[93193] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Sagonet - Failing miserably with network security Someone needs to handle this.

daemon@ATHENA.MIT.EDU (Jordan Medlen)
Mon Oct 30 15:41:46 2006

X-Antivirus-SAGONET-Mail-From: jmedlen@sagonet.com via mail.sagonet.com
In-Reply-To: <DEB70BE9B019B14EBE4D34B2FD2E74102139F20F@jabba.ad.newedgenetworks.com>
Cc: <chris_jester@suavemente.net>, <nanog@nanog.org>,
	<abuse@sagonet.com>
From: Jordan Medlen <jmedlen@sagonet.com>
Date: Mon, 30 Oct 2006 15:39:42 -0500
To: "Lasher, Donn" <DLasher@newedgenetworks.com>
Errors-To: owner-nanog@merit.edu


Customer has been nuked.

--
Jordan Medlen
Sago Networks

On Oct 30, 2006, at 11:54 AM, Lasher, Donn wrote:

>
>
> Not that this is his real name, or business, but a whois on the IP
> yields:
>
> [whois.arin.net]
> Sago Networks SAGO-20030401 (NET-65-110-32-0-1)
>                                   65.110.32.0 - 65.110.63.255
> Anton Tenev SAGO-65-110-62-120 (NET-65-110-62-120-1)
>                                   65.110.62.120 - 65.110.62.129
>
>
>
> -----Original Message-----
> From: owner-nanog@merit.edu [mailto:owner-nanog@merit.edu] On  
> Behalf Of
> Chris Jester
> Sent: Sunday, October 29, 2006 11:29 AM
> To: nanog@nanog.org
> Cc: abuse@sagonet.com
> Subject: Sagonet - Failing miserably with network security Someone  
> needs
> to handle this.
>
>
> 65.110.62.120
>
> Sagonet,
>
> We have a serious hacker here who is ACTIVLY engaged in logins on our
> network (have him in a honeypot at the moment). He is running exploits
> from your network and also I have been hearing from others that you  
> have
> been notified of this a few times yet have done nothing about it.  Can
> we get someone to handle this immediately please?
>
> This hacker has rooted at least 35 servers on a friends network
> (friendly
> competitor) and now hes scanning ours...
>
> This is what was said by my friend after contacting you guys about  
> this:
> "Good... They will not listen... I have provided them logs, screen
> shots, etc..."
>
> Additionally, I would LOVE to know what is on that server... this  
> guy is
> not to be taken lightly, he is VERY methodical and patient. He's
> problably owning your network too.
>
> [root@mail /home]# netstat -an
> Active Internet connections (servers and established)
> Proto Recv-Q Send-Q Local Address               Foreign Address
>
>  State
> tcp        0      0 0.0.0.0:21                  0.0.0.0:*
>
>  LISTEN
> tcp        0      0 :::38300                    :::*
>
>  LISTEN
> tcp        0      0 ::ffff:66.11.112.15:38300
> ::ffff:65.110.62.120:59979
>  ESTABLISHED
>  ESTABLISHED
>
>
>


home help back first fref pref prev next nref lref last post