<?xml version='1.0' encoding='UTF-8'?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/'><id>tag:blogger.com,1999:blog-34036745</id><updated>2008-03-27T10:57:46.795-07:00</updated><title type='text'>Support Intelligence</title><link rel='alternate' type='text/html' href='http://blog.support-intelligence.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/34036745/posts/default?start-index=26&amp;max-results=25'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/34036745/posts/default'/><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://blog.support-intelligence.com'/><author><name>Support Intelligence</name></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>26</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-34036745.post-2980816142810407764</id><published>2007-09-07T12:40:00.000-07:00</published><updated>2007-09-07T13:07:40.363-07:00</updated><title type='text'>Wired Outs Pfizer</title><content type='html'>&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://blog.support-intelligence.com/uploaded_images/wired_logo-765032.gif"&gt;&lt;img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer;" src="http://blog.support-intelligence.com/uploaded_images/wired_logo-765028.gif" alt="" border="0" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Ryan Singel from Wired.com outted Pfizer yesterday in a great article based on Support Intelligence data.&lt;br /&gt;&lt;br /&gt;&lt;a href="http://www.wired.com/politics/security/news/2007/09/pfizerspam?currentPage=1"&gt;The article&lt;/a&gt;  highlights the ongoing security difficulties at the pharmaceutical giant despite our efforts to inform them of the situation over the past few months. And if I wasn't crying about how bad things are I'd be laughing because frequently the spam their bots send touts illegitimate knock-offs of their own flagship product, Viagra.&lt;br /&gt;&lt;br /&gt;The spam also promotes black-market versions of Cialis produced by competitor Eli Lilly, and Levitra by Bayer. Ruh roh.&lt;br /&gt;&lt;br /&gt;The good news for Pfizer is the makers of "Mandik", another  spammed  pharmaceutical coming out of their servers, are unlikely to sue anybody any time soon. Phew.&lt;br /&gt;&lt;br /&gt;On a more serious note - we've received spam from an absolute heap of Pfizer addresses, along with everyone else. In total 138 separate Pfizer IP addresses have turned up on various black lists. Holy cow Houston! This isn't a single employee surfing warez and getting infected - this is a serious breakdown of systemic control over their corporate network.&lt;br /&gt;&lt;br /&gt;The unfortunate bit about all this is the company was informed of the scope of the problem back in early April - over five months ago. It's hard to imagine that as an industry of security professionals we can't do better than this.</content><link rel='alternate' type='text/html' href='http://blog.support-intelligence.com/2007/09/wired-outs-pfizer.html' title='Wired Outs Pfizer'/><link rel='replies' type='application/atom+xml' href='http://blog.support-intelligence.com' title='Post Comments'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/34036745/posts/default/2980816142810407764'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/34036745/posts/default/2980816142810407764'/><author><name>Support Intelligence</name></author></entry><entry><id>tag:blogger.com,1999:blog-34036745.post-2606842597864259281</id><published>2007-06-25T13:41:00.000-07:00</published><updated>2007-06-25T14:19:11.599-07:00</updated><title type='text'>SI on the BBC</title><content type='html'>&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://news.bbc.co.uk/2/hi/technology/6226326.stm"&gt;&lt;img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer;" src="http://blog.support-intelligence.com/uploaded_images/bbc_logo-798608.gif" alt="" border="0" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;This week we've got a double-header for you - first read about &lt;a href="http://news.bbc.co.uk/2/hi/technology/6226326.stm"&gt;Support Intelligence on BBC News&lt;/a&gt;, then read about the security issues at the BBC we've observed.&lt;br /&gt;&lt;br /&gt;&lt;a href="http://news.bbc.co.uk/2/hi/technology/6226326.stm"&gt;The article&lt;/a&gt;, written by Mark Ward, highlights the message we've been bringing home in this blog - Corporations have a Bot Problem. The article relies on us as well as Tim Eades of the security firm Sana, and Alex  Raistrick of Con Sentry in outlining the problem with infected PC's. All in all it should be familiar stuff to the readers of this blog, but we're happy to see the message continuing to echo farther and farther afield.&lt;br /&gt;&lt;br /&gt;The next best thing about our conversation with Mark Ward was the opportunity if afforded us to tell someone at the BBC about the security problems on their network. And I must say, they took it quite in stride. Fortunately the problems were fairly benign.&lt;br /&gt;&lt;br /&gt;We began tracking the BBC in late February and started receiving spam from them almost immediately on a nearly daily basis for several months in a row. All the spam flowed through: 212.58.224.18, mail0.thdo.bbc.co.uk, which is the same mail server that provides the "Email a friend" facilty on the BBC's main website http://www.bbc.co.uk.  This is a separate mailserver than the one that outbound BBC employee mail comes from, or that delivers Radio 4 newsletters and such.&lt;br /&gt;&lt;br /&gt;All the spam showed received headers from BBC webservers internal facing addresses such  as www3-mgt.thny.bbc.co.uk - 192.168.208.33 and www15-mgt.thdo.bbc.co.uk 192.168.201.115.&lt;br /&gt;&lt;br /&gt;Were these bots at work on the BBC network?  Possibly. A much more likely explanation however is an insecure script on one or two of their webservers allowing them to proxy mail which the spammers identified. Possibly a cross-site scripting vulnerability or sql injection attack.&lt;br /&gt;&lt;br /&gt;Whatever the case, the good news is the BBC folks apparently nabbed it - all malicious activity stopped dead on the 23rd of May, prior, in fact to our notification.  Hats off the the BBC security team for plugging the hole and stopping their flow of spam.&lt;br /&gt;&lt;br /&gt;See - sometimes these stories do have a happy ending.</content><link rel='alternate' type='text/html' href='http://blog.support-intelligence.com/2007/06/si-on-bbc.html' title='SI on the BBC'/><link rel='replies' type='application/atom+xml' href='http://blog.support-intelligence.com' title='Post Comments'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/34036745/posts/default/2606842597864259281'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/34036745/posts/default/2606842597864259281'/><author><name>Support Intelligence</name></author></entry><entry><id>tag:blogger.com,1999:blog-34036745.post-1769117779566707659</id><published>2007-05-23T10:39:00.000-07:00</published><updated>2007-05-23T12:35:37.264-07:00</updated><title type='text'>Company Profile: IndymacBank</title><content type='html'>&lt;img src="http://www.indymac.com/bankauto/ui/images/IMB.gif" /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Golly, now it's getting personal. IndymacBank isn't just a lending giant with $1.34 billion in revenue - they also hold the mortgage to my house. And in addition to my monthly payment reminder in May, this month they also sent over a little something extra:&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://blog.support-intelligence.com/uploaded_images/imb-cares-702101.gif"&gt;&lt;img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer;" src="http://blog.support-intelligence.com/uploaded_images/imb-cares-702090.gif" alt="" border="0" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Gosh, and all this time I thought they only cared about the size of my check. Who knew?&lt;br /&gt;&lt;br /&gt;But should we blog about them we asked ourselves?  This particular run lasted only 44 minutes, on the 21st of May.  And prior to that Indymac was clean for 80 days - not a single sign of bot activity. Could be a sign of an excellent effort.&lt;br /&gt;&lt;br /&gt;But... wait, this wasn't the only incident - we spotted a second occurrence on the 1st of March which blasted stock spam for 1 hour 16 minutes, and a third on February 27th pumping pharmaceuticals and stocks for a similarly brief amount of time.&lt;br /&gt;&lt;br /&gt;So what gives?&lt;br /&gt;&lt;br /&gt;All this garbage came from a single IP address: 65.214.149.253, routed by ASN 19347, and showing no reverse DNS.   We get a fair amount of marketing mail from Indymac via 63.251.196.251, obb.indymacbank.com, and other mail from 70.42.8.249, smtpout002.indymacbank.com, but never anything bot related and both look like completely legitimate senders.&lt;br /&gt;&lt;br /&gt;So, as the guy with his personal information at this bank, including my social security number, income details, and event the square footage of my bathroom, &lt;span style="font-weight: bold;"&gt;It bothers me that some unknown host on their corporate network is controlled by a third party over which they exert no legal or operational control.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;And though I'm hoping that what this evidence shows is a very diligent sec-ops team hard at work shutting down the bots as soon as they pop up, my concern is I have no idea if that's really the case. Is this a single host that's been hacked since February 27th, possibly datamining, and password sniffing the whole time? Or is this three separate incidents, each of which was stamped out within an hour or so? Even if this best case scenario is true - how do I know these systems weren't hacked long before they ever started spewing spam? How do I know I'm safe if they can't even stop themselves from sending out photos of smiling young ladies touting two foot phalli? Does it get anymore outrageous?&lt;br /&gt;&lt;br /&gt;People - this is a bank. Think about it...&lt;br /&gt;&lt;br /&gt;But what's the point? Is it that Indymac are bad guys? No. Is it that the internet is a scarry place? Sort of. Is it that I need to be concerned about my personally identifiable information. Absolutely.&lt;br /&gt;&lt;br /&gt;The whole point of this blog is to raise awareness about the Botwar going on - a war raging around us as we speak. We can smile and laugh about penis spam, but the fact is that millions of carjacked computers, controlled by criminal third parties are doing god knows what 24/7, inside our homes, our hospitals, our government offices, our corporations, and even inside our banks. And in this case, inside my bank.&lt;br /&gt;&lt;br /&gt;Our goal is not to make these hard working sec-ops folks look bad, but instead to help raise awareness with their CIO's, CEO's, and even the general public, so they can get the funding and support they need to fight this problem. It's raging around us. It's a predatory criminal activity making victims of&lt;span style="font-weight: bold;"&gt; many &lt;/span&gt;organizations. We can stick our heads in the sand or we can fight it.&lt;br /&gt;&lt;br /&gt;So corporate American CIOs - Which are you gonna do?&lt;br /&gt;&lt;br /&gt;CustName:    INDYMAC&lt;br /&gt;Address:        155 North Lake Ave&lt;br /&gt;City:               Pasadena&lt;br /&gt;StateProv:    CA&lt;br /&gt;PostalCode:   91101&lt;br /&gt;Country:        US&lt;br /&gt;RegDate:        2006-01-13&lt;br /&gt;Updated:        2006-01-13&lt;br /&gt;&lt;br /&gt;NetRange:      65.214.149.0 - 65.214.149.255&lt;br /&gt;CIDR:              65.214.149.0/24&lt;br /&gt;NetName:       UU-65-214-149-D6&lt;br /&gt;NetHandle:     NET-65-214-149-0-1&lt;br /&gt;Parent:            NET-65-192-0-0-1&lt;br /&gt;NetType:        Reassigned&lt;br /&gt;Comment:      Addresses within this block are non-portable.&lt;br /&gt;RegDate:        2006-01-13&lt;br /&gt;Updated:        2006-01-13</content><link rel='alternate' type='text/html' href='http://blog.support-intelligence.com/2007/05/company-profile-indymacbank.html' title='Company Profile: IndymacBank'/><link rel='replies' type='application/atom+xml' href='http://blog.support-intelligence.com' title='Post Comments'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/34036745/posts/default/1769117779566707659'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/34036745/posts/default/1769117779566707659'/><author><name>Support Intelligence</name></author></entry><entry><id>tag:blogger.com,1999:blog-34036745.post-8489844439619042000</id><published>2007-05-09T15:32:00.002-07:00</published><updated>2007-05-09T16:19:30.374-07:00</updated><title type='text'>Company Profile: Intel</title><content type='html'>&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://blog.support-intelligence.com/uploaded_images/intel.logo-716466.gif"&gt;&lt;img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer;" src="http://blog.support-intelligence.com/uploaded_images/intel.logo-716464.gif" alt="" border="0" /&gt;&lt;/a&gt;Question: Do bots affect high tech companies too? Answer: Yes, even high tech companies fall prey to these crimes. Today we have Intel squirting out botspam with the best of 'em, in a very recent infection somewhere on their network.&lt;br /&gt;&lt;br /&gt;A trio of IP addresses, all with no reverse DNS, have been firing off stock pump and dump, viagra, and home loan spam the past few days - the first of this run being spotted on April 29th.&lt;br /&gt;&lt;br /&gt;   192.55.60.93&lt;br /&gt;   134.191.248.4&lt;br /&gt;   134.191.248.1&lt;br /&gt;&lt;br /&gt;All are routed via origin AS 4983 INTEL-SC-AS - Intel Corporation - the first being domestic, and the later two routing to approximately Haifa, Israel.&lt;br /&gt;&lt;br /&gt;Previously we'd spotted 192.102.209.12 shooting out Cialis spam back on April 21st, but the good folks at Intel shut it down within half a day - so hardly worth mentioning. But this run seems to have lasted 8 or 9 days since inception (with nothing in the past 24 hours, so hopefully they've nailed it already).