I've been slowly compiling a list of known botnets should anyone care to filter, or check them in your netblocks if someone in your range is passing off garbage, etc. Information has been passed from others admins having to deal with these pest. Care to pass on a host that you're seeing I'll post it for others to see as well. Perhaps when I have spare time, I may or may not throw up something where admins can check, add, hosts they're seeing. Don't know if I want my connection getting toasted for doing so, but it could be something informative, a-la spamhaus. Bothaus anyone? http://www.infiltrated.net/sdbot-irc-servers.txt ------------- Virus writers seek cash from chaos By John Leyden The Register http://www.theregister.co.uk/2004/10/06/vxers_cash_in/ Last month Trend Micro, the anti-virus firm, recorded a six-fold increase in malware compared to September 2003. It detected 1,485 new items of malware last month, compared to 250 new types of malicious code in the same period last year. ... Trend also records the emergence of the first JPEG virus in September, and notes that the most damaging variant of the Sasser worm - Sasser-B - is still prevalent four months after its first appearance in the wild. ------------- =+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+ J. Oquendo GPG Key ID 0x51F9D78D Fingerprint 2A48 BA18 1851 4C99 CA22 0619 DB63 F2F7 51F9 D78D http://pgp.mit.edu:11371/pks/lookup?op=get&search=0x51F9D78D sil @ politrix . org http://www.politrix.org sil @ infiltrated . net http://www.infiltrated.net "How can we account for our present situation unless we believe that men high in this government are concerting to deliver us to disaster?" Joseph McCarthy "America's Retreat from Victory"
Here's a link to a bugtraq post I made a couple of months ago, about what Trojan horses are used in drone armies today, it is not really up-to-date, but should give you a general idea: http://seclists.org/lists/bugtraq/2004/Jul/0106.html And now to your post...
I've been slowly compiling a list of known botnets should anyone care to filter, or check them in your netblocks if someone in your range is passing off garbage, etc. Information has been passed from others admins having to deal with these pest. Care to pass on a host that you're seeing I'll post it for others to see as well. Perhaps when I have spare time, I may or may not throw up something where admins can check, add, hosts they're seeing. Don't know if I want my connection getting toasted for doing so, but it could be something informative, a-la spamhaus. Bothaus anyone?
Very interesting. However, in my opinion, half-useless for firewall blocking. These botnets show up daily, with two main factors that never change (I don't know if it will really be two, I just learned to say two/three in the military about everything): 1. The botnets change daily. 2. The drones composing the botnets change daily. First, there are quite a few of these out there, and changing where they report to or simply getting new ones is extremely easy for people with such big botnets. Second, the drones change their software (i.e. the Trojan horse) quite often. Third, blocking servers won't block the DDoS, it will block your users from being able to connect to these servers. Fourth, most botnets would simply hop a server when they see one is not there. Once they changed servers, the runners would switch their permanent servers list. Fifth, they never run out of servers. Sixth, they are used to running and hiding because there are a few of us who hunt them down constantly. I believe this idea is as good as blocking port 25 on ISP's for customers not paying/asking for static addresses and/or mail server capabilities, but it is not as efficient nor do I predict it a long life. The reasoning for it being a good idea, despite what I said above is; not all drones would hop. Runners count on the fact that they can hop their botnets to other servers (even though they usually bother with contingency plans). Doing this can cause many problems from users who want to use IRC, and considering the users themselves are not yet protected, their machines would simply get re-infected and join three other botnets that same day. Not to mention the fact that the runner would have their IP's saved and ready for re-claiming/uploading new data/malware. That said, it's a good idea because it would mean making the lives of the runners a lot more difficult, making sure that in many cases your users won't DDoS (just check these IP's to see how many are connected from your places), and finally, perhaps, maybe, make runners have to use different medias to control their botnets - non as efficient or easy as IRC to date. Maintaining the list you suggest is difficult, but I am more than interested in how you planned on doing it? Gadi Evron.
