At 01:14 PM 9/27/00 -0400, Bill Becker wrote:
Speaking of the internet and the way it operates, is anyone else seeing a large number of random hosts scanning through their address space using TCP on port 139?
I get about 4 or 5 of these a day on my home boxen and I receive 5-10 times that many abuse complaints regarding this activity. My current suspicion is that a backdoor trojan (pause here to decline the port 139 attempt that just zipped by me) is on the loose and being propagated like mad. This would certainly fit with the rumour of a huge DDoS attack in the works, as m@d l33t h@x0rs get as many machines as possible compromised and ready to help the attack. I have noticed that the large majority of these scans from my address space (216.39.128.0 - 216.39.192.255) are targeted at others in the 216.39.* and 216.40.* blocks. Also, all of the computers in question seem to be Win9x boxes. Coincidence? I think not. Perhaps this is a new virus afoot that replicates itself by hunting through an IP block and the ones above and below it for an open Windows share. That would make sense, given the data I have thus far. CERT has an advisory up (http://www.cert.org/vul_notes/VN-2000-03.html) about NetBIOS DoS attacks, but these don't seem to be hosing networks, just kind of feeling around. If anyone else has more info, please share it! --- Ben Browning <benb@oz.net> oz.net Network Operations Tel (206) 443-8000 Fax (206) 443-0500 http://www.oz.net/
Partially correct. It's a worm.. Windows likes to share drives with no passwords. This worm just logs into those shares, and copies itself into like autoexec.bat. Next boot it infects your system. On a somewhat related note, since we obviously have AOL people living and they now own ICQ. irc.icq.com has been used for weeks for these kiddies to store various ddos clients on. Take a look at #0wned. All compromised machines. There are no live opers to deal with it, and emails to ircsupport@icq.com go unanswered. Is there any way we can deal with things like this? Jason --- Jason Slagle - CCNA - CCDA Network Administrator - Toledo Internet Access - Toledo Ohio - raistlin@tacorp.net - jslagle@toledolink.com - WHOIS JS10172 -----BEGIN GEEK CODE BLOCK----- Version: 3.12 GE d-- s:+ a-- C++ UL+++ P--- L+++ E- W- N+ o-- K- w--- O M- V PS+ PE+++ Y+ PGP t+ 5 X+ R tv+ b+ DI+ D G e+ h! r++ y+ ------END GEEK CODE BLOCK------ On Wed, 27 Sep 2000, Ben Browning wrote:
I get about 4 or 5 of these a day on my home boxen and I receive 5-10 times that many abuse complaints regarding this activity.
My current suspicion is that a backdoor trojan (pause here to decline the port 139 attempt that just zipped by me) is on the loose and being propagated like mad. This would certainly fit with the rumour of a huge DDoS attack in the works, as m@d l33t h@x0rs get as many machines as possible compromised and ready to help the attack.
I have noticed that the large majority of these scans from my address space (216.39.128.0 - 216.39.192.255) are targeted at others in the 216.39.* and 216.40.* blocks. Also, all of the computers in question seem to be Win9x boxes. Coincidence? I think not. Perhaps this is a new virus afoot that replicates itself by hunting through an IP block and the ones above and below it for an open Windows share. That would make sense, given the data I have thus far.
CERT has an advisory up (http://www.cert.org/vul_notes/VN-2000-03.html) about NetBIOS DoS attacks, but these don't seem to be hosing networks, just kind of feeling around.
On Wed, 27 Sep 2000, Jason Slagle wrote:
On a somewhat related note, since we obviously have AOL people living and they now own ICQ. irc.icq.com has been used for weeks for these kiddies to store various ddos clients on. Take a look at #0wned. All compromised machines. There are no live opers to deal with it, and emails to ircsupport@icq.com go unanswered. Is there any way we can deal with things like this?
Route irc.icq.com to null0. If enough networks do this (or better, if tier1's do), maybe icq will get their head out of their ass and do something about it. -Dan
At Wednesday 02:35 PM 9/27/00, Ben Browning wrote:
I have noticed that the large majority of these scans from my address space (216.39.128.0 - 216.39.192.255) are targeted at others in the 216.39.* and 216.40.* blocks. Also, all of the computers in question seem to be Win9x boxes. Coincidence? I think not. Perhaps this is a new virus afoot that replicates itself by hunting through an IP block and the ones above and below it for an open Windows share. That would make sense, given the data I have thus far.
Hello, Network.VBS, again ? That, or a new variant. If I recall this right, this virus is one of the damn cheapest (and easiest) adaptations of ANY program into a virus I have ever seen. The original is found on your average Win98 machine at C:\windows\samples\wsh\network.vbs It really shows off how crappy network security (and M$'s implementation of 'network functionality') has more todo with spreading viruses than some 30 lines of code amended to an existing program written for entirely different purposes. Making use of Netbios in any form is like poking a whore without a condom: you WILL get burned. And then some. It doesn't even take so many tries.
On Wed, Sep 27, 2000 at 11:35:23AM -0700, Ben Browning wrote:
My current suspicion is that a backdoor trojan (pause here to decline the port 139 attempt that just zipped by me) is on the loose and being propagated like mad. This would certainly fit with the rumour of a huge DDoS attack in the works, as m@d l33t h@x0rs get as many machines as possible compromised and ready to help the attack.
It would be interesting to see if this crops up at this nanog meeting as it did at the San Jose meeting. - Jared -- Jared Mauch | pgp key available via finger from jared@puck.nether.net clue++; | http://puck.nether.net/~jared/ My statements are only mine. END OF LINE | Manager of IP networks built within my own home
participants (5)
-
Ben Browning
-
Dan Hollis
-
Jared Mauch
-
Jason Slagle
-
Kai Schlichting