&lt;br /&gt;&lt;br /&gt;My favorite piece of garbage sent from this batch of Intel spam brought the following title -&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;Subject: &lt;/span&gt;Gimme your thoughts on this&lt;br /&gt;&lt;br /&gt;&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://blog.support-intelligence.com/uploaded_images/Intelspam-728885.gif"&gt;&lt;img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer;" src="http://blog.support-intelligence.com/uploaded_images/Intelspam-728884.gif" alt="" border="0" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Indeed, gimme your thoughts...</content><link rel='alternate' type='text/html' href='http://blog.support-intelligence.com/2007/05/company-profile-intel_9174.html' title='Company Profile: Intel'/><link rel='replies' type='application/atom+xml' href='http://blog.support-intelligence.com' title='Post Comments'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/34036745/posts/default/8489844439619042000'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/34036745/posts/default/8489844439619042000'/><author><name>Support Intelligence</name></author></entry><entry><id>tag:blogger.com,1999:blog-34036745.post-3241936173463177605</id><published>2007-05-08T15:24:00.001-07:00</published><updated>2007-05-08T15:24:44.753-07:00</updated><title type='text'>Company Profile: ATA Airlines</title><content type='html'>&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://blog.support-intelligence.com/uploaded_images/ATA-763064.jpg"&gt;&lt;img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer;" src="http://blog.support-intelligence.com/uploaded_images/ATA-763060.jpg" alt="" border="0" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;So, it looks like banks, insurance companies, publishers, manufacturers, and retailers all have problems with bots. But do airlines have problems with bots? You betcha.&lt;br /&gt;&lt;br /&gt;On April 7th, something at ATA Airlines changed. Out of previous total silence, spam started arriving in our traps from ATA. It was clearly botspam, this time pushing Humet PBC, which trades as L9Z.F on the Frankfurt Stock Exchange. According to the good folks at &lt;a href="http://www.spamnation.info/go/stock/L9Z.F"&gt;Spamnation&lt;/a&gt;, this was part of a two part run between March 31st, and April 19th perpetrated on this stock.&lt;br /&gt;&lt;br /&gt;All the spam from ATA touting the stock came from a single IP address: 205.245.253.165 - h-253-165.iflyata.com. The spam was nearly identical, 100% of it touted the same company, and the run itself lasted three days, peaking in the middle.  Then poof - radio silence again.&lt;br /&gt;&lt;br /&gt;Until the 28th of April that is when stock spam started arriving in our traps from ATA a second time. This run came from a different IP address: 205.245.253.225, resolving to h-253-225.iflyata.com. Again, the spam uniformly pumped a single stock - Electronic Koursewar - EKII.PK -,  which was part of a much larger, distributed spam run, used forged received headers ( some from unrouted IANA space) , and mysteriously disappeared after three days.&lt;br /&gt;&lt;br /&gt;Did ATA catch the problem and shut it down? We sure hope so. Out of the 10 weeks we've been watching ATA, they've sent spam on only six days, so hopefully this is a sign of a vigilant, if not perfect, security regimen.&lt;br /&gt;&lt;br /&gt;Will the problem spring back up a third time? Were these systems also key-logging? Is there a drop file somewhere with other information in it? Impossible for us to say, but someone has to ask the question. Neither of the IP addresses delivering the botspam to us delivered a single piece of legitimate mail, and neither appear to be regular mail transfer agents - so what are they?&lt;br /&gt;&lt;br /&gt;And if the IT security of civilian airlines isn't enough to get your attention, don't forget, ATA is also a big time carrier for the U.S. military, operating charter missions around the globe everyday.&lt;br /&gt;&lt;br /&gt;And so, the bots rampage on...&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://blog.support-intelligence.com/uploaded_images/spamnumbers-705867.gif"&gt;&lt;img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer;" src="http://blog.support-intelligence.com/uploaded_images/spamnumbers-705865.gif" alt="" border="0" /&gt;&lt;/a&gt;</content><link rel='alternate' type='text/html' href='http://blog.support-intelligence.com/2007/05/company-profile-ata-airlines.html' title='Company Profile: ATA Airlines'/><link rel='replies' type='application/atom+xml' href='http://blog.support-intelligence.com' title='Post Comments'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/34036745/posts/default/3241936173463177605'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/34036745/posts/default/3241936173463177605'/><author><name>Support Intelligence</name></author></entry><entry><id>tag:blogger.com,1999:blog-34036745.post-3973573281524560998</id><published>2007-04-30T22:50:00.000-07:00</published><updated>2007-05-01T18:20:21.514-07:00</updated><title type='text'>Company Profile: Nationwide Insurance</title><content type='html'>&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://blog.support-intelligence.com/uploaded_images/nationwide_logo-762373.gif"&gt;&lt;img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer;" src="http://blog.support-intelligence.com/uploaded_images/nationwide_logo-762371.gif" alt="" border="0" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;We have been watching the Nationwide Insurance Network for a few months now, and have been impressed with the spam/ham ratio. Its spammyness is something like 100:1 in spam to ham. We have collected some 1,857 SPAM from 6 IP addresses on Nationwide's Network. The breakdown of spam and the hosts that sent it out are listed below:&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://blog.support-intelligence.com/uploaded_images/table2-716090.gif"&gt;&lt;img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer;" src="http://blog.support-intelligence.com/uploaded_images/table2-716088.gif" alt="" border="0" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;The kinds of spam we received from Nationwide included Pharmacy spam advocating various Erectile Dysfunctions drugs, Rolex watches, graphic pornography, mortgage loans, weight loss and stock pump-n-dump. While writing this blog post we received 10 more stock pump-n-dumps touting stock ticker &lt;a href="http://www.pinksheets.com/quote/chart.jsp?symbol=EKII"&gt;EKII&lt;/a&gt; which is down 9% as of Monday evening. Senderbase.com lists &lt;a href="http://www.senderbase.org/search?showRBL=1&amp;searchBy=ipaddress&amp;amp;searchString=155.188.254.1"&gt;155.188.254.1 &lt;/a&gt;as having a 10% increase in daily activity and notes that the host is blacklisted by SORBS.&lt;br /&gt;&lt;br /&gt;The main question is if any of Nationwide's consumer data was compromised. We believe that 155.188.254.1 is an outbound NAT and that the 1,342 SPAM emitted from that IP address represent some set of internal machines that are compromised. The way that the headers were forged leads us to believe that there were several machines behind the suspected NAT.&lt;br /&gt;&lt;br /&gt;Most malware does some form of key logging or post logging. Could an infection of this size compromise the integrity of their consumer data? Remember that in the &lt;a href="http://www2.csoonline.com/blog_view.html?CID=32752"&gt;TJX Data Breach&lt;/a&gt; researchers still don't understand how they got in, how they unencryped the data and the company is currently facing litigation in excess of over 1.6 Billion.  CISOs need to understand that todays malware easily captures data before it gets encrypted and moves it off corporate networks without setting off an IDS. A good hint -- if your company is sending out spam you probably have a good botnet infection.&lt;br /&gt;&lt;br /&gt;When we finally do get an IT security manager on the phone the first question they ask is if any of these spam have been forged. We answer this question as follows:&lt;br /&gt;&lt;ul&gt;&lt;li&gt;We track all BGP announcements since Jan 2005. We monitor the BGP at several locations including our trap locations.&lt;br /&gt;&lt;/li&gt;&lt;li&gt;We match up any bogons or route hijackings with the TCP connect data our spamtraps collect.&lt;br /&gt;&lt;/li&gt;&lt;li&gt;AS26578 [ NATIONWIDEASN2 - Nationwide Services, Inc ] which is responsible for routing the addresses in question has not had a routing hijack during our period of analysis.&lt;br /&gt;&lt;br /&gt;Furthermore, based on observations, had one of these blocks been hijacked the block would have had to be hijacked for a continuous period of several months. Such a routing hijack would have also been noticed as it would have effected outbound corporate e-mail delivery.&lt;/li&gt;&lt;/ul&gt;From the points above we conclude that the Nationwide Insurance network blocks were not hijacked in any way; and that several machines internal to their network have been compromised to send SPAM to the greater population of Internet users.&lt;br /&gt;&lt;br /&gt;Not every Fortune 500 company we analyze are in as bad of shape as Nationwide Insurance. For example, we haven't received a single SPAM from Geiko Insurance during the same period. Next week we will let you know if Nationwide has brought their systems under control and if they have mitigated their problems.&lt;br /&gt;&lt;br /&gt;We're of course ready to share information with Nationwide to help track the problem down and get it stopped.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-size:85%;"&gt;&lt;span style="font-family:courier new;"&gt;&lt;pre&gt;&lt;br /&gt;&lt;span style="font-family:courier new;"&gt;OrgName:    Nationwide Mutual Insurance Company &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:courier new;"&gt;OrgID:      NMI-20&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:courier new;"&gt;Address:    One Nationwide Plaza&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:courier new;"&gt;City:       Columbus&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:courier new;"&gt;StateProv:  OH&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:courier new;"&gt;PostalCode: 43215&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:courier new;"&gt;Country:    US&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="font-family:courier new;"&gt;NetRange:   155.188.0.0 - 155.188.255.255 &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:courier new;"&gt;CIDR:       155.188.0.0/16 &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:courier new;"&gt;NetName:    NATE&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:courier new;"&gt;NetHandle:  NET-155-188-0-0-1&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:courier new;"&gt;Parent:     NET-155-0-0-0-0&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:courier new;"&gt;NetType:    Direct Assignment&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:courier new;"&gt;NameServer: NNS1.NATIONWIDE.COM&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:courier new;"&gt;NameServer: NNS2.NATIONWIDE.COM&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:courier new;"&gt;Comment:    &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:courier new;"&gt;RegDate:    1991-11-21&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:courier new;"&gt;Updated:    2006-08-03&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="font-family:courier new;"&gt;OrgTechHandle: CLW-ARIN&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:courier new;"&gt;OrgTechName:   West, Cher L.&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:courier new;"&gt;OrgTechPhone:  +1-614-249-8631&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:courier new;"&gt;OrgTechEmail:  westc1@nationwide.com&lt;br /&gt;&lt;br /&gt;------- ASN Deligation ------&lt;br /&gt;OrgName:    Nationwide Services, Inc&lt;br /&gt;OrgID:      NATION-354&lt;br /&gt;Address:    ONE NATIONWIDE PLAZA&lt;br /&gt;Address:    M.S. 1-05-31&lt;br /&gt;City:       COLUMBUS&lt;br /&gt;StateProv:  OH&lt;br /&gt;PostalCode: 43215&lt;br /&gt;Country:    US&lt;br /&gt;&lt;br /&gt;ASNumber:   26578&lt;br /&gt;ASName:     NATIONWIDEASN2&lt;br /&gt;ASHandle:   AS26578&lt;br /&gt;Comment:&lt;br /&gt;RegDate:    2002-10-21&lt;br /&gt;Updated:    2002-10-21&lt;br /&gt;&lt;br /&gt;RTechHandle: CLW-ARIN&lt;br /&gt;RTechName:   West, Cher L.&lt;br /&gt;RTechPhone:  +1-614-249-8631&lt;br /&gt;RTechEmail:  westc1@nationwide.com&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-family:courier new;"&gt;&lt;/span&gt;&lt;/pre&gt;&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;</content><link rel='alternate' type='text/html' href='http://blog.support-intelligence.com/2007/04/company-profile-nationwide-insurance.html' title='Company Profile: Nationwide Insurance'/><link rel='replies' type='application/atom+xml' href='http://blog.support-intelligence.com' title='Post Comments'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/34036745/posts/default/3973573281524560998'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/34036745/posts/default/3973573281524560998'/><author><name>Support Intelligence</name></author></entry><entry><id>tag:blogger.com,1999:blog-34036745.post-209490496341561410</id><published>2007-04-26T09:15:00.000-07:00</published><updated>2007-04-26T13:19:30.977-07:00</updated><title type='text'>Company Profile: Affiliated Computer Services</title><content type='html'>&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://blog.support-intelligence.com/uploaded_images/acs_logo-707288.gif"&gt;&lt;img style="float:left; margin:0 10px 10px 0;cursor:pointer; cursor:hand;" src="http://blog.support-intelligence.com/uploaded_images/acs_logo-707287.gif" border="0" alt="" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;We started our tracking project for Affiliated Computer Services on March 10th. It took about a week to catch our first spam from this company which does BPO for numerous corporate clients. On the 18th we received an offer soliciting  &lt;span style="font-weight: bold;"&gt;Russian Lovers&lt;/span&gt; from 63.87.170.71 better known as  &lt;span style="font-weight: bold;"&gt;pat.acs-inc.com.