lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <4798.24.236.189.189.1082876689.squirrel@huskymail.mtu.edu> From: ddh at mtu.edu (David Hale) Subject: Re: Outbreak of a virus on campus Most folks should probably change the sid number to something above 1000000 to comply with snort standards. My sid number was fairly random based off the first number that came to my head. -Dave Hale Sr. Security Specialist Michigan Technological University > We have currently blocked connections to port to/from 7000 on the > following hosts: > > 130.74.82.206 > 131.234.100.43 > 193.87.20.31 > > This seems to have contained the spread of the worm within our campus. > The list of hosts was gathered with a snort signature of: > > alert tcp $HOME_NET any -> any 7000 (msg:"agobot IRC traffic"; > content:"weednet";classtype:bad-unknown; sid:71727; rev:1;) > > Until the block was in place we had shut down around 50 hosts (mainly on > our dorm network) that had been infected with the worm. > > -Dave Hale > Sr. Security Specialist > Michigan Technological University >