[42640] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

RE: Worm probes

daemon@ATHENA.MIT.EDU (Roeland Meyer)
Tue Sep 18 15:39:25 2001

Message-ID: <EA9368A5B1010140ADBF534E4D32C728069EE2@condor.mhsc.com>
From: Roeland Meyer <rmeyer@mhsc.com>
To: "'sigma@pair.com'" <sigma@pair.com>, nanog@merit.edu
Date: Tue, 18 Sep 2001 11:54:18 -0700
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Errors-To: owner-nanog-outgoing@merit.edu


There has already been a massive application of the patches, according to
www.netcraft.com at http://www.netcraft.com/survey/#August, Code Red
vulnerability has dropped to less than 20%, since July. It continues to
drop. Your general characterization of cluelessness is a bit unfair. It is
puzzeling that root.exe vulnerability is the only indicator that continues
to rise, albeit slowly. Netcraft shows it to be >10% at the moment.

BTW, I'm still seeing massive scanning activity.

|> From: sigma@pair.com [mailto:sigma@pair.com]
|> Sent: Tuesday, September 18, 2001 10:37 AM
|> 
|> Along those lines, weren't there some projects last time 
|> around to find and
|> clean up the affected machines?  Clearly there are LOTS of 
|> vulnerable NT
|> servers still out there.  Presumably these are being 
|> responded to just like
|> Smurf amplifiers, and the problem is just that the admins 
|> are clueless or
|> unreachable?
|> 
|> So far the most prolific network probing us has belonged to 
|> 9NetAve, which
|> was bought by Concentric shortly before they became XO.

|> > Hopefully the notification does some good.
|> > 
|> 

home help back first fref pref prev next nref lref last post