&lt;/span&gt; This single machine sent us 96 additional spams over the next few weeks.&lt;br /&gt;&lt;br /&gt;The flow began as image spam touting various pharmaceuticals and masculine enlargement techniques. Eventually the content changed to Hooudia diet supplements and OEM Software. It wasn't until the 23rd of March that 63.87.170.71 really started to spew however. This address then delivered us another 174 spam on similar topics plus a stock pump-n-dump pushing &lt;a href="http://finance.yahoo.com/q/bc?s=CWTD.OB&amp;t=3m&amp;amp;l=on&amp;z=m&amp;amp;q=l&amp;amp;c="&gt;CWDT.OB (yahoo charts)&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;The interesting thing is that during the time the Affiliated Computer Services computers were filling your and my inboxes with stock spam, the stock for CWDT did actually swing back and forth. There has been a fair amount of research into stock touting and its apparent effectiveness. Meaning that the spam emitting from Affiliated Computer Services might have played a role in some investor loosing their shirt purchasing CWTD. For more information on stock spam touting see &lt;a href="http://papers.ssrn.com/sol3/papers.cfm?abstract_id=920553"&gt;Spam Works: Evidence from Stock Touts and Corresponding Market Activity.&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;These two ip addresses continued to spew until the 16th of April. All in all we received almost 300 SPAM/UCE from ACS. Between the Stock spam or the genital enlargement it's hard to say which is most bothersome.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-family:Arial, Helvetica;font-size:100%;"&gt;&lt;strong&gt;&lt;/strong&gt;&lt;/span&gt;</content><link rel='alternate' type='text/html' href='http://blog.support-intelligence.com/2007/04/company-profile-affiliated-computer.html' title='Company Profile: Affiliated Computer Services'/><link rel='replies' type='application/atom+xml' href='http://blog.support-intelligence.com' title='Post Comments'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/34036745/posts/default/209490496341561410'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/34036745/posts/default/209490496341561410'/><author><name>Support Intelligence</name></author></entry><entry><id>tag:blogger.com,1999:blog-34036745.post-4391064961655310269</id><published>2007-04-25T17:12:00.000-07:00</published><updated>2007-04-26T12:46:28.219-07:00</updated><title type='text'>Borders Group: Books or Bots - A look at a Six Country Spam Run</title><content type='html'>&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://blog.support-intelligence.com/uploaded_images/borders_logo-726459.gif"&gt;&lt;img style="float:left; margin:0 10px 10px 0;cursor:pointer; cursor:hand;" src="http://blog.support-intelligence.com/uploaded_images/borders_logo-726456.gif" border="0" alt="" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Borders seems to do a fairly good job with their containment; unfortunately today we bring you an analysis of a Pharmaceutical spam run launched from Borders servers between March 29 and April 3rd that used resources from six different countries. &lt;br /&gt;&lt;br /&gt;As the story goes, on March 29th we began receiving botspam messages from 198.179.227.25 on the Borders network sending us off to buy Viagra at domains created March 23rd and registered to:&lt;br /&gt;&lt;br /&gt;   Icek Pankovich&lt;br /&gt;   Sos. Mihai Bravu,No. 5&lt;br /&gt;   Bl. 4, Entr. 4, Apt. 9&lt;br /&gt;   Bucuresti, Sector 2 76101&lt;br /&gt;   Romania&lt;br /&gt;   +040.0212516407&lt;br /&gt;   +040.0212516407&lt;br /&gt;   icek_pankovich@yahoo.com&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;The domains are serviced by Name Servers hosted in Iran, Chile, and Argentina, and registered to owners in China and Texas. All three Name Server domains were registered in February or March of '07, with a 1 year expiration - quite cheaply disposable.&lt;br /&gt;&lt;br /&gt;   Name Server: ns1.nopadvene.com&lt;br /&gt;   Name Server: ns2.razovinag.com&lt;br /&gt;   Name Server: ns1.thefeminine.net&lt;br /&gt;&lt;br /&gt;The websites themselves were ultimately hosted by China Telecom, somewhere in Shandong Province. &lt;br /&gt;&lt;br /&gt;Address: 222.173.251.30&lt;br /&gt;&lt;br /&gt;So as you can see, this single SPAM run makes a six country tour in its setup and makes a nice little case study in how crooks create jurisdictional nightmares to cover their tracks. Odds of successful prosecution anyone?&lt;br /&gt;&lt;br /&gt;Strangely, on the Borders side there are also wiggles that make the diagnosis less than straightforward. The reverse DNS for the ip address sending all this SPAM points to bordersgroupinc.com, however, the forward A Record for bordersgroupinc.com points to 152.160.1.28 which is routed by AS4595 (ICNET).&lt;br /&gt;&lt;br /&gt;It's odd that the machine at 198.179.227.25 has a reverse entry pointing to bordersgroupinc.com. Could this be the outbound facing NAT? Well, the box in question (if it was a box) forged headers from Yahoo, Google, Gmail and others - noticeably lacking any DomainKeys headers that indicate legitimate mail from Yahoo!&lt;br /&gt;&lt;br /&gt;As for the legitimate Borders mail, it comes from 198.179.227.40 - outboundsmtp.bordersgroupinc.com. And all the mail from this server has Received headers from internal RFC1918 space with reverse DNS pointing to an internal zone claiming to be corpex01.bgpcorp.net which doesn't jive with the global DNS, but seems more or less legit.  All of which just shows some of the oddities encountered when tracking these types of incidents down.&lt;br /&gt;&lt;br /&gt;This kind of compromise happens every day to large and small companies, with the odds of successful prosecution of the criminals involved nearly zero. On the positive side, we're happy to report that Borders was able to mitigate the infection within a week, which is fast compared to some companies that have had infections for months. Stay tuned, we'll be highlighting some of those shortly.&lt;br /&gt;&lt;br /&gt;We'll also review some of the companies we've analyzed over the past few weeks to see if any have cleaned themselves up or continue to pollute our mail boxes.&lt;br /&gt;&lt;br /&gt;&lt;blockquote&gt;&lt;/blockquote&gt;&lt;blockquote style="font-family: courier new;"&gt;&lt;span style="font-size:85%;"&gt;&lt;pre&gt;&lt;br /&gt;X-SENDER-IP: 198.179.227.25&lt;br /&gt;X-HELO: bordersgroupinc.com&lt;br /&gt;X-UUID: 9d9baf6b-f6aa-4261-9d50-598887d541ff&lt;br /&gt;X-ECP: BordersGroup&lt;br /&gt;Return-Path: &amp;lt;sociologistsoot's@partyallnight.net&amp;gt;&lt;br /&gt;Received: from 66.196.126.37 (HELO mx5.biz.mail.yahoo.com)&lt;br /&gt;     by locaos.com with esmtp (20Q,WW067.4I )HQ8)&lt;br /&gt;     id 5.0GBD-IAQ'IF-,2&lt;br /&gt;     for rry563@locaos.com; Thu, 29 Mar 2007 13:56:55 +0400&lt;br /&gt;From: "Denis Denton" &lt;sociologistsoots@partyallnight.net&gt;&lt;br /&gt;To: &lt;rry563@locaos.com&gt;&lt;br /&gt;Subject: Fwd: Pharmacy bulletin&lt;br /&gt;Date: Thu, 29 Mar 2007 13:56:55 +0400&lt;br /&gt;Message-ID: &lt;01c7720a$1c87cdd0$6c822ecf@sociologistsoot's&gt;&lt;br /&gt;MIME-Version: 1.0&lt;br /&gt;Content-Type: multipart/alternative;&lt;br /&gt;        boundary="----=_NextPart_000_0006_01C771E8.95762DD0"&lt;br /&gt;X-Mailer: Microsoft Office Outlook, Build 11.0.6353&lt;br /&gt;X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.2180&lt;br /&gt;Thread-Index: Aca6QO.5147K'S79Y8@PLZ,WW?9U5R==&lt;br /&gt;&lt;br /&gt;This is a multi-part message in MIME format.&lt;br /&gt;&lt;br /&gt;------=_NextPart_000_0006_01C771E8.95762DD0&lt;br /&gt;Content-Type: text/plain;&lt;br /&gt;        charset="Windows-1252"&lt;br /&gt;Content-Transfer-Encoding: 7bit&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Dear valued member!&lt;br /&gt;More and more people are getting concerned with the problem of fake drugs&lt;br /&gt;sold on the Web. This letter is aimed at helping you choose a really reliable Internet drugstore.&lt;br /&gt;It�s not a secret that many Web pharmacies are trying to make profits by&lt;br /&gt;selling fake drugs that not only prove to be totally useless but also can&lt;br /&gt;cause serious health problems. USDrugs is one of very few Internet&lt;br /&gt;drugstores that always offer only 100% generic meds.&lt;br /&gt;&lt;br /&gt;Hope that you will find the information provided useful.Please click here&lt;br /&gt;for more information.&lt;br /&gt;&lt;br /&gt;With Best Regards,  Denis Denton&lt;br /&gt;USDrugs B.V.&lt;br /&gt;&lt;/span&gt;&lt;span style="font-size:85%;"&gt;&lt;br /&gt;URLS REMOVED&lt;br /&gt;&lt;/pre&gt;&lt;br /&gt;&lt;/span&gt;&lt;/blockquote&gt;&lt;br /&gt;Whois for the IP address that sent us the lovely request to look for new meddications&lt;br /&gt;&lt;pre&gt;&lt;br /&gt;&lt;span style="font-family: courier new;"&gt;OrgName:    Borders, Inc.&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family: courier new;"&gt;OrgID:      BORDER-4&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family: courier new;"&gt;Address:    54 S. State Road&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family: courier new;"&gt;City:       Ann Arbor&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family: courier new;"&gt;StateProv:  MI&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family: courier new;"&gt;PostalCode: 48109&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family: courier new;"&gt;Country:    US&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="font-family: courier new;"&gt;NetRange:   198.179.225.0 - 198.179.228.255&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family: courier new;"&gt;CIDR:       198.179.225.0/24, 198.179.226.0/23, 198.179.228.0/24&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family: courier new;"&gt;NetName:    NETBLK-BORDERS&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family: courier new;"&gt;NetHandle:  NET-198-179-225-0-1&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family: courier new;"&gt;Parent:     NET-198-0-0-0-0&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family: courier new;"&gt;NetType:    Direct Assignment&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family: courier new;"&gt;NameServer: NS1.WCOM.NET&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family: courier new;"&gt;NameServer: NS3.WCOM.NET&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family: courier new;"&gt;NameServer: NS2.WCOM.NET&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family: courier new;"&gt;Comment:&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family: courier new;"&gt;RegDate:    1993-11-04&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family: courier new;"&gt;Updated:    2001-10-01&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;/pre&gt;</content><link rel='alternate' type='text/html' href='http://blog.support-intelligence.com/2007/04/borders-group-books-or-bots-look-at-six.html' title='Borders Group: Books or Bots - A look at a Six Country Spam Run'/><link rel='replies' type='application/atom+xml' href='http://blog.support-intelligence.com' title='Post Comments'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/34036745/posts/default/4391064961655310269'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/34036745/posts/default/4391064961655310269'/><author><name>Support Intelligence</name></author></entry><entry><id>tag:blogger.com,1999:blog-34036745.post-4809443958614059501</id><published>2007-04-24T09:09:00.000-07:00</published><updated>2007-04-24T12:09:05.851-07:00</updated><title type='text'>Clear Channel</title><content type='html'>&lt;img src="http://www.clearchannel.com/images/cc-logo-top.gif" /&gt;&lt;br /&gt;&lt;br /&gt;In our effort to bring attention to the facts that many corporations unknowingly send SPAM we bring you an analysis of Clear Channel. Every day we receive many legitimate emails from  Clear Channel  touting  radio and TV stations with titles like  &lt;span style="font-weight: bold;"&gt;&lt;span class="blsp-spelling-error" id="SPELLING_ERROR_0"&gt;Newsradio&lt;/span&gt; 850, &lt;span class="blsp-spelling-error" id="SPELLING_ERROR_1"&gt;KOA&lt;/span&gt; Traffic Alert&lt;/span&gt; or &lt;span style="font-weight: bold;"&gt;Free Money - Free Trips&lt;/span&gt; as well as loads of concert updates for every major metropolitan area of the United States.&lt;br /&gt;&lt;br /&gt;Back in March, we started getting titles like &lt;span style="font-weight: bold;"&gt;Best Prices on Medication&lt;/span&gt; mixed in with our &lt;span class="blsp-spelling-error" id="SPELLING_ERROR_2"&gt;KOA&lt;/span&gt; Traffic Alerts. We first noticed  image based &lt;span class="blsp-spelling-error" id="SPELLING_ERROR_3"&gt;Pharmaceutical&lt;/span&gt; spam from 207.230.140.240 on 03/12/2007 advocating Viagra and &lt;span class="blsp-spelling-error" id="SPELLING_ERROR_4"&gt;HGH&lt;/span&gt;. Similar spam arrived from another Clear Channel address, 62.190.150.183, this time from Europe. These compromised machines appear to have been cleaned up as we haven't see anything from them for nearly 2 weeks.&lt;br /&gt;&lt;br /&gt;On March 29&lt;span class="blsp-spelling-error" id="SPELLING_ERROR_5"&gt;th&lt;/span&gt; however, we noticed 62.190.150.183 pumping &lt;span class="blsp-spelling-error" id="SPELLING_ERROR_6"&gt;Pharma&lt;/span&gt; spam with 207.230.140.240 joining in  just a few minutes later. This particular infection ran much longer. These two addresses were responsible for delivering some 212 spam email to our traps. Then around April 4&lt;span class="blsp-spelling-error" id="SPELLING_ERROR_7"&gt;th&lt;/span&gt; we received Mortgage spam notifying us of our load acceptance for $396,000  - we just need to&lt;span style="font-weight: bold;"&gt; click here.