[Dshield] Re: Possible variant of Blaster/Nachi/Welchia? (more)

Jeff Kell jeff-kell at utc.edu
Fri Sep 26 15:40:20 GMT 2003


Jeff Kell wrote:
> I have seen some STRANGE traffic on our dorms this morning.  The dorms 
> are all on a private network 172.18.0.0.  I have hosts (10 so far) that 
> are doing this:
> 
>    spoofed 172.x.x.x:123 UDP --> random 172.x.x.x:123
> same spoof 172.x.x.x ICMP --> another random 172.x.x.x
> same spoof 172.x.x.x ICMP --> another random 172.x.x.x

I just noticed the initial udp:123 destination is a valid NTP source, 
usually time.windows.com:

> Sep 26 10:43:05.596 EDT: %SEC-6-IPACCESSLOGP: list netcop denied udp 172.165.225.160(123) -> 207.46.130.100(123), 1 packet
> Sep 26 10:58:50.491 EDT: %SEC-6-IPACCESSLOGP: list netcop denied udp 172.141.193.21(123) -> 207.46.130.100(123), 1 packet
> Sep 26 11:05:16.102 EDT: %SEC-6-IPACCESSLOGP: list netcop denied udp 172.152.89.157(123) -> 132.163.4.102(123), 1 packet
> Sep 26 11:05:56.831 EDT: %SEC-6-IPACCESSLOGP: list netcop denied udp 172.129.185.162(123) -> 207.46.130.100(123), 1 packet
> Sep 26 11:16:58.948 EDT: %SEC-6-IPACCESSLOGP: list netcop denied udp 172.128.177.27(123) -> 207.46.130.100(123), 1 packet
> Sep 26 11:25:08.162 EDT: %SEC-6-IPACCESSLOGP: list netcop denied udp 172.140.133.74(123) -> 207.46.130.100(123), 1 packet

The ICMP targets still appear to be random 172.x.x.x.

Jeff




More information about the list mailing list