[39698] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

RE: Code Red : Any whitehouse.gov people around?

daemon@ATHENA.MIT.EDU (Dave Stewart)
Fri Jul 20 11:41:16 2001

Message-Id: <5.1.0.14.2.20010720112904.04fcc990@mail.ntrnet.net>
Date: Fri, 20 Jul 2001 11:39:47 -0400
To: <nanog@merit.edu>
From: Dave Stewart <dbs@ntrnet.net>
In-Reply-To: <1A093F9F32931249BF1EAD26C7280F5ADA098D@fnexchange3.corp.fa
 st.net>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"; format=flowed
Errors-To: owner-nanog-outgoing@merit.edu


At 10:04 AM 7/20/2001, Mike Najarian wrote:

>Has anyone gutted an infected box to determine whether it's going to go for
>         whitehouse.gov
>         www.whitehouse.gov
>or a hardcoded IP?

While there's incomplete information available in the standard places, it 
appears to be a hardcoded IP.

I, along with many others, have null routed it.... Symantec's site claims 
the IP address is no longer active at any rate.

It *appears* that from xx-20-xxxx through xx-28-xxxx, this thing will 
attack that IP address... meaning that measures already in place will 
minimize damage from the portion of the code that attempts to flood 
198.137.240.91.  Networks where 198.137.240.91 isn't blocked could see 
network congestion, I suppose, if they host a large number of infected 
machines.

I've seen a claim that if the date is greater than 28, the threads just go 
into an infinite sleep.

 From what I can see, I would expect another round of probes to take place 
starting on 01-August-2001...



home help back first fref pref prev next nref lref last post