lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <42A57520.9060904@tehila.gov.il>
Date: Tue, 07 Jun 2005 13:21:20 +0300
From: Gadi Evron <gadi@...ila.gov.il>
To: bugtraq@...urityfocus.com
Subject: drone armies C&C report - May/2005


Below is a periodic public report from the drone armies / botnets
research and mitigation mailing list.
For this report it should be noted that we base our analysis on the data
we have accumulated from various sources.

According to our incomplete analysis of information we have thus far, we
now publish our regular two reports.


This month we would especially like to commend Staminus, who contacted 
us and have since made incredible efforts to deal with the threat. Also, 
we'd like to mention Internap for their continuous efforts.


The ISP's that are most often plagued with botnet C&C's (command &
control) are, by the order listed:
----------------------------------

Top 15 with open non-resolved suspect C&Cs by Name:
ASN     Responsible Party               Unique C&Cs     Open-unresolved
6517    YIPESCOM - Yipes Communication  60              41
21840   SAGONET-TPA - Sago Networks     90              24
25761   STAMINUS-COMM - Staminus Commu  86              20
4766    KIXS-AS-KR Korea Telecom        43              20
13680   AS13680 Hostway Corporation Ta  22              19
21698   NEBRIX-CA - Nebrix Communicati  24              18
13301   UNITEDCOLO-AS Autonomous Syste  27              17
21788   NOC - Network Operations Cente  29              16
29415   EUROWAN-ASN OVANET - EuroWan d  16              15
13749   EVERYONES-INTERNET - Everyones  24              14
30083   SERVER4YOU - Server4You Inc.    21              14
25700   SWIFTDESK - SWIFTDESK VENTURE   13              13
23522   CIT-FOONET - CREATIVE INTERNET  14              12
27595   ATRIVO-AS - Atrivo              31              11
13237   LAMBDANET-AS European Backbone  11              11

The following table is a historical ranking of the top 10
Responsible parties listed by the number of unique C&Cs in
the BBL along with the current number of C&Cs responding as
open at the time of the survey.

ASN     Responsible Party               Unique C&Cs     Open-unresolved
21840   SAGONET-TPA - Sago Networks     90              24
10913   INTERNAP (Block 1,3,4,5)        90              1-5
13790
19024
14742

25761   STAMINUS-COMM - Staminus Commu  86              20
6517    YIPESCOM - Yipes Communication  60              41
4766    KIXS-AS-KR Korea Telecom        43              20
27595   ATRIVO-AS - Atrivo              31              11
21844   THEPLANET-AS - THE PLANET       31              1-5
21788   NOC - Network Operations Cente  29              16
13301   UNITEDCOLO-AS Autonomous Syste  27              17
3356    LEVEL3 Level 3 Communications   25              1-5

* We would gladly like to establish a trusted relationship with
   these and any organizations to help them in the future.

* By previous requests here is an explanation of what "ASN" is, by Joe
   St Sauver:
   http://darkwing.uoregon.edu/~joe/one-pager-asn.pdf


The Trojan horses most used in botnets:
---------------------------------------

1. Korgobot.
2. SpyBot.
3. Optix Pro.
4. rBot.
5. Other SpyBot variants and strains (AgoBot, PhatBot, actual SDbots,
    etc.).

This report is unchanged.


Credit for gathering the data and compiling the statistics should go to:
Prof. Randal Vaughn <Randy_Vaughn@...lor.edu>

-- 
Gadi Evron,
Israeli Government CERT Manager,
Tehila, Ministry of Finance.

gadi@...T.gov.il
Office: +972-2-5317890
Fax: +972-2-5317801

The opinions, views, facts or anything else expressed in this email
message are not necessarily those of the Israeli Government.


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