[31537] in North American Network Operators' Group
Re: Port 139 scans
daemon@ATHENA.MIT.EDU (Jared Mauch)
Wed Sep 27 15:15:30 2000
Date: Wed, 27 Sep 2000 15:10:48 -0400
From: Jared Mauch <jared@puck.Nether.net>
To: Ben Browning <benb@oz.net>
Cc: nanog@merit.edu
Message-ID: <20000927151048.C29007@puck.nether.net>
Mail-Followup-To: Ben Browning <benb@oz.net>, nanog@merit.edu
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <5.0.0.25.2.20000927113355.027373d0@mail.oz.net>; from benb@oz.net on Wed, Sep 27, 2000 at 11:35:23AM -0700
Errors-To: owner-nanog-outgoing@merit.edu
On Wed, Sep 27, 2000 at 11:35:23AM -0700, Ben Browning wrote:
> My current suspicion is that a backdoor trojan (pause here to decline the
> port 139 attempt that just zipped by me) is on the loose and being
> propagated like mad. This would certainly fit with the rumour of a huge
> DDoS attack in the works, as m@d l33t h@x0rs get as many machines as
> possible compromised and ready to help the attack.
It would be interesting to see if this crops up at this nanog
meeting as it did at the San Jose meeting.
- Jared
--
Jared Mauch | pgp key available via finger from jared@puck.nether.net
clue++; | http://puck.nether.net/~jared/ My statements are only mine.
END OF LINE | Manager of IP networks built within my own home