lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <015a01c38860$c4315070$c400a8c0@MLANDE>
From: mlande at bellsouth.net (Mary Landesman)
Subject: Mystery DNS Changes

This exploit has been dubbed QHosts-1 Trojan by NAI. Details can be found
at:
http://vil.nai.com/vil/content/v_100719.htm

Regards,
Mary Landesman
Antivirus About.com Guide
http://antivirus.about.com

----- Original Message ----- 
From: "Hansen, Kevin" <kevin.hansen@...mson.com>
To: <full-disclosure@...ts.netsys.com>
Sent: Wednesday, October 01, 2003 3:19 PM
Subject: [Full-Disclosure] Mystery DNS Changes


We have seen multiple instances where DHCP enabled workstations have had
their DNS reconfigured to point to two of the three addresses listed below.
Can anyone else confirm this? Incidents.org is reporting an increase in port
53 traffic over the last two days. Are we looking at the precursor to the
next worm?

216.127.92.38
69.57.146.14
69.57.147.175

-KJH


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