Re: a list of hosts in a RPC BOTNET, mostly 209.x.x.x,

2003-08-14 Thread Andy Smith
On Wed, Aug 06, 2003 at 10:37:43AM -0500, neal rauhauser 402-301-9555 wrote: Someone has changed the channel topic to CLOSED, Thanks for the post to NANOG :-( But I don't see hosts being k-lined - I imagine if IRCops took an interest in this they'd be lopping off heads. Lopping off

Re: a list of hosts in a RPC BOTNET, mostly 209.x.x.x,

2003-08-14 Thread neal rauhauser 402-301-9555
Someone has changed the channel topic to CLOSED, Thanks for the post to NANOG :-( But I don't see hosts being k-lined - I imagine if IRCops took an interest in this they'd be lopping off heads. The controlling node for this problem seems to be: spaley [EMAIL PROTECTED] But the

Re: a list of hosts in a RPC BOTNET, mostly 209.x.x.x,

2003-08-10 Thread N. Richard Solis
Atlantech is local to me and sells a lot of DS1 internet access to Wireless ISPs. Maybe a war driver is having some fun... Drew Weaver wrote: !-- /* Style Definitions */ p.MsoNormal, li.MsoNormal, div.MsoNormal {margin:0in; margin-bottom:.0001pt; font-size:12.0pt; font-family:Times New

Re: a list of hosts in a RPC BOTNET, mostly 209.x.x.x,

2003-08-07 Thread Pascal Gloor
Thanks for the information. The Undernet Abuse Exploit Team will take care of this channel. But please next time, mail [EMAIL PROTECTED] instead of a public mailing list. Simply just to avoid script kiddies reading nanog to use the trojans in the mean time. Thanks, Pascal

Re: a list of hosts in a RPC BOTNET, mostly 209.x.x.x,

2003-08-06 Thread Henry Linneweh
When looking at IRC and chat networks in general you have to look at them from the internet since the attacks are launched from the internet outside of any irc. The originators of the attacks use irc as a front to distract the investigators effort to find their real points of origin. In the past

RE: a list of hosts in a RPC BOTNET, mostly 209.x.x.x,

2003-08-06 Thread Michel Py
The controlling node for this problem seems to be: spaley [EMAIL PROTECTED] For the entertainment on non French-speaking nanogers, the literal translation is: Spaley [EMAIL PROTECTED] Excuse my French. Michel.

Re: a list of hosts in a RPC BOTNET, mostly 209.x.x.x,

2003-08-06 Thread Pascal Gloor
The controlling node for this problem seems to be: spaley [EMAIL PROTECTED] This is me, and I blocked the channel. I'm part of the Abuse-Exploit Term of Undernet and an Undernet Administrator. I am, for sure, not the originator of those trojans! Regards, Pascal

Re: a list of hosts in a RPC BOTNET, mostly 209.x.x.x,

2003-08-06 Thread Jan Czmok
Pascal Gloor ([EMAIL PROTECTED]) wrote: The controlling node for this problem seems to be: spaley [EMAIL PROTECTED] This is me, and I blocked the channel. I'm part of the Abuse-Exploit Term of Undernet and an Undernet Administrator. I am, for sure, not the originator of those

a list of hosts in a RPC BOTNET, mostly 209.x.x.x,

2003-08-06 Thread Drew Weaver
I've tried contacting abuse departments of several of these isps and none of them seem to care, so I figured I would post the info here, and maybe someone will let them know, the biggest offender is atlantech. These are all hosts that have been compromised by the same person, they're being