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;On April 10&lt;span class="blsp-spelling-error" id="SPELLING_ERROR_8"&gt;th&lt;/span&gt;, 207.230.140.240 stared sending us &lt;span class="blsp-spelling-error" id="SPELLING_ERROR_9"&gt;OEM&lt;/span&gt; spam pushing Adobe and Microsoft products.&lt;br /&gt;&lt;br /&gt;In summary it looks as though Clear Channel has a continuing problem with infected computers pumping SPAM advocating Illegal Pharmacies, Unlicensed Software, and Identity Theft. It's not that Clear Channel is different  from Intel, &lt;span class="blsp-spelling-corrected" id="SPELLING_ERROR_10"&gt;Best&lt;/span&gt; Buy, or &lt;span class="blsp-spelling-corrected" id="SPELLING_ERROR_11"&gt;Bank&lt;/span&gt; of America.  All these &lt;span class="blsp-spelling-corrected" id="SPELLING_ERROR_12"&gt;companies&lt;/span&gt; have had &lt;span class="blsp-spelling-error" id="SPELLING_ERROR_13"&gt;botnet&lt;/span&gt; activity on their networks in the last 30 days. The point is that a great many companies have been hit by these problems.&lt;br /&gt;&lt;br /&gt;The differentiator is whether a company cares, what they do about the problem, and how fast they clean it up. Nobody expects security to be flawless - but our internet shouldn't be &lt;a href="http://en.wikipedia.org/wiki/Unsafe_at_Any_Speed"&gt;Unsafe at Any Speed&lt;/a&gt;, and especially not from organizations that have the resources available to address the problems - &lt;a href="http://www.support-intelligence.com/doa/"&gt;Once Awareness of the Problem Exists&lt;/a&gt; - hence our blog and DOA list.&lt;br /&gt;&lt;br /&gt;FYI, Clear Channel delivered over 2,000 emails to our traps in under 45 days - only 10% of which was &lt;span class="blsp-spelling-error" id="SPELLING_ERROR_14"&gt;botnet&lt;/span&gt; SPAM.  But it's that 10% that's making our internet an unsafe place to be. The question is - what are you going to do about it?&lt;br /&gt;&lt;br /&gt;&lt;pre&gt;&lt;span class="blsp-spelling-error" id="SPELLING_ERROR_16"&gt;OrgName&lt;/span&gt;:    Clear Channel Communications&lt;br /&gt;&lt;span class="blsp-spelling-error" id="SPELLING_ERROR_17"&gt;OrgID&lt;/span&gt;:      &lt;span class="blsp-spelling-error" id="SPELLING_ERROR_18"&gt;CCC&lt;/span&gt;-111&lt;br /&gt;Address:    Clear Channel Worldwide&lt;br /&gt;Address:    20880 Stone Oak Parkway&lt;br /&gt;City:       San Antonio&lt;br /&gt;&lt;span class="blsp-spelling-error" id="SPELLING_ERROR_19"&gt;StateProv&lt;/span&gt;:  TX&lt;br /&gt;&lt;span class="blsp-spelling-error" id="SPELLING_ERROR_20"&gt;PostalCode&lt;/span&gt;: 78258&lt;br /&gt;Country:    US&lt;br /&gt;&lt;br /&gt;&lt;span class="blsp-spelling-error" id="SPELLING_ERROR_21"&gt;NetRange&lt;/span&gt;:   207.230.128.0 - 207.230.159.255&lt;br /&gt;&lt;span class="blsp-spelling-error" id="SPELLING_ERROR_22"&gt;CIDR&lt;/span&gt;:       207.230.128.0/19&lt;br /&gt;&lt;/pre&gt;&lt;br /&gt;&lt;span style="font-style: italic;"&gt;&lt;span style="font-style: italic;"&gt;&lt;br /&gt;&lt;span style="font-style: italic;"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-style: italic;"&gt;&lt;span style="font-style: italic;"&gt;&lt;span style="font-style: italic;"&gt;&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;</content><link rel='alternate' type='text/html' href='http://blog.support-intelligence.com/2007/04/clear-channel.html' title='Clear Channel'/><link rel='replies' type='application/atom+xml' href='http://blog.support-intelligence.com' title='Post Comments'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/34036745/posts/default/4809443958614059501'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/34036745/posts/default/4809443958614059501'/><author><name>Support Intelligence</name></author></entry><entry><id>tag:blogger.com,1999:blog-34036745.post-5215368371526331923</id><published>2007-04-19T11:04:00.000-07:00</published><updated>2007-05-17T11:10:37.026-07:00</updated><title type='text'>Owned hosts of Banc of America Securities</title><content type='html'>&lt;span style="font-weight: bold; color: rgb(51, 51, 153);font-size:24;" &gt;Bank of America&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;We had to wait for this one to settle down a bit before we brought it out in the open. We track many of the major Banks in  the USA. Today we review a week of SPAM from Bank Of America. We have observed many months of good behavior from BofA but starting on April 2, 2007 a lone system named &lt;span style="font-weight: bold; font-style: italic;"&gt;system6.bofasecurities.com&lt;/span&gt; [63.80.4.6] got infected with something nasty. The situation lasted until the evening of April 6th. During this time we collected 226 SPAM.&lt;br /&gt;&lt;br /&gt;Support Intelligence wasn't the only place that noticed this box spew,  &lt;span style="font-weight: bold;"&gt;System6&lt;/span&gt; was blacklisted by CBL, TQM&lt;super&gt;3&lt;/super&gt;, and UCEProtect. We also note that this same system has been blacklisted by SpamHaus before on  2006-12-31  and 2007-03-30.&lt;br /&gt;&lt;br /&gt;None of the Spam we collect from &lt;span style="font-weight: bold;"&gt;System6&lt;/span&gt; had any Received headers  so we believe  all the mail to have originated from hosts outside of Bank of America, probably via socks proxy - so lets be clear that this appears to be a casual penetration of &lt;b&gt;&lt;i&gt;[&lt;/i&gt;&lt;/b&gt;&lt;i style="font-weight: bold;"&gt;our attorney has encouraged us to leave this space blank]&lt;/i&gt;&lt;br /&gt;&lt;br /&gt;On April 9th a new system popped up, &lt;span style="font-weight: bold;"&gt;host-63-117-180-6.eprimebroker.com&lt;/span&gt; [63.117.180.6] which is routed by AS 19438 ( PRIME-BROKERAGE - Bank of America ). This host primarly unloaded OEM software spam. It appears that the folks at ePrimeBroker are on top of it as this host only got 4 spam into our traps before being shut down. The 4 spam from ePrimeBroker all arrived within 90 minutes of each other, and we have not detected a  new spam since April  9th . During its prime it was blacklisted by &lt;a href="http://www2.blogger.com/post-edit.g?blogID=34036745&amp;amp;postID=5215368371526331923"&gt;CBL&lt;/a&gt; and SpamHaus, while SenderBase  showed a 316% increase in its SMTP traffic.&lt;br /&gt;&lt;br /&gt;With 9 weeks of analysis that shows no indication of bots I'd say BofA did a great job up until our 10th week of observation when they had a two separate infestations. The good news is at least on was noticed and shut down quickly.&lt;br /&gt;&lt;br /&gt;Bank of America will get infected again and we'll bring you a timely report of it.</content><link rel='alternate' type='text/html' href='http://blog.support-intelligence.com/2007/04/owned-hosts-of-banc-of-america.html' title='Owned hosts of Banc of America Securities'/><link rel='replies' type='application/atom+xml' href='http://blog.support-intelligence.com' title='Post Comments'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/34036745/posts/default/5215368371526331923'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/34036745/posts/default/5215368371526331923'/><author><name>Support Intelligence</name></author></entry><entry><id>tag:blogger.com,1999:blog-34036745.post-7580126061041068349</id><published>2007-04-18T09:05:00.000-07:00</published><updated>2007-04-19T10:29:26.507-07:00</updated><title type='text'>Company Profile: Conseco (NYSE: CNO)</title><content type='html'>&lt;img src="http://www.conseco.com/wsc/images/hdr_logo.gif" /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;at 4:07pm PDT today we received yet another spam from Conseco, specifically the webserver at 205.144.127.10 which has sent our traps some 296 SPAM in the last 30 days. Today it was Viagra links, yesterday HGH and OEM software,  the day before -- image spam. The week of March 12th brought us some Tranny pornography with titles like&lt;span style="font-weight: bold;"&gt; &lt;/span&gt;&lt;span style="font-weight: bold;"&gt;Beusty Wkoman Srucks BIGFCOCK &amp; Taitty Fjuck In Piool&lt;/span&gt; and &lt;span style="font-weight: bold;"&gt;Cjlassy Tdanned SHYEMALE Balowjob &amp; Djoggystyle Feuck. &lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Several of the lovely notes from the server at 205.144.127.10 had Received: headers. The following machines apparently proxied 6 of the 296 transactions through  it.&lt;br /&gt;&lt;ul&gt;&lt;li&gt;Received: from 65.112.18.68 (HELO mrclean.mnimaging.com)&lt;/li&gt;&lt;li&gt;Received: from 208.180.123.23 (HELO mail.ftwoods.com)&lt;/li&gt;&lt;li&gt;Received: from 62.249.192.203 (HELO mx1.freeola.net)&lt;/li&gt;&lt;li&gt;Received: from 212.14.64.180 (HELO mail.ijb.de)&lt;/li&gt;&lt;li&gt;Received: from 217.12.160.3 (HELO smtp.yepa.com)&lt;/li&gt;&lt;li&gt;Received: from 64.71.166.217 (HELO sesmail-com-bk.mr.outblaze.com)&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;The forward and reverse for these hosts do seem to match up, and none are listed on any  DNS RBL that we know of. The only oddity is that the FQDN matches the forward ip address and some reverses don't match the FQDN but are close enough. This isn't how SMTP servers work though.&lt;br /&gt;&lt;br /&gt;With Nmap reporting all the ports on 205.144.127.10 as closed, I'm confused how other servers could proxy any of the SPAM through 205.144.127.10. therefore I'm going to call the headers in the 6 aparently proxied transactions as forged.&lt;br /&gt;&lt;br /&gt;My best guess is that the host is a decommissioned web server for conseco.com as the reverse DNS points to conseco.com however the forward DNS for conseco.com as an A record of 205.144.125.110. Since these are different and 205.144.125.110 has the reverse for 10 or so other names I can imagine a transition that just left the old &lt;span style="font-weight: bold;"&gt;conseco.com. &lt;/span&gt;web server out dangling.&lt;br /&gt;&lt;br /&gt;This server has been infected for over a month and sits on the same /24 that all of the other main company resources reside on.  We will come back and review this one again in a week or so and see of anyone has cleaned it up.</content><link rel='alternate' type='text/html' href='http://blog.support-intelligence.com/2007/04/company-profile-conseco.html' title='Company Profile: Conseco (NYSE: CNO)'/><link rel='replies' type='application/atom+xml' href='http://blog.support-intelligence.com' title='Post Comments'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/34036745/posts/default/7580126061041068349'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/34036745/posts/default/7580126061041068349'/><author><name>Support Intelligence</name></author></entry><entry><id>tag:blogger.com,1999:blog-34036745.post-6894484379344956019</id><published>2007-04-17T19:46:00.000-07:00</published><updated>2007-04-19T10:26:34.264-07:00</updated><title type='text'>Company Profile: Toshiba America Business Solutions</title><content type='html'>&lt;img src="http://www.toshiba.com/tai/common/images/logo_1.gif" /&gt;&lt;br /&gt;&lt;br /&gt;We started watching Toshiba's network on Feb 23 2007. Since that very day one host has shone above the others, spewing every variety of spam. The host [12.145.34.103] has activity sent spam dating back as far as July 17th 2006. It has been listed on CBL, SpamHaus, TQMcube, UCEProtect, and WPBL. All in all it was listed some 105 times for sending SPAM/UCE in the last  9 months.&lt;br /&gt;&lt;br /&gt;Every spam we captured from the host used a different  HELO in the SMTP transaction to deliver mail to our traps. There were no Received headers Of the 716 spam we have received from this one host, we collected stock touts for WSDC.PK (up big!) and CDYV.PK up a hefty 25% today, CCTI.PK (ouch, down almost 100% from its high)  and SPSY.PK. There were also Rolex Watch and other Trademark/Brand SPAM.&lt;br /&gt;&lt;br /&gt;I don't buy the nmap analysis below but I thought it interesting enough to include. This device is determined by nmap to be a Cisco load balancer. We are constantly surprised.&lt;br /&gt;&lt;br /&gt;&lt;pre&gt;&lt;br /&gt;Starting Nmap 4.20 ( http://insecure.org ) at 2007-04-17 20:51 PDT&lt;br /&gt;Interesting ports on 12.145.34.103:&lt;br /&gt;Not shown: 1681 closed ports&lt;br /&gt;PORT     STATE    SERVICE&lt;br /&gt;178/tcp  filtered nextstep&lt;br /&gt;605/tcp  filtered unknown&lt;br /&gt;654/tcp  filtered unknown&lt;br /&gt;1076/tcp filtered sns_credit&lt;br /&gt;5050/tcp filtered mmcc&lt;br /&gt;5101/tcp filtered admdog&lt;br /&gt;5190/tcp filtered aol&lt;br /&gt;5192/tcp filtered aol-2&lt;br /&gt;5193/tcp filtered aol-3&lt;br /&gt;5510/tcp filtered secureidprop&lt;br /&gt;5520/tcp filtered sdlog&lt;br /&gt;5530/tcp filtered sdserv&lt;br /&gt;5540/tcp filtered sdreport&lt;br /&gt;5550/tcp filtered sdadmind&lt;br /&gt;5555/tcp filtered freeciv&lt;br /&gt;5560/tcp filtered isqlplus&lt;br /&gt;Device type: load balancer&lt;br /&gt;Running: Cisco embedded&lt;br /&gt;OS details: Cisco CSS 11501 Content Services Switch&lt;br /&gt;&lt;/pre&gt;</content><link rel='alternate' type='text/html' href='http://blog.support-intelligence.com/2007/04/company-profile-toshiba-america.html' title='Company Profile: Toshiba America Business Solutions'/><link rel='replies' type='application/atom+xml' href='http://blog.support-intelligence.com' title='Post Comments'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/34036745/posts/default/6894484379344956019'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/34036745/posts/default/6894484379344956019'/><author><name>Support Intelligence</name></author></entry><entry><id>tag:blogger.com,1999:blog-34036745.post-953253342101396671</id><published>2007-04-12T19:03:00.000-07:00</published><updated>2007-04-13T15:56:27.519-07:00</updated><title type='text'>Business Week wants me to become a better lover?!?</title><content type='html'>We've been collecting spam from a corporate email gateway (205.142.53.51) over at Business Week which is owned by McGrawHill which is responsible for announcing the 205.142.50.0/22 block from AS 4546.