« Zoom-In to Pushdo CnCs.... | Main | On the new Explorer XML zero day »

2008.12.05

TrackBack

TrackBack URL for this entry:
http://www.typepad.com/services/trackback/6a00d835018afd53ef010536404b32970b

Listed below are links to weblogs that reference NOC4HOSTS and the Grum Botnet:

Comments

Feed You can follow this conversation by subscribing to the comment feed for this post.

this is another of their scam sites with a search I did http://www.nowtorrents.com/torrents/this+is+a+scam+site+.html hosted by NOC4HOSTS you may find the search results interesting! There should be an easier way to shut these sort of sites and companies down

There's a cutwail C&C also running in HI velocity @ 69.46.20.65. The traffic is to port 2065 and looks like obfuscated traffic. The only discernible text in the stream is "L.....9ifnospam.0.exe_url..exe_url........"

The other portion of the cutwail C&C is in SoftLayer, also in the US. I posted some of the details on my blog: http://realsecurity.wordpress.com/

Hivelocity response team is actually decently responsive, they null routed all mentionned IPs yesterday.

Out of curiosity, do you folks report this sort of thing to the DC's abuse team? Where I work (an unnamed leader in the hosting industry), our abuse team takes this sort of thing _very_ seriously. If the NOC won't do anything about it, hand the packet logs over to the upstream provider(s) along with copies of the messages submitted to the DC.

The comments to this entry are closed.

Enter your email address:

Delivered by FeedBurner

Bookmark and Share

Twitter Updates

    follow me on Twitter

    In The News