![]() |
Quote:
|
A few good links on the current problem:
http://www.kb.cert.org/vuls/id/370308 http://average.matrix.net/Daily/markR.html |
Quote:
|
something tells me this is going to go on for a little bit of time... :(
surfers are going to be pissed! |
Quote:
someone fix the fucking plug! |
Zebra: good catch. I was just searching for the cert advisory on this too :P
|
it is a worm. fucken mother fuckers!
KD |
Quote:
http://west-boot.mfnx.net/traffic/iad/iad-nyc-oc48.html (Their MRTG is configged for recent == left) UUNet isn't the only one being hit - it's everywhere. I'm rejecting about 10 packets per minute on my cable modem. Oh joy, half the country's asleep, it'll likely only get worse as everyone wakes up, turns on their puters, and gets infected by whatever worm this is. What a day this will be :) |
I'm noticing a 60% drop in traffic since midnight EST... I think everyone here is underestimating the effect this is having on the internet rootservers! Not having any problems on my network to speak of, except that from different places in the country different routes seem to perhaps not be working.
Let's all cross our fingers. Brad |
Quote:
|
Damn man, sux to be you guys i been smokin all day 300k down easily.. good connection to all hosts that i have hit so far.. Dunno *shurgs*..
|
Quote:
|
Quote:
|
somoen said that SQL is effected, so does that mean SQL databased lost all data in them?
|
think its the [email protected] dude? :1orglaugh
|
Course I just have one little ole site to look at, but my traffic seems unphased so far.
Was having problems earlier getting to a few places, mostly seemed like Sprint out of Seattle for me. Better now, but still finding a few places I can't reach. |
http://forums.military.com/1/OpenTop...m=455198241 6
***************************************** MASSIVE DDOS ATTACKS ALL OVER U.S. -------------------------------------------------------------------------------- We are monitoring massive Distributed Denial of Service attacks all over the U.S. tonight starting at around 11:30 PM CST. As many as 5 of the 13 root nameserver have been down, up to 10 with massive packet loss (xx%): Internet Status to Root Name Servers Date: Fri Jan 24 21:37:00 PST 2003 Place Address Packet Loss Time: Min/Avg/Max Root b.root-servers.net 53% 25/40/48 Root c.root-servers.net 0% 82/82/82 Root e.root-servers.net 20% 16/29/33 Root f.root-servers.net 26% 17/27/32 Root h.root-servers.net 20% 91/101/108 Root i.root-servers.net 26% 190/199/205 Root j.root-servers.net 26% 81/91/96 Root k.root-servers.net 64% 172/188/201 Root l.root-servers.net 0% 5/5/6 Root m.root-servers.net 33% 160/171/205 GTLD b.gtld-servers.net 26% 52/63/67 GTLD c.gtld-servers.net 31% 85/93/95 GTLD d.gtld-servers.net 13% 88/100/103 GTLD f.gtld-servers.net 22% 38/50/57 GTLD i.gtld-servers.net 0% 198/200/203 GTLD k.gtld-servers.net 24% 90/100/105 GTLD l.gtld-servers.net 33% 128/138/171 All backbone providers are suffering major packet loss (XX%): Place Address Packet Loss Time: Min/Avg/Max AboveNet ns.above.net 28% 53/64/66 AGIS ns1.agis.net 26% 62/74/78 AlohaNet nuhou.aloha.net 35% 84/94/98 ANS ns.ans.net 26% 83/97/100 BBN-NearNet nic.near.net 28% 91/114/572 BBN-BARRnet ns1.barrnet.net 26% 16/26/32 Best ns.best.com 35% 79/89/95 Concentric nameserver.concentric.net 35% 18/31/56 CW ns.cw.net 28% 88/98/105 DIGEX ns.digex.net 31% 78/86/91 ENTER.NET dns.enter.net 28% 91/104/108 Epoch Internet ns1.hlc.net 33% 37/48/52 Flash net ns1.flash.net 17% 80/92/94 GetNet ns1.getnet.com 20% 40/52/56 GlobalCrossing name.roc.gblx.net 24% 85/97/104 GoodNet ns1.good.net 31% 83/92/97 GridNet grid.net 20% 80/92/101 IDT Net ns.idt.net 20% 91/104/121 Internex nic1.internex.net 26% 18/31/35 MCI ns.mci.net 22% 91/103/107 MindSpring itchy.mindspring.net 15% 75/88/106 NAP.NET ns2.nap.net 20% 73/85/94 PacBell ns1.pbi.net 0% 89/89/90 Primenet dns1.primenet.net 20% 31/41/45 PSI ns.psi.net 0% 82/84/160 RAINet ns.rain.net 31% 40/49/53 SAVVIS ns1.savvis.net 31% 88/99/102 SprintLink ns1.sprintlink.net 11% 15/27/35 UUNet,AlterNet auth00.ns.uu.net 26% 89/98/103 Verio-West ns0.verio.net 22% 31/42/47 Verio-East ns1.verio.net 22% 86/96/101 VISInet ceylon.visinet.ca 20% 102/116/188 MoonGlobal-ClubNET ns.clubnet.net 0% 0/1/2 MoonGlobal-Netway dns.nwc.net 4% 6/6/7 MoonGlobal-Netxactics verdi.netxactics.com 4% 6/6/7 InterWorld ns.interworld.net 0% 4/4/5 It's massive, no word on source yet. We are watching it closely. Brad G American Intelligence www.americanintelligence.us |
Quote:
MySQL runs on port 3306. I'm not noticing any unusual traffic there, I think it's safe to say that this is yet another Microsoft-only w3rm. |
Quote:
|
Quote:
Dood, wtf i got like.. 5 emails from that mofo... Werid... Im pretty sure it's some kind of worm but i wasn't sure who was sending it to me.. humph.. |
Yall know what?
