Date: Tue, 13 Oct 1998 18:12:41 -0500 (CDT) From: Jay Nelson <jdn@acp.qiv.com> To: "Leonard C." <leonardc9@usa.net> Cc: security@FreeBSD.ORG Subject: Re: URGENT! Need help determining scope of attack... Message-ID: <Pine.BSF.3.96.981013174940.1244B-100000@acp.qiv.com> In-Reply-To: <v04011702b24835d1f943@[10.0.0.2]>
next in thread | previous in thread | raw e-mail | index | archive | help
I had a similar experience. In my case, an "Admin" claimed he was checking his network for BO vulnerability (a different ISP than ours) and also checked all the "dial-in" ips of _our_ ISP since many of his users had accounts with our ISP. He apologized for his "mistake." A call to his ISP resolved the issue. I've seen a Linux box that was breached (through imap, I think) that substituted a number of trojaned binaries and added a line to inetd.conf for service 31336 that called telnetd (one of the trojaned binaries.) They put a script called "d" in /sbin that inventoried the machine and shipped all the relevant information off to an ftp server that had a 5 second timeout. They ended up installing a port bomb and sniffer in a directory with permission 000 and used it against other machines. The back doors they use are configurable as to which port they attach and they seem to like 3133[5-9] because of all the BO publicity. So I'm a little sensitive to anything touching those ports. I contact their administrators, hostmasters or whomever I can locate when I see anything like this. Others have suggested you do the same and I would agree. -- Jay On Mon, 12 Oct 1998, Leonard C. wrote: >-----BEGIN PGP SIGNED MESSAGE----- >Hash: SHA1 > >When I checked my system's daily report today, I found this: > >> pid 7081 (telnet), uid 0: exited on signal 3 (core dumped) >> Connection attempt to UDP 169.229.87.xx:31337 from 169.229.93.66:1335 >> Connection attempt to UDP 169.229.87.xx:31337 from 169.229.93.66:1335 >> Connection attempt to UDP 169.229.87.xx:31337 from 169.229.93.66:1335 >> Connection attempt to UDP 169.229.87.xx:31337 from 169.229.84.53:1896 > >With the core dump and then the attempted connections to port 31337, I'm >suspecting that this is a script kiddy. What worries me is I'm unsure of >the scope of the attack. In the logs, right after the attack, there was an >su to root, but no new accounts have been added, nor any new uid 0 >accounts. There are also no new setuid programs either. > >Netstat also doesn't report anything listening on any new ports. > >Right now, I've disabled all services except for ssh, but I'm not too sure >what the next steps to take are. Also, I noticed that the attacks came >from two seperate IPs. Everybody here on the internal network has to use a >gateway in order to reach the outside network with a netmask of >255.255.255.0 (so, for me, it's 169.229.87.1). This gateway logs >everybody's MAC address before activating the port, and partitions it if a >different MAC address is later used. Can I be fairly certain then that the >IPs that the attacks came from are the correct ones? > >What are the next steps from here? Is there anything I can do to prevent >something like this from happening next time? Also, the core dump was from >telnet and I haven't heard of any new exploits on that. Any ideas on what >exactly happened? > >I know this is a lot of questions to throw at you, but I'm not really sure >what to do next. > >Thanks in advance for all of your help, > >Leonard > >**************************** >Note: The errors on the ed1 ethernet card are normal. I've tried to fudge >with the IRQ's, to no avail, but I keep getting these messages. Other than >errors, I've had no problems though. The power.leonard.com is a computer >on my internal network (10.0.0.0), so errors from qpopper on that are >mainly just me playing around with