&lt;br /&gt;&lt;br /&gt;This particular computer is one of Business Week's outbound mail gateways better known as  mail03-1.mcgraw-hill.com. Its been showering our traps with titles like &lt;b&gt;Become a better lover&lt;/b&gt; and &lt;b&gt;Enjoy complete and total confidence every time&lt;/b&gt;. This server isn't botted it's just an IronPort[aren't they owned by cisco now]  box that's forwarding SPAM, but where is the spam coming from? Upon deeper inspection a received header indicates that this mail server received the message from a host (bw-www2-hts.mcgraw-hill.com) with an RFC1918 address  [172.16.40.20]&lt;br /&gt;&lt;br /&gt;This all sounds very complicated. It gets worse, the are other  compromised  web servers in other business units all leveraging  the same technique of using a compromised system to send out spam through outbound corporate MX servers, in this case a IronPort anti-spam system.&lt;br /&gt;&lt;br /&gt;One of the other systems that caught our eye is [corona.eppg.com] which sprouted titles like &lt;b&gt;Obesity is the number one cause of premature death in Americans&lt;/b&gt; This box used the same technique exiting its spam through another outbound mail server at 198.45.24.235. This host's block were registered to "Macmillan/McGraw-Hill School Publishing Company" which does K-6 Schoolbooks. That's friggn kinder garden through 6th grade books,  do you think they interact with kids over their website...  yep, the kiddies log in  at &lt;a href="http://glencoe.passkeylearning.com/LoginController"&gt;http://glencoe.passkeylearning.com/LoginController&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;These computers have been spewing spam for some time now, I'm interested to know if they also have key loggers operating on them. Well, I doubt we will hear from their systems administrator, we wrote this post because we couldn't figure out how to report instances like this. Hey, Mr. Business Week, you got 0wned!&lt;br /&gt;&lt;br /&gt;A set E-Mail Headers from the ~100 messages we analyzed&lt;br /&gt;&lt;pre&gt;&lt;br /&gt;X-SENDER-IP: 205.142.53.65&lt;br /&gt;X-ENVELOPE: EHLO mail04-1.mcgraw-hill.com&lt;br /&gt;MAIL FROM:&lt;busweek@businessweek.com&gt;&lt;br /&gt;RCPT TO:&lt;none@redacted.com&gt;&lt;br /&gt;X-HELO: mail04-1.mcgraw-hill.com&lt;br /&gt;X-UUID: 7ce71508-07ab-4427-bafd-cdd5fa56d7fa&lt;br /&gt;X-ECP: McGrawHill&lt;br /&gt;Received: from unknown (HELO bw-www2-hts.mcgraw-hill.com) ([172.16.40.20])&lt;br /&gt;by mail04-1.mcgraw-hill.com with ESMTP; 07 Apr 2007 09:56:20 -0400&lt;br /&gt;X-IronPort-AV: i="4.14,384,1170651600";&lt;br /&gt;d="scan'208"; a="13150503:sNHT79478476"&lt;br /&gt;Received: (from busweek@localhost)&lt;br /&gt; by bw-www2-hts.mcgraw-hill.com (8.11.7p1+Sun/8.11.7) id l37Dtc705382;&lt;br /&gt; Sat, 7 Apr 2007 09:55:38 -0400 (EDT)&lt;br /&gt;Date: Sat, 7 Apr 2007 09:55:38 -0400 (EDT)&lt;br /&gt;Message-Id: &lt;200704071355.l37dtc705382@bw-www2-hts.mcgraw-hill.com&gt;&lt;br /&gt;To: bwwebmaster@businessweek.com&lt;br /&gt;From: planet8094@businessweek.com&lt;br /&gt;Content-Transfer-Encoding: 7bit&lt;br /&gt;Content-Type: text/plain&lt;br /&gt;Subject: An all natural solution that studies prove works wonders&lt;br /&gt;&lt;/none@redacted.com&gt;&lt;/busweek@businessweek.com&gt;&lt;/pre&gt;&lt;br /&gt;&lt;br /&gt;Another message's headers for the PASSKEYLEARNING.COM site&lt;br /&gt;&lt;br /&gt;&lt;pre&gt;&lt;br /&gt;X-SENDER-IP: 198.45.24.235&lt;br /&gt;X-ENVELOPE: EHLO corona.eppg.com&lt;br /&gt;MAIL FROM:&lt;passkeylearning.com@corona.eppg.com&gt;&lt;br /&gt;RCPT TO:&lt;patty_reyes3@redacted.com&gt;&lt;br /&gt;X-HELO: corona.eppg.com&lt;br /&gt;X-UUID: 5aa1d38b-fb32-4ac6-8aac-8ad1845c09eb&lt;br /&gt;X-ECP: McGrawHill&lt;br /&gt;Received: (from passkeylearning.com@localhost)&lt;br /&gt; by corona.eppg.com (8.11.7p3+Sun/8.10.2) id l2BDxSl23545;&lt;br /&gt; Sun, 11 Mar 2007 08:59:28 -0500 (CDT)&lt;br /&gt;Date: Sun, 11 Mar 2007 08:59:28 -0500 (CDT)&lt;br /&gt;From: passkeylearning.com@corona.eppg.com&lt;br /&gt;Message-Id: &lt;200703111359.l2bdxsl23545@corona.eppg.com&gt;&lt;br /&gt;To:&lt;br /&gt;Content-Transfer-Encoding: quoted-printable&lt;br /&gt;Content-Type: text/plain&lt;br /&gt;Subject: Obesity is the number one cause of premature death in Americans&lt;br /&gt;&lt;/patty_reyes3@redacted.com&gt;&lt;/passkeylearning.com@corona.eppg.com&gt;&lt;/pre&gt;&lt;br /&gt;The ARIN IP Address Deligation for the ip addresses mentioned above.&lt;br /&gt;&lt;pre&gt;OrgName:    Businessweek Corporation&lt;br /&gt;OrgID:      BUSINE&lt;br /&gt;Address:    1221 Avenue of the Americas&lt;br /&gt;City:       New York&lt;br /&gt;StateProv:  NY&lt;br /&gt;PostalCode: 10020&lt;br /&gt;Country:    US&lt;br /&gt;&lt;br /&gt;NetRange:   205.142.52.0 - 205.142.55.255&lt;br /&gt;CIDR:       205.142.52.0/22&lt;br /&gt;NetName:    BUSINESSWEEK&lt;br /&gt;NetHandle:  NET-205-142-52-0-1&lt;br /&gt;Parent:     NET-205-0-0-0-0&lt;br /&gt;NetType:    Direct Assignment&lt;br /&gt;NameServer: CORP&lt;br /&gt;&lt;/pre&gt;</content><link rel='alternate' type='text/html' href='http://blog.support-intelligence.com/2007/04/wtf-business-week-wants-me-to-become.html' title='Business Week wants me to become a better lover?!?'/><link rel='replies' type='application/atom+xml' href='http://blog.support-intelligence.com' title='Post Comments'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/34036745/posts/default/953253342101396671'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/34036745/posts/default/953253342101396671'/><author><name>Support Intelligence</name></author></entry><entry><id>tag:blogger.com,1999:blog-34036745.post-7881852357841903053</id><published>2007-04-11T14:15:00.000-07:00</published><updated>2007-04-11T14:55:41.738-07:00</updated><title type='text'>Aflac Meet Mr. ED</title><content type='html'>&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://blog.support-intelligence.com/uploaded_images/logo_aflac-716370.gif"&gt;&lt;img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer;" src="http://blog.support-intelligence.com/uploaded_images/logo_aflac-716354.gif" alt="" border="0" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Aflac's Email Dysfunction&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://blog.support-intelligence.com/uploaded_images/aflic1-762503.jpg"&gt;&lt;img style="cursor: pointer;" src="http://blog.support-intelligence.com/uploaded_images/aflic1-762496.jpg" alt="" border="0" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Today we look into why Aflac, Inc (AFL) an Insurance company with millions of consumer records at risk can't keep from sending out a MegaTon of Pharm SPAM. According to &lt;a href="http://www.senderbase.org/search?searchString=209.37.4.38"&gt;Sender base&lt;/a&gt; 209.37.4.38 has increased its outbound e-mail by 757% in the last 24 hours.&lt;br /&gt;&lt;br /&gt;Apparently &lt;a href="http://spamcop.net/w3m?action=checkblock&amp;amp;ip=209.37.4.38"&gt;SpamCop&lt;/a&gt; noticed too.&lt;br /&gt;&lt;br /&gt;I guess it is hard to keep bots off your network with over 7,700 employees and a Market Cap of over 23 Billion. Maybe Mr Amos with his 6M in salary can do something to protect all those innocent customer records being sniffed. We will tune in next week to see if anything has changed.</content><link rel='alternate' type='text/html' href='http://blog.support-intelligence.com/2007/04/aflac-meet-mr-ed.html' title='Aflac Meet Mr. ED'/><link rel='replies' type='application/atom+xml' href='http://blog.support-intelligence.com' title='Post Comments'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/34036745/posts/default/7881852357841903053'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/34036745/posts/default/7881852357841903053'/><author><name>Support Intelligence</name></author></entry><entry><id>tag:blogger.com,1999:blog-34036745.post-6554692859268625483</id><published>2007-04-09T16:25:00.000-07:00</published><updated>2007-04-11T09:12:45.572-07:00</updated><title type='text'>DOA Week 13, 2007</title><content type='html'>We analized over 22,000 ASNs for every kind of eCrime including DDoS, Scanning, hosting Malware, sending Spam, hosting a phish, or transmitting virous. Below are the top 100 networks and the volume of incidents in the last 7 days.&lt;br /&gt;&lt;br /&gt;We posted the complete list of networks with more than 28 incidents in the last 7 days to the DOA report list which you can sign up at &lt;a href="http://www.support-intelligence.com/doa/"&gt;http://www.support-intelligence.com/doa/&lt;/a&gt;&lt;br /&gt;&lt;pre&gt;&lt;br /&gt;&lt;span style="font-family: courier new;"&gt;&lt;br /&gt;&lt;br /&gt;+-------+------------------------------------------+--------+&lt;br /&gt;| asn   | trim(left(org_name,40))                  | volume |&lt;br /&gt;+-------+------------------------------------------+--------+&lt;br /&gt;|  4134 | No.31,Jin-rong Street - Beijing - 100032 |  80279 |&lt;br /&gt;|  5617 | Polish Telecom's commercial IP network   |  63652 |&lt;br /&gt;|  3320 | Deutsche Telekom AG                      |  37871 |&lt;br /&gt;|  9121 | Turk Telekom A.S.                        |  34459 |&lt;br /&gt;| 19262 | Verizon Global Networks                  |  27315 |&lt;br /&gt;|  7738 | Telecomunicacoes da Bahia S.A.           |  26695 |&lt;br /&gt;| 27699 | TELECOMUNICACOES DE SAO PAULO S/A - TELE |  21487 |&lt;br /&gt;|  3462 | Data Communication Business Group - Chun |  19756 |&lt;br /&gt;|  4766 | Korea Internet Exchange -                |  15632 |&lt;br /&gt;|  8151 | Uninet S.A. de C.V.                      |  15376 |&lt;br /&gt;|  9498 | BHARTI BT INTERNET LTD. - BHARTI BRITISH |  14749 |&lt;br /&gt;|  3215 | France Telecom Transpac Domestic IP Back |  14216 |&lt;br /&gt;|  3209 | Arcor AG &amp; Co.                           |  13672 |&lt;br /&gt;|  4788 | TMnet, Telekom Malaysia - AS list of TMn |  11714 |&lt;br /&gt;|  3269 | TELECOM ITALIA - INTERBUSINESS NET       |  11470 |&lt;br /&gt;|  3352 | Internet Access Network of TDE - Spanish |   9751 |&lt;br /&gt;|  9318 | HANARO Telecom                           |   8438 |&lt;br /&gt;|  5483 | Hungarian Telecom - Public Internet Acce |   8206 |&lt;br /&gt;|  6147 | Telefonica del Peru S.A.A.               |   8070 |&lt;br /&gt;|  8359 | MTU-Intel Moscow region network          |   7992 |&lt;br /&gt;|  6713 | Itissalat Al-MAGHRIB - MAROC TELECOM     |   7840 |&lt;br /&gt;|  1267 | Infostrada S.p.A. - IUnet S.p.A.         |   7290 |&lt;br /&gt;|  7470 | ASIA INFONET Co.,Ltd. - Internet Service |   7152 |&lt;br /&gt;|  2856 | BTnet UK Regional network                |   7065 |&lt;br /&gt;|  4814 | IP networkChina169 Beijing Broadband N   |   6755 |&lt;br /&gt;|  4755 | Videsh Sanchar Nigam Ltd. Autonomous Sys |   6218 |&lt;br /&gt;| 17813 | Mahanagar Telephone Nigam Ltd. - ISP Div |   6191 |&lt;br /&gt;|  4713 | NTT Communications Corporation           |   5470 |&lt;br /&gt;| 13184 | HanseNet Telekommunikation GmbH - Hambur |   5453 |&lt;br /&gt;| 15557 | LDCOM NETWORKS pan european service Prov |   5192 |&lt;br /&gt;|  7418 | Terra Networks Chile S.A.                |   5057 |&lt;br /&gt;|   209 | Qwest                                    |   5041 |&lt;br /&gt;|  5430 | freenet City LINE GmbH - Willstaetterstr |   4743 |&lt;br /&gt;|  1680 | NetVision Ltd. - NetVision Ltd.          |   4525 |&lt;br /&gt;|  6849 | JSC UKRTELECOM                           |   4460 |&lt;br /&gt;| 20115 | Charter Communications                   |   4412 |&lt;br /&gt;| 22047 | VTR BANDA ANCHA S.A.                     |   4361 |&lt;br /&gt;|  5486 | Euronet Digital Communications - (1992)  |   4106 |&lt;br /&gt;| 11427 | Road Runner                              |   4075 |&lt;br /&gt;|  7132 | SBC Internet Services - Southwest        |   3851 |&lt;br /&gt;|  3243 | Telepac - Comunicacoes Interactivas, SA  |   3689 |&lt;br /&gt;|  9583 | Satyam Infoway Ltd., Private ISP in Indi |   3586 |&lt;br /&gt;|  8764 | LIETUVOS-TELEKOMAS Autonomous System - V |   3549 |&lt;br /&gt;|  3257 | Tiscali International Network B.V.       |   3541 |&lt;br /&gt;|  5462 | Telewest Broadband - UK Broadband ISP    |   3467 |&lt;br /&gt;|  9304 | Hutchison Telecom (HK) - Mobile, pager,  |   3280 |&lt;br /&gt;| 17858 | KRNIC - Korea Network Information Center |   3236 |&lt;br /&gt;|  6739 | Cableuropa - ONO - C./ Basauri, 5 - Urba |   3222 |&lt;br /&gt;|  5089 | NTL Group Limited - Hook, Hampshire - Un |   3190 |&lt;br /&gt;| 18101 | Reliance Infocom Ltd Internet Data Centr |   3163 |&lt;br /&gt;| 10036 | C&amp;M Communication Co. Ltd.               |   3140 |&lt;br /&gt;|  4230 | Embratel                                 |   3110 |&lt;br /&gt;| 20001 | Road Runner                              |   3056 |&lt;br /&gt;|  7552 | Vietel Corporation - Internet Exchange a |   2987 |&lt;br /&gt;| 17974 | PT TELEKOMUNIKASI INDONESIA - JL JAPATI  |   2934 |&lt;br /&gt;|  6805 | Telefonica Deutschland Autonomous System |   2840 |&lt;br /&gt;|  8881 | KomTel routing policies                  |   2826 |&lt;br /&gt;|  5391 | HT, HiNet, Croatian telecom              |   2683 |&lt;br /&gt;| 16338 | AUNA Autonomous System - AUNA Group. - P |   2632 |&lt;br /&gt;| 18403 | The Corporation for Financing &amp; Promotin |   2632 |&lt;br /&gt;| 24863 | LINKdotNET AS number - for any abuse com |   2564 |&lt;br /&gt;| 15311 | Telefonica Empresas                      |   2524 |&lt;br /&gt;| 12271 | Road Runner                              |   2522 |&lt;br /&gt;|  6327 | Shaw Communications Inc.                 |   2511 |&lt;br /&gt;| 33287 | Comcast Cable Communications, Inc.       |   2460 |&lt;br /&gt;|  9689 | Future's Cable Television, Inc. - 463-57 |   2444 |&lt;br /&gt;| 13285 | Opal Telecom - Northbank Industrial Esta |   2444 |&lt;br /&gt;| 17839 | Dreamcity Media - 423-6 Songnae-dong Sos |   2433 |&lt;br /&gt;|  7029 | Alltel Information Services, Inc.        |   2423 |&lt;br /&gt;|  5610 | CZECH TELECOM, a.s - Olsanska 6 - Prague |   2395 |&lt;br /&gt;| 19429 | ETB - Colombia                           |   2390 |&lt;br /&gt;|  7015 | Comcast Cable Communications Holdings, I |   2277 |&lt;br /&gt;| 12479 | Uni2 Autonomous System - Spain           |   2242 |&lt;br /&gt;| 11351 | Road Runner                              |   2196 |&lt;br /&gt;|  5384 | Emirates Internet - Public Internet Serv |   2182 |&lt;br /&gt;| 11426 | Road Runner                              |   2158 |&lt;br /&gt;| 12542 | TVCABO Autonomous System - Portugal      |   2136 |&lt;br /&gt;|  1221 | Telstra Pty Ltd - Locked Bag No. 5744 -  |   2082 |&lt;br /&gt;| 12741 | Netia Telekom SA                         |   2049 |&lt;br /&gt;|  6057 | Administracion Nacional de Telecomunicac |   1969 |&lt;br /&gt;|  4775 | Telecom Carrier                          |   1943 |&lt;br /&gt;|  9506 | Magix Broadband Network - Singapore Tele |   1848 |&lt;br /&gt;| 33651 | Comcast Cable Communications, Inc.       |   1846 |&lt;br /&gt;| 10796 | Road Runner                              |   1825 |&lt;br /&gt;|  5603 | SiOL Internet d.o.o. - Internet Service  |   1799 |&lt;br /&gt;| 36727 | INSIGHT COMMUNICATIONS COMPANY, L.P.     |   1781 |&lt;br /&gt;|  5713 | Telkom SA Ltd.                           |   1751 |&lt;br /&gt;| 20214 | Comcast Cable Communications Holdings, I |   1745 |&lt;br /&gt;|  4808 | IP networkChina169 Beijing Province Ne   |   1726 |&lt;br /&gt;|  9141 | UPC Poland                               |   1714 |&lt;br /&gt;|  9050 | RTD-ROMTELECOM Autonomous System Number  |   1689 |&lt;br /&gt;|  5668 | CenturyTel Internet Holdings, Inc.       |   1669 |&lt;br /&gt;| 33491 | Comcast Cable Communications, Inc.       |   1663 |&lt;br /&gt;|  6478 | AT&amp;T WorldNet Services                   |   1638 |&lt;br /&gt;|  1257 | SWIPnet - Swedish IP Network             |   1635 |&lt;br /&gt;| 17864 | Hanvit I&amp;B - 519-1, Gojan-Dong, Ansan-Ci |   1609 |&lt;br /&gt;|  7693 | KSC Commercial Internet Co. Ltd. - 2/4 S |   1601 |&lt;br /&gt;| 22291 | Charter Communications                   |   1593 |&lt;br /&gt;|  3816 | Empresa Nacional de Telecomunicaciones   |   1576 |&lt;br /&gt;| 10091 | SCV Broadband Access Provider            |   1429 |&lt;br /&gt;+-------+------------------------------------------+--------+&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;/pre&gt;</content><link rel='alternate' type='text/html' href='http://blog.support-intelligence.com/2007/04/doa-week-14-2007.html' title='DOA Week 13, 2007'/><link rel='replies' type='application/atom+xml' href='http://blog.support-intelligence.com' title='Post Comments'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/34036745/posts/default/6554692859268625483'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/34036745/posts/default/6554692859268625483'/><author><name>Support Intelligence</name></author></entry><entry><id>tag:blogger.com,1999:blog-34036745.post-5321975764702892853</id><published>2007-04-05T15:21:00.000-07:00</published><updated>2007-04-05T16:04:15.841-07:00</updated><title type='text'>Company Profile: AIG</title><content type='html'>&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://blog.support-intelligence.com/uploaded_images/aig_logo-747731.gif"&gt;&lt;img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer;" src="http://blog.support-intelligence.com/uploaded_images/aig_logo-747718.gif" alt="" border="0" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;span style="text-decoration: underline;"&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;American International Group pulls in $113 billion in revenue per year,  with $77 billion in cash on hand. They also have bots running on their network.&lt;br /&gt;&lt;br /&gt;AIG wrote us to let us know that &lt;span style="font-weight: bold;"&gt;Britney Spears loves Rolex Watches&lt;/span&gt;! Apparently. Or maybe just replicas. In either case, AIG sent us over 275 Rolex come-ons in the last month.&lt;br /&gt;&lt;br /&gt;They're also apparently interested in our sex life, as they've asked us to visit this website:&lt;br /&gt;&lt;br /&gt;http://womqat.hsuj.hk&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://blog.support-intelligence.com/uploaded_images/theme_mc_left-757910.jpg"&gt;&lt;img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer;" src="http://blog.support-intelligence.com/uploaded_images/theme_mc_left-757880.jpg" alt="" border="0" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;The repeated requests have arrived from  breeze.agfg.com and hail.agfg.com at 161.159.4.82 and 161.159.4.81 respectively.&lt;br /&gt;&lt;br /&gt;The site offers what are apparently black market pharmaceuticals from a company with no phone number, false whois information, and a domain registered on February 18th - less than a month before receiving the advertisement.&lt;br /&gt;&lt;br /&gt;The products offered on the site use the trademarks of Pfizer, Eli Lilly, Bayer, GlaxoSmithKline, you name it.&lt;br /&gt;&lt;br /&gt;The company also has 15 public black listings since December 2206, on 3 separate public lists, from 11 separate IP addresses.&lt;br /&gt;&lt;br /&gt;We encourage AIG to take a close look at breeze and hail listed above.</content><link rel='alternate' type='text/html' href='http://blog.support-intelligence.com/2007/04/company-profile-aig.html' title='Company Profile: AIG'/><link rel='replies' type='application/atom+xml' href='http://blog.support-intelligence.com' title='Post Comments'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/34036745/posts/default/5321975764702892853'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/34036745/posts/default/5321975764702892853'/><author><name>Support Intelligence</name></author></entry><entry><id>tag:blogger.com,1999:blog-34036745.post-3765528844756122372</id><published>2007-04-03T11:13:00.000-07:00</published><updated>2007-04-03T15:36:05.197-07:00</updated><title type='text'>Company Profile Thomson Financial</title><content type='html'>&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://blog.support-intelligence.com/uploaded_images/thomson-742846.gif"&gt;&lt;img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer;" src="http://blog.support-intelligence.com/uploaded_images/thomson-742838.gif" alt="" border="0" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;span style="text-decoration: underline;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Thomson Financial Corporation - number two in our profile of companies with bots running on their networks.&lt;br /&gt;&lt;br /&gt;April 1st, we noted 198.80.153.10 ( 153-10.tfn.com) connecting to a command and control server via IRC. Unfortunately this is no April Fool's joke.  Nor is the Botspam they've been sending us over the last month, such as this pump and dump sent from 198.80.128.88 on 3-15-2007:&lt;br /&gt;&lt;br /&gt;&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://blog.support-intelligence.com/uploaded_images/thomson_spam-742053.gif"&gt;&lt;img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer;" src="http://blog.support-intelligence.com/uploaded_images/thomson_spam-742048.gif" alt="" border="0" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;We'd also recommend checking out 198.80.189.10 which sent us over 25 pieces of botspam in March most of which touted different over the counter stocks.</content><link rel='alternate' type='text/html' href='http://blog.support-intelligence.com/2007/04/company-profile-thomson-financial.html' title='Company Profile Thomson Financial'/><link rel='replies' type='application/atom+xml' href='http://blog.support-intelligence.com' title='Post Comments'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/34036745/posts/default/3765528844756122372'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/34036745/posts/default/3765528844756122372'/><author><name>Support Intelligence</name></author></entry><entry><id>tag:blogger.com,1999:blog-34036745.post-7359009937557413953</id><published>2007-04-02T10:42:00.000-07:00</published><updated>2007-04-02T11:07:35.806-07:00</updated><title type='text'>Unwitting Spammers - Support Intelligence in the Washington Post</title><content type='html'>&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://blog.washingtonpost.com/securityfix/2007/03/fortune_500s_unwittingly_becom.html"&gt;&lt;img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer;" src="http://blog.support-intelligence.com/uploaded_images/wp-737230.png" alt="" border="0" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Brian Krebs of &lt;a href="http://blog.washingtonpost.com/securityfix/2007/03/fortune_500s_unwittingly_becom.html"&gt;The Washington Post&lt;/a&gt; wrote an insightful piece on Fortune 500 companies, the bots on their networks, and the spam coming from their networks. &lt;a href="http://blog.washingtonpost.com/securityfix/2007/03/fortune_500s_unwittingly_becom.html"&gt;The article&lt;/a&gt;, appeared in Brian's Security Fix blog and called out ExxonMobile, American Electric Power, Indymac Bank, Dow Jones and a handful of others with recent problems on their networks.&lt;br /&gt;&lt;br /&gt;Which is no bit deal if you don't drive a car, light your home, carry a mortgage, or read the news. Then again, doesn't the security of our power plants, oil tankers, banks, and news organizations affect every one of us?</content><link rel='alternate' type='text/html' href='http://blog.support-intelligence.com/2007/04/unwitting-spammers-support-intelligence.html' title='Unwitting Spammers - Support Intelligence in the Washington Post'/><link rel='related' href='http://blog.washingtonpost.com/securityfix/2007/03/fortune_500s_unwittingly_becom.html' title='Unwitting Spammers - Support Intelligence in the Washington Post'/><link rel='replies' type='application/atom+xml' href='http://blog.support-intelligence.com' title='Post Comments'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/34036745/posts/default/7359009937557413953'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/34036745/posts/default/7359009937557413953'/><author><name>Support Intelligence</name></author></entry><entry><id>tag:blogger.com,1999:blog-34036745.post-7068121947932220903</id><published>2007-04-02T10:29:00.000-07:00</published><updated>2007-04-02T11:08:35.458-07:00</updated><title type='text'>Support Intelligence in the Register</title><content type='html'>&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://www.theregister.com/2007/03/28/bots_in_perimeter/"&gt;&lt;img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer;" src="http://blog.support-intelligence.com/uploaded_images/register-731795.png" alt="" border="0" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Dan Goodin of &lt;a href="http://www.theregister.com/2007/03/28/bots_in_perimeter/"&gt;The Register&lt;/a&gt; wrote an excellent article on bots operating on corporate networks. The article entitled  &lt;a href="http://www.theregister.com/2007/03/28/bots_in_perimeter/"&gt;Bots inside the Perimeter&lt;/a&gt; features data collected from the Support Intelligence network and highlights distinct cases of bot spam flowing out of Oracle, HP,  Best Buy, and others.&lt;br /&gt;&lt;br /&gt;In the case of Oracle, the botspam was actually a phishing attack on Paypal. And with Best Buy the amount of spam pouring  out its scuppers was in the thousands per week.&lt;br /&gt;&lt;br /&gt;Houston, we have a problem.</content><link rel='alternate' type='text/html' href='http://blog.support-intelligence.com/2007/04/support-intelligence-in-register.html' title='Support Intelligence in the Register'/><link rel='related' href='http://www.theregister.com/2007/03/28/bots_in_perimeter/' title='Support Intelligence in the Register'/><link rel='replies' type='application/atom+xml' href='http://blog.support-intelligence.com' title='Post Comments'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/34036745/posts/default/7068121947932220903'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/34036745/posts/default/7068121947932220903'/><author><name>Support Intelligence</name></author></entry><entry><id>tag:blogger.com,1999:blog-34036745.post-1716381942876478749</id><published>2007-03-28T10:48:00.000-07:00</published><updated>2007-04-03T15:39:35.258-07:00</updated><title type='text'>Company Profile: 3M</title><content type='html'>&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://blog.support-intelligence.com/uploaded_images/3m-799066.png"&gt;&lt;img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer;" src="http://blog.support-intelligence.com/uploaded_images/3m-799055.png" alt="" border="0" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;div style="text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://blog.support-intelligence.com/uploaded_images/3m-exvg-766887.jpg"&gt;&lt;img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer;" src="http://blog.support-intelligence.com/uploaded_images/3m-exvg-766872.jpg" alt="" border="0" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=";font-family:arial;font-size:100%;"  &gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Our first review is the 3M company (Ticker MMM).  In 23 days we collected 11 spam from 69.6.84.102 which is delegated to 3M by ARIN:&lt;/span&gt;&lt;span style="font-size:100%;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;pre&gt;&lt;br /&gt;OrgName:    3M Company&lt;br /&gt;OrgID:      3MCOMP&lt;br /&gt;Address:    3M Center&lt;br /&gt;Address:    Bldg 224-4N-27&lt;br /&gt;City:       St. Paul&lt;br /&gt;StateProv:  MN&lt;br /&gt;PostalCode: 55144-1000&lt;br /&gt;Country:    US&lt;br /&gt;&lt;br /&gt;NetRange:   169.4.0.0 - 169.7.255.255&lt;br /&gt;CIDR:       169.4.0.0/14&lt;br /&gt;NetName:    NETBLK-B-BLK1-3M&lt;br /&gt;&lt;br /&gt;&lt;/pre&gt;&lt;br /&gt;&lt;span style="font-family:arial;"&gt;The spam were all image based Stock Pump-n-Dump SPAM touting stocks EXVG (up 15% today) BTOD (up 13% today) and GDKI (down 37%) Stock spam continues to plague  companies traded on Over The Counter markets like the Pink Sheets. &lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="font-family:arial;"&gt;We reviewed the routes announced by 3M (AS7792) which announced the entire 169.4.0.0/14 as one block. Our analysis of the routes for this prefix shows no more specific announcements or any other origin for the 3M block. Once we have reasonably shown there were no route hijacking we can determine that our spamtrap did actually connect with and recieve SPAM from one of 3M's machines.