anoat_private ftpd dip.t-dialin.net

From: Owen McCusker (mccuskerat_private)
Date: Wed Nov 06 2002 - 13:50:13 PST

  • Next message: Crist J. Clark: "Re: Ip spoof from 0.0.0.0"

    I have seen some interesting access on a few anonymous ftp servers
    logs.
    
    The following sequence occurs:
    1) The user logs on anonymously with the username anoat_private
    2) user transfers a repeating binary file XXX.XXX where the X is a digit
    (e.g. 471.995)
        the file has a repeating pattern to it.
        the file size is: 104154 (bytes)
        file name was: 471.995 (maybe a sequencing number for reassembly...)
    
        constents look like: (via text editor)
    
    
    .3›;ØΚŸg3pBØÇ=´g?Ãä?[o¼g‡Ãò?«šgÝÃA?[š\ÃO?[Ã;g3›4?[Ãdr3.............
        (maybe    encrypted text?)
    3) The user accesses the file later on.
    
    The users are from dip.t-dial.net, the user RIPE the description
    includes:
        Deutsche Telekom AG, Internet Service Provider, CeBIT 99
    
    I am not sure what these users are doing. Maybe they are trying
    to setup someway to perform "store and forward" services
    via anonymous FTP.
    
    Maybe this is somehow related to the same scheme devised
    using iroffer ( aka DCC bot).
    
    Has anyone else seen this type of activity from dip.t-dialin.net
    or dipsters for short. ;-)?
    
    Owen
    
    
    
    
    ----------------------------------------------------------------------------
    This list is provided by the SecurityFocus ARIS analyzer service.
    For more information on this free incident handling, management 
    and tracking system please see: http://aris.securityfocus.com
    



    This archive was generated by hypermail 2b30 : Wed Nov 06 2002 - 17:28:28 PST