The only thing that makes me sleep well during a crisis like this is the fact that I am NOT the one losing millions of $ when the shit hits the fan. :thumbsup |
Quote:
fuck that guy |
Quote:
|
I might have mis-reported the traffic drop I'm seeing on my SinHost, it looks like I've possibly got a bad port reading for the MRTG. I guess the important thing is that I haven't had any problems reaching my network at all. <phew>
Brad |
Quote:
http://vil.nai.com/vil/content/v_99950.htm |
Quote:
:1orglaugh :1orglaugh |
This is some major shit...
|
|
I have just received word that SpeakEasy DSL's security team has blocked all inbound UDP 1434. So at least there's a large batch of folks who will not be getting infected. Let's hope other ISPs follow suit, tout de suite...
|
Ok here's the deal
finally something conclusive!! One of my own servers running SQL seemed to be affected. I terminal service'd in and it was at 100% cpu utilization. From MRTG I could see that there was a problem because the system that normally averages 30kb/s out was at 2700kb/s out... evident of some type of outgoing attack. I was unable to just stop the SQL service so I set it to 'disable" and rebooted the fucker. Also, I disabled the RPC service. Then I rebooted. Everything looks ok, system is at 1% CPU utilization as usual and there is no more outgoing traffic... looks like I'll just wait till morning on this one to try and figure out how I can safely start the SQL service back up. This system WAS patched with the microsoft critical update just the other day. Not sure what's going on but I'm sure we'll see a definitive http://www.cert.org update shortly. Best of Luck Brad |
Quote:
|
Quote:
If /. goes with the story from "Slowdown" then ya heard it here first... heh heh |
Quote:
|
i bet $50 it wasn't a terrorist thang
|
Quote:
Brad |
Quote:
|
Quote:
|
Quote:
|
Quote:
|
Quote:
|
Couple choice quotes from IRC reflecting the monstrosity of this...
[02:10] [dba****] heh my tampa pop is moving 35 Megabits outbound. :) [02:10] [RyJ****] what's normal? [02:10] [dba****] at 3am EST? maybe half a megabit -- [03:20] [swi****] 5 minute output rate 6734000 bits/sec, 1937 packets/sec -- My cable conn is still averaging about 10 probes/minute: 00001 1720 694880 deny log udp from any to any 1434 All I can say is "yikes." Talk about a fucking waste of bandwidth... This is only gonna get worse throughout the day :/ |
nothing works fine for me :-(
|
It seems NGSS alerted M$ to this vulnerability on MAY 17, 2002. and there has been an available fix since July 24th ... :eek7
http://www.microsoft.com/technet/tre...n/MS02-039.asp :arcadefre |
The patch for MySQL 2000 servers and MDSE 2000 servers can be downloaded from here
http://www.microsoft.com/Downloads/R...eleaseID=40602 |
Quote:
|
so who all ended up going down, host wise?
|
So I figure I lost about $800 in revenue from this incident - the sales are coming in steady again now after about 8 hours of on-again-off-again disruption.
How much did you all lose out of this? My Linux server was not directly touched by this worm, but by virtue of being near some Windows servers, I got hit hard by this incident. It's time that the world's governments started taking cyberterrorism (hacking and virus writing) seriously. Some serious fucking jail time would be appropriate for these clowns. MafiaBoy got what, 4 months in reform school, for his games? Our elected representatives need to do better at protecting the internet economy. |
Quote:
|
:thumbsup
:ak47: :ak47: Hackers |
what is the bottom line here?
what is going down? all the big domain registrar seem to be down too... hackers attack from Iraq ? |
| All times are GMT -7. The time now is 05:37 PM. |
Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2025, vBulletin Solutions, Inc.
©2000-, AI Media Network Inc123