针对非 ISP 主机的传出 DNS 洪水攻击

针对非 ISP 主机的传出 DNS 洪水攻击

以下是在网络边界监控到的来自 Vista 平台用户 PC 的具体流量。

我的问题不是洪水的影响,而是洪水的来源。这是某种已知的感染,还是只是某个应用程序失控了?正如用户告诉我的那样,标准的 NOD32 扫描没有发现任何东西。

谢谢您的任何提示。

14:40:10.115876 IP 192.168.7.42.4122 > 67.228.0.181.53: S 2742536765:2742536765(0) win 16384 <mss 1460,nop,nop,sackOK>
14:40:10.115943 IP 192.168.7.42.4124 > 67.228.181.207.53: S 3071079888:3071079888(0) win 16384 <mss 1460,nop,nop,sackOK>
14:40:10.116015 IP 192.168.7.42.4126 > 67.228.0.181.53: S 3445199428:3445199428(0) win 16384 <mss 1460,nop,nop,sackOK>
14:40:10.116086 IP 192.168.7.42.4128 > 67.228.181.207.53: S 2053198691:2053198691(0) win 16384 <mss 1460,nop,nop,sackOK>
14:40:10.116154 IP 192.168.7.42.4130 > 67.228.0.181.53: S 2841660872:2841660872(0) win 16384 <mss 1460,nop,nop,sackOK>
14:40:10.116222 IP 192.168.7.42.4132 > 67.228.181.207.53: S 3150822465:3150822465(0) win 16384 <mss 1460,nop,nop,sackOK>
14:40:10.116290 IP 192.168.7.42.4134 > 67.228.0.181.53: S 1692515021:1692515021(0) win 16384 <mss 1460,nop,nop,sackOK>
14:40:10.116358 IP 192.168.7.42.4136 > 67.228.181.207.53: S 3358275919:3358275919(0) win 16384 <mss 1460,nop,nop,sackOK>
14:40:10.116430 IP 192.168.7.42.4138 > 67.228.0.181.53: S 930184999:930184999(0) win 16384 <mss 1460,nop,nop,sackOK>
14:40:10.116498 IP 192.168.7.42.4140 > 67.228.181.207.53: S 1504984630:1504984630(0) win 16384 <mss 1460,nop,nop,sackOK>
14:40:10.116566 IP 192.168.7.42.4142 > 67.228.0.181.53: S 546074424:546074424(0) win 16384 <mss 1460,nop,nop,sackOK>
14:40:10.116634 IP 192.168.7.42.4144 > 67.228.181.207.53: S 4241828590:4241828590(0) win 16384 <mss 1460,nop,nop,sackOK>
14:40:10.116702 IP 192.168.7.42.4146 > 67.228.0.181.53: S 668634627:668634627(0) win 16384 <mss 1460,nop,nop,sackOK>
14:40:10.116769 IP 192.168.7.42.4148 > 67.228.181.207.53: S 3768119461:3768119461(0) win 16384 <mss 1460,nop,nop,sackOK>
14:40:10.117360 IP 192.168.7.42.4111 > 67.228.0.181.53:  12676 op8 Resp12*- [2128q][|domain]
14:40:10.117932 IP 192.168.7.42.4112 > 67.228.181.207.53:  44190 op7 NotAuth*|$ [29103q],[|domain]
14:40:10.118726 IP 192.168.7.42.4113 > 67.228.0.181.53:  49196 inv_q [b2&3=0xeea] [64081q] [28317a] [43054n] [23433au] Type63482 (Class 5889)? M-_^OS>M-JM-m^_M-i.[|domain]
14:40:10.119934 IP 192.168.7.42.4114 > 67.228.181.207.53:  48131 updateMA Resp12$ [43850q],[|domain]
14:40:10.121164 IP 192.168.7.42.4115 > 67.228.0.181.53:  46330 updateM% [b2&3=0x665b] [23691a] [998q] [32406n] [11452au][|domain]
14:40:10.121866 IP 192.168.7.42.4116 > 67.228.181.207.53:  34425 op7 YXRRSet* [39927q][|domain]
14:40:10.123107 IP 192.168.7.42.4117 > 67.228.0.181.53:  56536 notify+ [b2&3=0x27e6] [59761a] [23005q] [33341n] [29705au][|domain]
14:40:10.123961 IP 192.168.7.42.4118 > 67.228.181.207.53:  19323 stat% [b2&3=0x14bb] [32491a] [41925q] [2038n] [5857au][|domain]
14:40:10.132499 IP 192.168.7.42.4119 > 67.228.0.181.53:  50432 updateMA+ [b2&3=0x6bc2] [10733a] [9775q] [46984n] [15261au][|domain]
14:40:10.133394 IP 192.168.7.42.4120 > 67.228.181.207.53:  2171 notify Refused$ [26027q][|domain]
14:40:10.134421 IP 192.168.7.42.4121 > 67.228.0.181.53:  25802 updateM NXDomain*-$ [28641q][|domain]
14:40:10.135392 IP 192.168.7.42.4122 > 67.228.181.207.53:  2073 updateMA+ [b2&3=0x6d0b] [43177a] [54332q] [17736n] [43636au][|domain]
14:40:10.136638 IP 192.168.7.42.4123 > 67.228.0.181.53:  15346 updateD+% [b2&3=0x577a] [61686a] [19106q] [15824n] [37833au] Type28590 (Class 64856)? [|domain]
14:40:10.137265 IP 192.168.7.42.4124 > 67.228.181.207.53:  60761 update+ [b2&3=0x2b66] [43293a] [53922q] [23115n] [11349au][|domain]
14:40:10.148122 IP 192.168.7.42.4125 > 67.228.0.181.53:  3418 op3% [b2&3=0x1a92] [51107a] [60368q] [47777n] [56081au][|domain]

答案1

由于受到影响的两个 DNS 服务器均位于 SoftLayer(一家相当知名的托管公司)。

第一个问题是,为什么你的机器会从那里获取 DNS。由于该机器是客户端机器而不是服务器,因此你不会从该机器运行名称服务,因此,我怀疑有什么东西在那里重定向了特定应用程序的 DNS 请求。僵尸网络进程使用自己的 DNS 服务器,以便它们可以重定向僵尸以连接到它们选择的命令和控制网络,这种情况相当常见。这两个 IP 地址似乎都没有响应,并且似乎没有回答 DNS 查询,因此可能是一台被利用的机器被关闭了。

事实上,您确实记录了成功的请求,但现在机器没有响应,这又提供了一个数据点,表明有些事情不太对劲。

我会将该盒子从网络上移除并进行扫描,看看是否发现任何恶意软件。

相关内容