks other than that which the supposed attacker is
> originating from.  

Well, then these networks are marked as "attackers", which is ok. The
can clean up their systems and enjoy full access again.

> Its Universitys, unsecured wireless lans, etc.

same thing: if you run an unsecured wireless network, maybe you
shouldn't have given it access to the net in the first place.







Re: Arbor Networks DoS defense product

2002-05-15 Thread Johannes B. Ullrich


> > Even more, I would hate to see the advocation of a hostile reaction to 
> > what, so far, is not considered a crime.

I agree. Scanning is no crime. But blocking isn't a crime either.




Re: Arbor Networks DoS defense product

2002-05-15 Thread Johannes B. Ullrich


sorry. getting confused by my own tricky url schemes:

http://feeds.dshield.org/block.txt


On Wed, 2002-05-15 at 17:13, Dan Hollis wrote:
> 
> On 15 May 2002, Johannes B. Ullrich wrote:
> > See http://www.dshield.org/block.txt ;-). We are about 24hrs away from
> > getting a BGP test feed up.
> 
> Error
>   
>Sorry, the page could not be found.
> 
>Click HERE to return to the DShield.org homepage. 
> 
> -Dan
> -- 
> [-] Omae no subete no kichi wa ore no mono da. [-]
> 
> 





Re: New SubSeven outbreak?

2002-05-12 Thread Johannes B. Ullrich



> I have seen 6 portscans looking for SubSeven on a /24 in the past 24 hours. 
> It'd been a while since I had seen *any*, now I'm seeing all these.  Is 
> this a new outbreak/vulnerability, or have I just been lucky?  Has anybody 
> else seen an increase in scans on tcp port 27374?

There are a number of IRC controlled bots that will allow 
scanning of subnets for Sub7. So you will see occasional
flameups of Sub7 scans as they happen to focus on your
network. Try to connect to some of the cable modem in 24/8
and you will see more of that.

I should still have a little perl honeypot around that you can use
to find out what they try to install on sub7 infected machines.

-- 
---
[EMAIL PROTECTED]Join http://www.DShield.org
  Distributed Intrusion Detection System





Re: anybody else been spammed by "no-ip.com" yet?

2002-05-04 Thread Johannes B. Ullrich



> First, nobody wants to pay $.02 to email grandma. They will pick up the
> phone instead. Second, nobody will send any emails that they don't have
> to, period. This will just drive Internet users away because of the cost
> rather than being driven away because of spam.

sounds a bit like www.vanqish.com . But other than that, how
would it work for mailing lists like this one?

-- 
---
[EMAIL PROTECTED]Join http://www.DShield.org
  Distributed Intrusion Detection System





Re: anybody else been spammed by "no-ip.com" yet?

2002-05-03 Thread Johannes B. Ullrich



no spam. But I just took apart an IRC controlled botnet
that used their service. 
(The trojan was a basic 'floodnet' binary and was distributed
via email... )


-- 
---
[EMAIL PROTECTED]Join http://www.DShield.org
  Distributed Intrusion Detection System





RE: CIA Warns of Chinese Plans for Cyber-Attacks on U.S.

2002-04-26 Thread Johannes B. Ullrich



First of all: Does it matter if the Chinese Govt' is launching the attack
or the kid next door?

Personally, I would think if the Chinese Govt' has any sense at all, they
surely look into cyberwar. Which respectable government doesn't ?

In my opinion the real problem/story is the uphauling state of internet
security. I am running DShield.org and regularly try to talk to people
that show up as 'top attackers' in our list personally on the phone. 
Just a quote from a guy that identified himself as "MIS Department" for a 
public interest group (from memory, not word by word):

Me: "I think your PC with the IP address xxx.xxx.xxx.xxx is infected
 with the Nimda virus and also used as an IRC proxy"
MIS-Dept: "Are there any more number to an IP address or is this it?"

(later he kind of suspected that his boss's desktop may be infected. 
 It is still scanning nicely so far.)

Other identified Nimda infections included a little mortage broker/bank
and an office from a large tax preparation company.

And thats just Nimda, which is pretty much 'in your face' as it scans
quite actively. Don't get me started on all the home PCs used for botnet,
ircs proxies or whatever the backdoor d'jeur is.

I don't think a government effort will change anything. Somehow,
the 'net' has to find a mechanism to deal with this. The problem is
way too international. I am experimenting with a 'block list'
lately of netblocks that are very active scanners. 
(if anybody is interested: http://feeds.dshield.org/block.txt).
It kind of shows the problem. Next to the all-time favorite CN networks,
there is your usual mix of AT&T Broadband, Chello NL, and two
german universities. 

 Anyway... How many systems are 'backdoored' at any time?
My personal guess is 1 out of 1000. maybe 5000.

 (and thats before I had my coffee).

-- 
---
[EMAIL PROTECTED] Join http://www.DShield.org
  Distributed Intrusion Detection System