On Saturday 05 Nov 2005 14:42, [EMAIL PROTECTED] wrote:
> Hi again everyone,
>
> Got the same thing few minutes ago, coming from China this time, pointing
> to the same address for the download .... Seems to be spreading ? The
> downloaded file is definitely for Linux.

I got caught out by a vulnerability in awstats a few months back, used the 
same kind of method, put an executable in /tmp and ran it (somehow). It was 
being used to run a ddos attack, controlled by irc. Once I found it I removed 
it from /tmp and set the /tmp partition to noexec, upgraded awstats and added 
a search for 'wget' to my logwatch. Phew!

>
> Tudor
>
> __________________
>
> Hi everyone,
>
> Last night I caught an attack to my web servers here, the attack consisted
> in command execution attempts using various CGI vulnerabilities. The fact
> is that after looking at the payload of all connection attempts, they all
> had a "wget <IP Address>/lupii", same IP address, I can send it to the
> list if anybody needs it. I downloaded the file from that site, it is an
> elf executable and it seems to be a backdoor of some sort reporting back
> to the site. The attack was coming from Taiwan and the download site was
> in Norway.
>
> I am not good at looking at elf format programs, is anybody willing to
> take a look ? I can send the file on demand. Does anybody know what is
> this all about ?
>
> Thanks,
> Tudor
>
> _______________________________________________
> http://lurker.clamav.net/list/clamav-users.html

-- 
-----------------
Bob Hutchinson
Midwales dot com
-----------------
_______________________________________________
http://lurker.clamav.net/list/clamav-users.html

Reply via email to