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;3M shoulod consider taking a look at the following addresses:&lt;br /&gt;&lt;pre&gt;&lt;br /&gt;169.6.84.98&lt;br /&gt;192.28.4.40&lt;br /&gt;169.12.80.180&lt;br /&gt;169.6.84.102&lt;br /&gt;&lt;/pre&gt;</content><link rel='alternate' type='text/html' href='http://blog.support-intelligence.com/2007/03/company-profile-3m.html' title='Company Profile: 3M'/><link rel='replies' type='application/atom+xml' href='http://blog.support-intelligence.com' title='Post Comments'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/34036745/posts/default/1716381942876478749'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/34036745/posts/default/1716381942876478749'/><author><name>Support Intelligence</name></author></entry><entry><id>tag:blogger.com,1999:blog-34036745.post-5401948049596238099</id><published>2007-03-26T18:14:00.000-07:00</published><updated>2007-03-26T18:18:54.879-07:00</updated><title type='text'>30 Days of Bots</title><content type='html'>We have been collecting data on the top 500 networks in the Fortune 1000 companies evaluating how much SPAM/UCE they send. Over the next couple of weeks we will explore which global Fortune 1000 companies have bots inside their perimeter and sending out spam.&lt;br /&gt;&lt;br /&gt;We will continue this coverage until corporate america is clean (ETA 2012)</content><link rel='alternate' type='text/html' href='http://blog.support-intelligence.com/2007/03/30-days-of-bots.html' title='30 Days of Bots'/><link rel='replies' type='application/atom+xml' href='http://blog.support-intelligence.com' title='Post Comments'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/34036745/posts/default/5401948049596238099'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/34036745/posts/default/5401948049596238099'/><author><name>Support Intelligence</name></author></entry><entry><id>tag:blogger.com,1999:blog-34036745.post-116819779906360407</id><published>2007-01-07T10:56:00.000-08:00</published><updated>2007-04-02T11:11:47.483-07:00</updated><title type='text'>Attack of the Zombie Computers - Support Intelligence in the  New York Times</title><content type='html'>&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://blog.support-intelligence.com/uploaded_images/nyt-764259.png"&gt;&lt;img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer;" src="http://blog.support-intelligence.com/uploaded_images/nyt-764248.png" alt="" border="0" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Get out the big microphone - what we've been saying all along about the growing bot problem finally hit the NY Times. John Markoff investigated the article which includes quotes from Dave Rand, David Dagon, Gadi Evron, K.C. Claffy, the ShadowServer folks and others.&lt;br /&gt;&lt;br /&gt;&lt;a href="http://www.nytimes.com/2007/01/07/technology/07net.html?ex=1325826000&amp;en=cd1e2d4c0cd20448&amp;ei=5090"&gt;The article&lt;/a&gt; quotes some good ballpark numbers on the threat:&lt;br /&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;11% of the 650 million computers on-line contain botnet code&lt;/li&gt;&lt;li&gt;250,00 new systems get botted every day&lt;/li&gt;&lt;li&gt;80% of all spam originates from botnets now&lt;br /&gt;&lt;/li&gt;&lt;li&gt;We passed the billion spam a day by a single ISP point back in December&lt;/li&gt;&lt;/ul&gt;Anyway, it's a thoughtful read that brings some badly needed attention to the size of the problem.&lt;br /&gt;&lt;br /&gt;Plus you can check out &lt;a href="http://www.nytimes.com/2007/01/07/technology/07net.html?ex=1325826000&amp;en=cd1e2d4c0cd20448&amp;ei=5090"&gt;our spooky picture in the paper&lt;/a&gt; too in case the facts themselves don't scare you enough.&lt;br /&gt;&lt;br /&gt;Adam</content><link rel='alternate' type='text/html' href='http://blog.support-intelligence.com/2007/01/attack-of-zombie-computers-support.html' title='Attack of the Zombie Computers - Support Intelligence in the  New York Times'/><link rel='replies' type='application/atom+xml' href='http://blog.support-intelligence.com' title='Post Comments'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/34036745/posts/default/116819779906360407'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/34036745/posts/default/116819779906360407'/><author><name>Support Intelligence</name></author></entry><entry><id>tag:blogger.com,1999:blog-34036745.post-116465696209405197</id><published>2006-11-27T10:59:00.000-08:00</published><updated>2006-11-27T13:09:58.786-08:00</updated><title type='text'>Introducing the Digest of Abuse Report</title><content type='html'>&lt;span style="font-weight: bold;"&gt;&lt;/span&gt;Today we're launching a little something we like to call the Digest of Abuse Report - or DOA Report for short.&lt;br /&gt;&lt;br /&gt;The Digest has two parts:&lt;br /&gt;&lt;br /&gt;1) A summary list of &lt;span style="font-weight: bold;"&gt;new &lt;/span&gt;abuse broken down by Autonomous System&lt;br /&gt;2) Individual notifications to AS operators about abuse on their networks&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;The Summary List&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;We track the 23,000+ ASN's announced in the global routing system and assign abuse on each ASN to it. Since listing all 23,000 would be terribly long, we've elected to just list the top 100 or so for now.&lt;br /&gt;&lt;br /&gt;In future reports, we plan on breaking down the lists by geography, either country or RIR area, and possibly by type of network as well - mil, edu, net, com. We'd also like to offer trending data and more detail for those who are interested.&lt;br /&gt;&lt;br /&gt;If you have suggestions on ways to present the data let us know there's a lot we could do with it.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;The DOA Mailing List and Monthly Postings&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;The list comes out weekly - if you'd like to receive a copy just &lt;a href="http://www.support-intelligence.com/doa/"&gt;sign up for our mailing list&lt;/a&gt;. Additionally we'll be posting the list on a monthly basis to NANOG, and a few other lists.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;Individual Notifications&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;On top of that, we'll be informing network operators of the abuse we observe on their networks over the past week. The reports have specific IP Addresses, Issue Types, Reporting Source, and UTC Timestamp. Our hope is these reports will inform network operators of the scope of the issues on their networks, and help them identify and clean up specific abuse problems.&lt;br /&gt;&lt;br /&gt;We will of course respect the wishes of operators who don't want to receive follow-up reports. If this is you, just reply to the report and we won't send you future reports.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;Let's Hear Your Feedback!&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;This stuff is important! It affects network stability, individual privacy, business continuity, and everyone's pocketbook. We need to be informed about the overall view of abuse, the trends, and where it's lurking. So we want to get it right.  The point isn't to shame anyone - every network has an abuse problem - it's simply to inform the community on the lay of the land.&lt;br /&gt;&lt;br /&gt;Many, many people have asked us to publish this data in a digestible form to  the community to raise awareness.  So if you have any suggestions or feedback for us let us know!&lt;br /&gt;&lt;br /&gt;rick or adam 'at' support-intelligence.com&lt;br /&gt;&lt;br /&gt;Cheers,&lt;br /&gt;Rick and Adam&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;DOA Report for Week of 11-21-2007 - Top 100 Networks&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;table str="" style="border-collapse: collapse; width: 427pt;" border="0" cellpadding="0" cellspacing="0" width="570"&gt;&lt;col style="width: 44pt;" width="59"&gt;  &lt;col style="width: 11pt;" width="15"&gt;  &lt;col style="width: 73pt;" width="97"&gt;  &lt;col style="width: 12pt;" width="16"&gt;  &lt;col style="width: 287pt;" width="383"&gt;  &lt;tbody&gt;&lt;tr style="height: 12.75pt;" height="17"&gt;   &lt;td class="xl24" style="height: 12.75pt; width: 44pt; font-weight: bold;" height="17" width="59"&gt;&lt;span style=""&gt;      &lt;/span&gt;ASN&lt;/td&gt;   &lt;td class="xl24" style="width: 11pt; font-weight: bold;" width="15"&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td class="xl24" style="width: 73pt; font-weight: bold;" width="97"&gt;   New Issues&lt;/td&gt;   &lt;td class="xl24" style="width: 12pt; font-weight: bold;" width="16"&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td class="xl24" style="width: 287pt; font-weight: bold;" width="383"&gt;AS Name&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height: 12.75pt;" height="17"&gt;   &lt;td style="height: 12.75pt;" num="" align="right" height="17"&gt;4134&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td num="" align="right"&gt;363688&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td&gt;CHINANET-BACKBONE&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height: 12.75pt;" height="17"&gt;   &lt;td style="height: 12.75pt;" num="" align="right" height="17"&gt;4837&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td num="" align="right"&gt;172003&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td&gt;CHINA169-Backbone&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height: 12.75pt;" height="17"&gt;   &lt;td style="height: 12.75pt;" num="" align="right" height="17"&gt;9121&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td num="" align="right"&gt;149716&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td&gt;TTNet&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height: 12.75pt;" height="17"&gt;   &lt;td style="height: 12.75pt;" num="" align="right" height="17"&gt;5617&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td num="" align="right"&gt;101372&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td&gt;TPNET&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height: 12.75pt;" height="17"&gt;   &lt;td style="height: 12.75pt;" num="" align="right" height="17"&gt;4766&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td num="" align="right"&gt;98485&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td&gt;KIXS-AS-KR&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height: 12.75pt;" height="17"&gt;   &lt;td style="height: 12.75pt;" num="" align="right" height="17"&gt;3352&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td num="" align="right"&gt;94837&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td&gt;TELEFONICA-DATA-ESPANA Internet Access&lt;br /&gt;&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height: 12.75pt;" height="17"&gt;   &lt;td style="height: 12.75pt;" num="" align="right" height="17"&gt;3320&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td num="" align="right"&gt;89415&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td&gt;Deutsche Telekom AG&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height: 12.75pt;" height="17"&gt;   &lt;td style="height: 12.75pt;" num="" align="right" height="17"&gt;3215&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td num="" align="right"&gt;84594&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td&gt;AS3215&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height: 12.75pt;" height="17"&gt;   &lt;td style="height: 12.75pt;" num="" align="right" height="17"&gt;9829&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td num="" align="right"&gt;81474&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td&gt;BSNL-NIB&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height: 12.75pt;" height="17"&gt;   &lt;td style="height: 12.75pt;" num="" align="right" height="17"&gt;19262&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td num="" align="right"&gt;80989&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td&gt;Verizon Internet Services&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height: 12.75pt;" height="17"&gt;   &lt;td style="height: 12.75pt;" num="" align="right" height="17"&gt;3269&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td num="" align="right"&gt;67398&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td&gt;ASN-IBSNAZ&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height: 12.75pt;" height="17"&gt;   &lt;td style="height: 12.75pt;" num="" align="right" height="17"&gt;4788&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td num="" align="right"&gt;65140&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td&gt;TMNET-AS-AP&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height: 12.75pt;" height="17"&gt;   &lt;td style="height: 12.75pt;" num="" align="right" height="17"&gt;8151&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td num="" align="right"&gt;59492&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td&gt;Uninet S.A. de C.V.