At 01:10 AM 07/10/2004, J. Oquendo wrote:
I've been slowly compiling a list of known botnets should
A lot of the IP addresses you have listed seem like they would change with some frequency based on the host names. The problem with using such a list is that it can quickly become out of date unless the entries are automatically aged. Think of a dialup zombie assigned a dynamic IP out of the netblock 192.168.0.0/24. Over time, 192.168.0.1 through .255 will become black listed as the user comes and goes. A quick cat list | sort | uniq | awk '{print "host "$1}' | sh shows 0.102.218.12.IN-ADDR.ARPA domain name pointer 12-218-102-0.client.mchsi.com 197.26.119.128.IN-ADDR.ARPA domain name pointer jqa-197.res.umass.edu 227.8.119.128.IN-ADDR.ARPA domain name pointer ja2-227.res.umass.edu Host not found. 76.84.36.128.IN-ADDR.ARPA domain name pointer yale128036084076.student.yale.edu 144.150.2.129.IN-ADDR.ARPA domain name pointer rkraft.student.umd.edu 205.153.64.130.IN-ADDR.ARPA domain name pointer resnet153-205.medford.tufts.edu 154.221.49.137.IN-ADDR.ARPA domain name pointer uhartford221154.hartford.edu 58.229.166.141.IN-ADDR.ARPA domain name pointer smh229058.richmond.edu 57.230.166.141.IN-ADDR.ARPA domain name pointer smh230057.richmond.edu 2.233.166.141.IN-ADDR.ARPA domain name pointer sfa233002.richmond.edu 87.236.166.141.IN-ADDR.ARPA domain name pointer sfa236087.richmond.edu 247.237.166.141.IN-ADDR.ARPA domain name pointer sfa237247.richmond.edu 168.130.216.150.IN-ADDR.ARPA domain name pointer tfk1116.students.ecu.edu 82.187.1.152.IN-ADDR.ARPA domain name pointer fahrmpc32.cvm.ncsu.edu Host not found. 222.128.112.195.IN-ADDR.ARPA domain name pointer proxy02.ada.net.tr 131.11.66.200.IN-ADDR.ARPA domain name pointer customer-MZT-11-131.megared.net.mx 102.214.253.206.IN-ADDR.ARPA domain name pointer construct.enic.cc 205.147.234.207.IN-ADDR.ARPA domain name pointer 207-234-147-205.ptr.primarydns.com Host not found. 198.173.54.213.IN-ADDR.ARPA domain name pointer p213.54.173.198.tisdip.tiscali.de 58.114.254.216.IN-ADDR.ARPA domain name pointer dsl254-114-058.nyc1.dsl.speakeasy.net 114.8.195.24.IN-ADDR.ARPA domain name pointer alb-24-195-8-114.nycap.rr.com Host not found. Host not found. Host not found. 163.26.167.62.IN-ADDR.ARPA domain name pointer adsl-62-167-26-163.adslplus.ch 248.180.65.62.IN-ADDR.ARPA domain name pointer irc-out.antik.sk 179.55.23.64.IN-ADDR.ARPA domain name pointer 64-23-55-179.ptr.skynetweb.com 7.156.37.64.IN-ADDR.ARPA domain name pointer patch-virt7.station.sony.com 156.238.110.65.IN-ADDR.ARPA domain name pointer coy.student.iastate.edu 163.75.210.66.IN-ADDR.ARPA domain name pointer wsip-66-210-75-163.lu.dl.cox.net 20.188.250.66.IN-ADDR.ARPA domain name pointer 66.250.188.20.chaincast.com 200.234.45.66.IN-ADDR.ARPA domain name pointer irc.ashenworlds.net Host not found, try again. 56.87.90.66.IN-ADDR.ARPA domain name pointer . 36.53.149.68.IN-ADDR.ARPA domain name pointer S0106000103a72199.ed.shawcable.net 146.173.41.69.IN-ADDR.ARPA domain name pointer unused.800hosting.com 60.89.42.69.IN-ADDR.ARPA domain name pointer irc.afraid.org 1.212.247.80.IN-ADDR.ARPA domain name pointer servicez.org Have you sent email to those edu abuse contacts ? Most of the universities I have worked with for abuse resolution are generally responsive. ---Mike
On Thu, Oct 07, 2004 at 04:24:42PM -0400, Mike Tancsa wrote:
Have you sent email to those edu abuse contacts ? Most of the universities I have worked with for abuse resolution are generally responsive.
Unfortunately the 'generally responsive' is the best you can hope for. Recently while investigating a customer system that had been rooted (poorly chosen root password) I tracked the psybnc and energymech bots down to a channel on Undernet's IRC network (#The-Hackers), after wiping out about half their bots (with informaiton gleaned from the exploited system) they got upset and decided to attack the host I was IRC'ing from. One provider (Qwest) resolved the issue after 6 hours of ~100mbit coming from a colo customer (big name game company, SLA complicated things) One provider (NetNation.com) said they were aware that the system had been exploited, and was attacking other systems, but that they had not gotten around to doing anything about it. A phone call to the customer paying for the ~50-60mbit/s it was spewing got that resolved very quickly. The third system went offline completely about 5 minutes after it started attacking, I like to believe that it set off an alarm somewhere and someone investigated. Notable points here: a) Some providers are happy to allow their customers systems to push DDoS traffic, it increases their revenue b) IRC is a haven for these people, unfortunately networks like Undernet take it a step further by providing channel services and host hiding so that not only the people behind the DDoS are hidden, but so are the bots themselves. The people running the network fear retaliation too much to do anything about it. c) Everyone I've run across while hunting botnets has been from Thailand, Korea, India, or somewhere nearby. #The-Hackers has their own website complete with valid phone numbers: www.the-hackers.org d) There is no easy solution. -- Matthew S. Hallacy FUBAR, LART, BOFH Certified http://www.poptix.net GPG public key 0x01938203
participants (4)
-
Gadi Evron
-
J. Oquendo
-
Matthew S. Hallacy
-
Mike Tancsa