it. >/var/log/messages: > >Oct 10 03:51:22 icarus /kernel: Connection attempt to UDP >169.229.87.90:31337 fr >om 169.229.84.53:3039 >Oct 10 04:27:03 icarus /kernel: ed1: NIC memory corrupt - invalid packet length >2297 >Oct 10 04:39:10 icarus /kernel: ed1: device timeout >Oct 10 11:02:04 icarus /kernel: Connection attempt to UDP >169.229.87.90:31337 fr >om 169.229.84.53:3649 >Oct 10 12:58:18 icarus afpd[5988]: afp_die: asp_shutdown: Operation timed out >Oct 10 18:56:05 icarus /kernel: Connection attempt to UDP >169.229.87.90:31337 fr >om 169.229.84.53:4035 >Oct 10 21:59:48 icarus afpd[6475]: afp_die: asp_shutdown: Operation timed out >Oct 11 00:42:40 icarus /kernel: Connection attempt to UDP >169.229.87.90:31337 fr >om 169.229.84.53:1034 >Oct 11 02:28:34 icarus su: leonard to root on /dev/ttyp0 >Oct 11 02:45:58 icarus su: leonard to root on /dev/ttyp0 >Oct 11 02:49:40 icarus syslogd: exiting on signal 15 >Oct 11 02:51:13 icarus popper[7002]: @localhost.Berkeley.EDU: -ERR Unknown >comma >nd: "quyit". >Oct 11 03:00:37 icarus syslogd: exiting on signal 15 >Oct 11 03:01:43 icarus /kernel: pid 7081 (telnet), uid 0: exited on signal >3 (co >re dumped) >Oct 11 03:02:28 icarus popper[7090]: @localhost.Berkeley.EDU: -ERR Command >"a;jf >as;ldjfsdl;kjfsdl;akfjaslkd;f" (truncated) exceedes maximum permitted size. >Oct 11 03:45:39 icarus popper[7152]: @power.leonard.com: -ERR Unknown >command: " >get". >Oct 11 03:45:39 icarus popper[7152]: @power.leonard.com: -ERR Unknown >command: " >host:". >Oct 11 03:45:39 icarus popper[7152]: @power.leonard.com: -ERR Too many >arguments > supplied. >Oct 11 03:45:40 icarus popper[7152]: @power.leonard.com: -ERR Unknown >command: " >accept-language:". >Oct 11 03:45:40 icarus popper[7152]: @power.leonard.com: -ERR Unknown >command: " >connection:". >Oct 11 03:45:40 icarus popper[7152]: @power.leonard.com: -ERR Too many >arguments > supplied. >Oct 11 03:45:40 icarus popper[7152]: @power.leonard.com: -ERR Unknown >command: " >ua-os:". >Oct 11 03:45:40 icarus popper[7152]: @power.leonard.com: -ERR Unknown >command: " >ua-cpu:". >Oct 11 03:45:40 icarus popper[7152]: @power.leonard.com: -ERR Unknown >command: " >extension:". >Oct 11 03:45:48 icarus popper[7152]: @power.leonard.com: -ERR POP EOF received >Oct 11 03:56:45 icarus su: leonard to root on /dev/ttyp0 >re dumped) >Oct 11 03:02:28 icarus popper[7090]: @localhost.Berkeley.EDU: -ERR Command >"a;jf >as;ldjfsdl;kjfsdl;akfjaslkd;f" (truncated) exceedes maximum permitted size. >Oct 11 03:45:39 icarus popper[7152]: @power.leonard.com: -ERR Unknown >command: " >get". >Oct 11 03:45:39 icarus popper[7152]: @power.leonard.com: -ERR Unknown >command: " >host:". >Oct 11 03:45:39 icarus popper[7152]: @power.leonard.com: -ERR Too many >arguments > supplied. >Oct 11 03:45:40 icarus popper[7152]: @power.leonard.com: -ERR Unknown >command: " >accept-language:". >Oct 11 03:45:40 icarus popper[7152]: @power.leonard.com: -ERR Unknown >command: " >connection:". >Oct 11 03:45:40 icarus popper[7152]: @power.leonard.com: -ERR Too many >arguments > supplied. >Oct 11 03:45:40 icarus popper[7152]: @power.leonard.com: -ERR Unknown >command: " >ua-os:". >Oct 11 03:45:40 icarus popper[7152]: @power.leonard.com: -ERR Unknown >command: " >ua-cpu:". >Oct 11 03:45:40 icarus popper[7152]: @power.leonard.com: -ERR Unknown >command: " >extension:". >Oct 11 03:45:48 icarus popper[7152]: @power.leonard.com: -ERR POP EOF received >Oct 11 03:56:45 icarus su: leonard to root on /dev/ttyp0 >Oct 11 09:18:04 icarus /kernel: Connection attempt to UDP >169.229.87.90:31337 fr >om 169.229.93.66:1335 >Oct 11 10:49:14 icarus /kernel: Connection attempt to UDP >169.229.87.90:31337 fr >om 169.229.93.66:1335 >Oct 11 11:20:32 icarus /kernel: Connection attempt to UDP >169.229.87.90:31337 fr >om 169.229.93.66:1335 >Oct 11 15:57:49 