UDP port 4000 traffic: likely a new worm

Rodney Joffe rjoffe at centergate.com
Sun Mar 21 01:52:58 UTC 2004


Unfortunately the vulnerability has proven to not be restricted to port 4000. Keep monitoring SANS :-(

-----Original Message-----
From: Josh Richards <jrichard at digitalwest.net>
Date: Sat, 20 Mar 2004 13:50:30 
To:nanog at merit.edu
Subject: Re: UDP port 4000 traffic: likely a new worm


The good news is that "witty" appears to not be a very witty propagator.
Our flow data shows attempts to connect to 4000/udp on hosts in our 
network having a downward trend over the last few hours:

Time   Unique Source IPs
08:00	350 
09:00	332
10:00	297
11:00	298
12:00	265 

(all times PST)

-jr

* Josh Richards <jrichard at digitalwest.net> [20040320 11:10]:
> 
> Confirmed.  We had our first customer (colo) hit yesterday evening at 
> 20:43 PST.  Additionally, they experienced the hard drive corruption (which
> was added to the ISC diary entry within the last several hours).  Traffic 
> was 4000/udp.  Initial 90 Mbit/s peak which leveled out at a constant
> 60 Mbit/s before we took them off-line.
> 
> -jr
> 
> * Johannes B. Ullrich <jullrich at sans.org> [20040320 00:44]:
> > Looks like there may be a worm going around hitting systems that run
> > BlackIce. Common characteristics of the packets: Source port 4000 (but
> > random target port) and the string 
> > "insert witty message here".
> > 
> > details will be posted here:
> > http://isc.sans.org/diary.html
> > as I get them together.

-- 
Josh Richards            | Colocation   Web Hosting   Bandwidth
Digital West Networks    | +1 805 781-9378 / www.digitalwest.net
San Luis Obispo, CA      | AS14589 & AS29962
jrichard at digitalwest.net | DWNI - Making Internet Business Better




More information about the NANOG mailing list