The Hunt for RingZero (port 3128 scanning worm/trojan)

From: Andrew Daviel <andrew@dont-contact.us>
Date: Thu, 18 Nov 1999 11:07:46 -0800 (PST)

The SANS institute has been accepting reports of scanning activity on port
3128. It seems this is caused by a fairly sophisticated network virus.

On our lightly-loaded Squid (we don't enforce its use), recently about
30% of all access was denied (i.e. from offsite). No-one has asked
to subscribe to our cache, so it looks like this activity might
all be attributed to RingZero or other scanning activity.

One possibility, I suppose, is to move from 3128 to another port...

Andrew Daviel, TRIUMF, Canada
Tel. +1 (604) 222-7376
http://andrew.triumf.ca/andrew

---------- Forwarded message ----------
Date: Sun, 14 Nov 1999 16:02:07 -0700 (MST)
From: The SANS Institute <sans@sans.org>
To: Andrew Daviel <advax@triumf.ca>
Subject: SANS First Tuesday Announcement for November Webcasts

This note announces the November "First Tuesday" web broadcast. It's
a bit late this month due to rewriting of the registration software to
eliminate the requirement to re-register each month.

Please send any comments -- particularly problems -- to <kolstad@delos.com>
so I can resolve them. This new registration system uses the new fancy
software that should ease accessing all of our resources.

SANS is offering two presentations this month:

  * The Hunt for RingZero

    If you have been following the SANS reports, then you already know
    that during late September 1999 a lot of scanning activity was
    detected on ports 80, 8080, 3128. The SANS community was instrumental
    in collecting and analyzing the Trojan software used to launch these
    scans. John Green, leader of the DOD Shadow intrusion detection team
    recounts the story of the hunt and analysis and will bring us up to
    date on the latest information and provide his analysis of the
    implications of this attack.

  * The CVE Project

    This is a second Webcast on another community effort, the Common
    Vulnerability and Exposures project. Led by Mitre's Steven Christey
    and David Mann who narrate the webcast, CVE brings together
    researchers, leading industry vendors and practitioners to develop
    a common language for describing vulnerabilities and consensus list
    of vulnerabilities and exposures. CVE is our best chance of having
    different vendor's intrusion detection and vulnerability scanners
    interoperate. Learn what CVE is and isn't, the challenges the project
    faces and how you can use what has been developed and get involved
    to make it even better.

Here is the information you need to listen to the November presentations:

        When: Any time from now through November 30.
        Duration: under one hour for each presentation
        Cost: Free
        URL: http:/www.sans.org/sansgate

Visit the SANS presentation gateway at http://www.sans.org/sansgate to
type in your previous UserName/Password (or be reminded of them if you
previously registered and remember either your UserName or e-mail address
used for registration). It is easy to register for a new UserName and
Password if you don't already have one.

Please send us feedback at <info@sans.org> about the presentations so
we can continue to improve.

                                                Rob Kolstad
                                                SANS Program Manager

Rob Kolstad The SANS Institute sans@sans.org 301-951-0102
----- Upcoming Events: ------------------------ Current Publications: ----
Netwk Security SFO 99 (San Francisco, 12/99) SANS Network Security Digest
                                                        The SANS NT Digest
Windows NT Security: Step-by-Step SANS Newsbites Summary
Incident Handling: Step-by-Step Intrusion Detection: Shadow Style
WindowsNT Power Tools: Consensus 1998 SANS Salary Survey
See http://www.sans.org for info and bookstore
Received on Thu Nov 18 1999 - 12:22:54 MST

This archive was generated by hypermail pre-2.1.9 : Wed Apr 09 2008 - 11:57:32 MDT