lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <422B0631.7070602@tehila.gov.il> Date: Sun, 06 Mar 2005 15:31:29 +0200 From: Gadi Evron <gadi@...ila.gov.il> To: bugtraq@...urityfocus.com Subject: drone armies C&C report - Feb/2005 Below is a periodic public report from the drone armies / botnets research and mitigation mailing list. For this report it should be noted that we base our analysis on the data we have accumulated from various sources. According to our incomplete analysis of information we have thus far, we now publish two reports. The ISP's that are most often plagued with botnet C&C's (command & control) are, by the order listed: ---------------------------------- Responsible Party Count ASN SAGONE Sago Networks 16-20 21840 THEPL-1 THE PLANET* 16-20 {21844,13884} PNAP Internap Network Services 11-15 {10913,13790,14742,14744} STAMIN-2 Staminus Communicatio 11-15 25761 ATRIV Atrivo 11-15 27595 MSG-48 Managed Solutions Group 8-10 27645 YIPS Yipes Communications Inc 8-10 6517 LEVEL3 Level 3 Communications 8-10 3356 * Note that the above details are only for botnet C&C's that are still active. * We would gladly like to establish a trusted relationship with these and any organizations to help them in the future. * Please note the serious decrease in live Korean botnets, largely due to the efforts of KrCERT. The Trojan horses most used in botnets: --------------------------------------- The below details have not changed much, although we are seeing an increase in rBot variants. 1. Korgobot. 2. SpyBot. 3. Optix Pro. 4. rBot. 5. Other SpyBot variants and strains (AgoBot, PhatBot, actual SDbots, etc.). Contact information: Hank Nussbacher <hank@...l.iucc.ac.il> Gadi Evron (as specified below) -- Gadi Evron, Information Security Manager, Project Tehila - Israeli Government Internet Security. Ministry of Finance, Israel. gadi@...ila.gov.il gadi@...T.gov.il Office: +972-2-5317890 Fax: +972-2-5317801 http://www.tehila.gov.il The opinions, views, facts or anything else expressed in this email message are not necessarily those of the Israeli Government.
Powered by blists - more mailing lists