[69403] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

RE: worm information

daemon@ATHENA.MIT.EDU (Christopher J. Wolff)
Sat Apr 10 14:37:55 2004

From: "Christopher J. Wolff" <chris@bblabs.com>
To: <ravi@cow.org>, "'Darrell Greenwood'" <lists2@telus.net>
Cc: "'nanog list'" <nanog@merit.edu>
Date: Sat, 10 Apr 2004 11:37:15 -0700
In-Reply-To: <20040410183029.GR58410@happy.cow.org>
Errors-To: owner-nanog-outgoing@merit.edu


Thank you for the input.  The 'unique' feature of this infestation is that
affected hosts don't transmit a lot of data...however they do open up
thousands of flows in a very short time.  Perhaps that's not unique but it
certainly is annoying.

Regards,
Christopher J. Wolff, VP CIO
Broadband Laboratories, Inc.
http://www.bblabs.com

> -----Original Message-----
> From: owner-nanog@merit.edu [mailto:owner-nanog@merit.edu] On Behalf Of
> ravi pina
> Sent: Saturday, April 10, 2004 11:30 AM
> To: Darrell Greenwood
> Cc: 'nanog list'
> Subject: Re: worm information
> 
> 
> On Sat, Apr 10, 2004 at 11:19:19AM -0700, Darrell Greenwood said at one
> point in time:
> >
> > On 04/4/10 at 1:53 PM -0400, Jeff Workman wrote the following :
> >
> >
> >http://securityresponse.symantec.com/avcenter/venc/data/w32.gaobot.um.htm
> >
> > File Not Found... 'l' missing from end of 'htm'.
> >
> >
> http://securityresponse.symantec.com/avcenter/venc/data/w32.gaobot.um.html
> 
> this is correct.  my organization has been infected with this
> and it is a particular nasty little bugger.  we may have been
> 'patient 0' in terms of sending copies of the virus to symantec
> so they could write signatures for it.  infected hosts flood
> the network with a tremendous amount of data and port opening.
> 
> i at least manged to quarantine off all my vpn devices which
> seemed to be the entry point.
> 
> -r
> 



home help back first fref pref prev next nref lref last post