lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <415317CC.2090700@joesmith.homeip.net> From: joe at joesmith.homeip.net (joe smith) Subject: unknown backdoor: 220 StnyFtpd 0wns j0 http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_KIBUV.B&VSect=T Ryan Sumida wrote: > > I've been finding a few compromised Windows systems on our campus that > have a random port open with a banner of "220 StnyFtpd 0wns j0". All > the systems seem to be doing SYN scans on port 445 and LSASS buffer > overflow attempts. Anyone know what worm/bot is doing this? I don't > have access to these machines so I can only get a network view of what > the systems are doing. > > Thanks, > > Ryan