RE: Increased Kuang2 activity

From: Thierry Zoller (support@sniff-em.com)
Date: Mon Feb 10 2003 - 16:26:02 PST

  • Next message: Chuck Swiger: "logfiles of openssl-0.9.6e + GET_CLIENT_HELLO exploit..."

    The recent rise of scans could be linked to an automated version
    of a tool similar to this : 
    http://www.tlsecurity.net/Incoming/Backdoor/Kuang2updater.html
    
    Quote : 
    You can paste a list of kaung2 compromised hosts and it will 
    automatically connect and upload your whatever you choose
    to the infected hosts.
    
    
    
    ----------------------------------------------------------------------------
    This list is provided by the SecurityFocus ARIS analyzer service.
    For more information on this free incident handling, management 
    and tracking system please see: http://aris.securityfocus.com
    



    This archive was generated by hypermail 2b30 : Mon Feb 10 2003 - 19:57:38 PST