icarus /kernel: Connection attempt to UDP >169.229.87.90:31337 fr >om 169.229.84.53:1896 >Oct 11 20:05:48 icarus afpd[8149]: afp_die: asp_shutdown: Operation timed out >Oct 11 21:14:00 icarus /kernel: ed1: NIC memory corrupt - invalid packet length >2301 >Oct 11 21:14:12 icarus /kernel: ed1: NIC memory corrupt - invalid packet length >2203 >Oct 11 21:14:41 icarus /kernel: ed1: NIC memory corrupt - invalid packet length >2179 >Oct 11 22:32:58 icarus arpwatch: 0:40:5:68:1:7a sent bad hardware format 0xe >Oct 12 00:13:59 icarus /kernel: ed1: NIC memory corrupt - invalid packet length >6016 >Oct 12 00:38:38 icarus afpd[202]: atp_sreq: Network is unreachable >Oct 12 00:38:59 icarus /kernel: ed1: device timeout >Oct 12 00:39:08 icarus afpd[202]: atp_sreq: Network is unreachable >Oct 12 00:39:55 icarus /kernel: ed1: NIC memory corrupt - invalid packet length >2122 >Oct 12 00:40:23 icarus /kernel: ed1: NIC memory corrupt - invalid packet length >2342 >Oct 12 00:43:51 icarus /kernel: ed1: NIC memory corrupt - invalid packet length >2062 >Oct 12 00:44:10 icarus /kernel: ed1: NIC memory corrupt - invalid packet length >2128 >Oct 12 00:45:38 icarus /kernel: Connection attempt to UDP >169.229.87.90:31337 fr >om 169.229.84.53:3744 >Oct 12 00:48:38 icarus /kernel: ed1: NIC memory corrupt - invalid packet length >2157 >Oct 12 00:48:46 icarus /kernel: ed1: NIC memory corrupt - invalid packet length >2168 >Oct 12 00:50:45 icarus /kernel: ed1: NIC memory corrupt - invalid packet length >2192 >Oct 12 01:13:35 icarus /kernel: ed1: NIC memory corrupt - invalid packet length >2066 >Oct 12 07:50:58 icarus /kernel: Connection attempt to UDP >169.229.87.90:31337 fr >om 169.229.84.53:4216 >Oct 12 10:08:51 icarus arpwatch: 0:e0:29:18:58:52 sent bad hardware format >0x800 >f > >**************************** >Daily security check output: > >checking setuid files and devices: > > >checking for uids of 0: >root 0 >toor 0 > > >icarus kernel log messages: >> 2:2082 >> pid 7081 (telnet), uid 0: exited on signal 3 (core dumped) >> Connection attempt to UDP 169.229.87.90:31337 from 169.229.93.66:1335 >> Connection attempt to UDP 169.229.87.90:31337 from 169.229.93.66:1335 >> Connection attempt to UDP 169.229.87.90:31337 from 169.229.93.66:1335 >> Connection attempt to UDP 169.229.87.90:31337 from 169.229.84.53:1896 >> ed1: NIC memory corrupt - invalid packet length 2301 >> ed1: NIC memory corrupt - invalid packet length 2203 >> ed1: NIC memory corrupt - invalid packet length 2179 >> ed1: NIC memory corrupt - invalid packet length 6016 >> ed1: device timeout >> ed1: NIC memory corrupt - invalid packet length 2122 >> ed1: NIC memory corrupt - invalid packet length 2342 >> ed1: NIC memory corrupt - invalid packet length 2062 >> ed1: NIC memory corrupt - invalid packet length 2128 >> Connection attempt to UDP 169.229.87.90:31337 from 169.229.84.53:3744 >> ed1: NIC memory corrupt - invalid packet length 2157 >> ed1: NIC memory corrupt - invalid packet length 2168 >> ed1: NIC memory corrupt - invalid packet length 2192 >> ed1: NIC memory corrupt - invalid packet length 2066 > > >icarus login failures: > > >icarus refused connections: > >- -- >Support the Blue Ribbon Campaign for free speech online () >http://www.eff.org/blueribbon.html /\ >"Those who will not reason perish in the act. >Those who will not act, perish for that reason." - W. H. Auden > >-----BEGIN PGP SIGNATURE----- >Version: PGPfreeware 6.0 for non-commercial use <http://www.pgp.com> > >iQA/AwUBNiKMUOAvLUJUxjQXEQLN2QCgwR0ANRboI2jvyXMoMUvvbW8KO2IAn2w+ >x6wRo16IjELRC9zoa7F6du35 >=lqn5 >-----END PGP SIGNATURE----- > >To Unsubscribe: send mail to majordomo@FreeBSD.org >with "unsubscribe freebsd-security" in the body of the message > To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.3.96.981013174940.1244B-100000>