&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height: 12.75pt;" height="17"&gt;   &lt;td style="height: 12.75pt;" num="" align="right" height="17"&gt;3462&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td num="" align="right"&gt;55358&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td&gt;HINET&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height: 12.75pt;" height="17"&gt;   &lt;td style="height: 12.75pt;" num="" align="right" height="17"&gt;9498&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td num="" align="right"&gt;48106&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td&gt;BBIL-AP&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height: 12.75pt;" height="17"&gt;   &lt;td style="height: 12.75pt;" num="" align="right" height="17"&gt;22927&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td num="" align="right"&gt;37388&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td&gt;Telefonica de Argentina&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height: 12.75pt;" height="17"&gt;   &lt;td style="height: 12.75pt;" num="" align="right" height="17"&gt;3209&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td num="" align="right"&gt;34786&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td&gt;UNSPECIFIED&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height: 12.75pt;" height="17"&gt;   &lt;td style="height: 12.75pt;" num="" align="right" height="17"&gt;8359&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td num="" align="right"&gt;32696&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td&gt;MTUONLINE&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height: 12.75pt;" height="17"&gt;   &lt;td style="height: 12.75pt;" num="" align="right" height="17"&gt;4814&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td num="" align="right"&gt;31552&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td&gt;CHINA169-BBN&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height: 12.75pt;" height="17"&gt;   &lt;td style="height: 12.75pt;" num="" align="right" height="17"&gt;12322&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td num="" align="right"&gt;31364&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td&gt;PROXAD AS for Proxad ISP&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height: 12.75pt;" height="17"&gt;   &lt;td style="height: 12.75pt;" num="" align="right" height="17"&gt;9318&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td num="" align="right"&gt;29769&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td&gt;HANARO-AS&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height: 12.75pt;" height="17"&gt;   &lt;td style="height: 12.75pt;" num="" align="right" height="17"&gt;4812&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td num="" align="right"&gt;29068&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td&gt;CHINANET-SH-AP&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height: 12.75pt;" height="17"&gt;   &lt;td style="height: 12.75pt;" num="" align="right" height="17"&gt;8551&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td num="" align="right"&gt;28112&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td&gt;ISDN-NET-AS&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height: 12.75pt;" height="17"&gt;   &lt;td style="height: 12.75pt;" num="" align="right" height="17"&gt;6147&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td num="" align="right"&gt;24673&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td&gt;Telefonica del Peru S.A.A.&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height: 12.75pt;" height="17"&gt;   &lt;td style="height: 12.75pt;" num="" align="right" height="17"&gt;6713&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td num="" align="right"&gt;23637&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td&gt;IAM-AS&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height: 12.75pt;" height="17"&gt;   &lt;td style="height: 12.75pt;" num="" align="right" height="17"&gt;9105&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td num="" align="right"&gt;21123&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td&gt;TISCALI-UK&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height: 12.75pt;" height="17"&gt;   &lt;td style="height: 12.75pt;" num="" align="right" height="17"&gt;4755&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td num="" align="right"&gt;21067&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td&gt;VSNL-AS&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height: 12.75pt;" height="17"&gt;   &lt;td style="height: 12.75pt;" num="" align="right" height="17"&gt;1267&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td num="" align="right"&gt;19952&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td&gt;ASN-INFOSTRADA Infostrada S.p.A.&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height: 12.75pt;" height="17"&gt;   &lt;td style="height: 12.75pt;" num="" align="right" height="17"&gt;13184&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td num="" align="right"&gt;19924&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td&gt;HANSENET HanseNet Telekommunikation GmbH&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height: 12.75pt;" height="17"&gt;   &lt;td style="height: 12.75pt;" num="" align="right" height="17"&gt;2856&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td num="" align="right"&gt;19472&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td&gt;BT-UK-AS&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height: 12.75pt;" height="17"&gt;   &lt;td style="height: 12.75pt;" num="" align="right" height="17"&gt;7418&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td num="" align="right"&gt;18973&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td&gt;Terra Networks Chile S.A.&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height: 12.75pt;" height="17"&gt;   &lt;td style="height: 12.75pt;" num="" align="right" height="17"&gt;7470&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td num="" align="right"&gt;18958&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td&gt;ASIAINFO-AS-AP&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height: 12.75pt;" height="17"&gt;   &lt;td style="height: 12.75pt;" num="" align="right" height="17"&gt;15557&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td num="" align="right"&gt;18033&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td&gt;LDCOMNET&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height: 12.75pt;" height="17"&gt;   &lt;td style="height: 12.75pt;" num="" align="right" height="17"&gt;12479&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td num="" align="right"&gt;17065&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td&gt;UNI2-AS Uni2 Autonomous System&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height: 12.75pt;" height="17"&gt;   &lt;td style="height: 12.75pt;" num="" align="right" height="17"&gt;4713&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td num="" align="right"&gt;16881&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td&gt;OCN NTT Communications Corporation&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height: 12.75pt;" height="17"&gt;   &lt;td style="height: 12.75pt;" num="" align="right" height="17"&gt;12876&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td num="" align="right"&gt;16834&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td&gt;AS12876&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height: 12.75pt;" height="17"&gt;   &lt;td style="height: 12.75pt;" num="" align="right" height="17"&gt;9116&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td num="" align="right"&gt;16735&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td&gt;Goldenlines main autonomous system&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height: 12.75pt;" height="17"&gt;   &lt;td style="height: 12.75pt;" num="" align="right" height="17"&gt;3243&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td num="" align="right"&gt;16519&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td&gt;RIPE NCC ASN block&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height: 12.75pt;" height="17"&gt;   &lt;td style="height: 12.75pt;" num="" align="right" height="17"&gt;5486&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td num="" align="right"&gt;16102&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td&gt;Euronet Digital Communications&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height: 12.75pt;" height="17"&gt;   &lt;td style="height: 12.75pt;" num="" align="right" height="17"&gt;5713&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td num="" align="right"&gt;15296&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td&gt;Telkom SA Ltd.&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height: 12.75pt;" height="17"&gt;   &lt;td style="height: 12.75pt;" num="" align="right" height="17"&gt;9583&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td num="" align="right"&gt;13911&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td&gt;SIFY-AS-IN&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height: 12.75pt;" height="17"&gt;   &lt;td style="height: 12.75pt;" num="" align="right" height="17"&gt;6739&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td num="" align="right"&gt;13856&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td&gt;ONO-AS&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height: 12.75pt;" height="17"&gt;   &lt;td style="height: 12.75pt;" num="" align="right" height="17"&gt;1680&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td num="" align="right"&gt;13730&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td&gt;NETVISION&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height: 12.75pt;" height="17"&gt;   &lt;td style="height: 12.75pt;" num="" align="right" height="17"&gt;9299&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td num="" align="right"&gt;13709&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td&gt;IPG-AS-AP&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height: 12.75pt;" height="17"&gt;   &lt;td style="height: 12.75pt;" num="" align="right" height="17"&gt;8708&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td num="" align="right"&gt;13436&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td&gt;RDSNET&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height: 12.75pt;" height="17"&gt;   &lt;td style="height: 12.75pt;" num="" align="right" height="17"&gt;8228&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td num="" align="right"&gt;13124&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td&gt;CEGETEL-AS CEGETEL ENTREPRISES&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height: 12.75pt;" height="17"&gt;   &lt;td style="height: 12.75pt;" num="" align="right" height="17"&gt;8584&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td num="" align="right"&gt;12926&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td&gt;Barak AS&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height: 12.75pt;" height="17"&gt;   &lt;td style="height: 12.75pt;" num="" align="right" height="17"&gt;16338&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td num="" align="right"&gt;11415&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td&gt;AUNA_Telecom-AS&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height: 12.75pt;" height="17"&gt;   &lt;td style="height: 12.75pt;" num="" align="right" height="17"&gt;9304&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td num="" align="right"&gt;11369&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td&gt;HUTCHISON-AS-AP&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height: 12.75pt;" height="17"&gt;   &lt;td style="height: 12.75pt;" num="" align="right" height="17"&gt;4230&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td num="" align="right"&gt;11148&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td&gt;Embratel&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height: 12.75pt;" height="17"&gt;   &lt;td style="height: 12.75pt;" num="" align="right" height="17"&gt;12715&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td num="" align="right"&gt;11066&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td&gt;JAZZNET&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height: 12.75pt;" height="17"&gt;   &lt;td style="height: 12.75pt;" num="" align="right" height="17"&gt;1257&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td num="" align="right"&gt;10944&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td&gt;TELE2 AB&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height: 12.75pt;" height="17"&gt;   &lt;td style="height: 12.75pt;" num="" align="right" height="17"&gt;5430&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td num="" align="right"&gt;10919&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td&gt;FREENETDE&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height: 12.75pt;" height="17"&gt;   &lt;td style="height: 12.75pt;" num="" align="right" height="17"&gt;209&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td num="" align="right"&gt;10853&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td&gt;Qwest&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height: 12.75pt;" height="17"&gt;   &lt;td style="height: 12.75pt;" num="" align="right" height="17"&gt;17974&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td num="" align="right"&gt;10781&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td&gt;TELKOMNET-AS2-AP&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height: 12.75pt;" height="17"&gt;   &lt;td style="height: 12.75pt;" num="" align="right" height="17"&gt;5462&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td num="" align="right"&gt;10469&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td&gt;CABLEINET Telewest Broadband&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height: 12.75pt;" height="17"&gt;   &lt;td style="height: 12.75pt;" num="" align="right" height="17"&gt;20115&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td num="" align="right"&gt;10301&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td&gt;Charter Communications&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height: 12.75pt;" height="17"&gt;   &lt;td style="height: 12.75pt;" num="" align="right" height="17"&gt;8452&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td num="" align="right"&gt;9883&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td&gt;TEDATA TEDATA&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height: 12.75pt;" height="17"&gt;   &lt;td style="height: 12.75pt;" num="" align="right" height="17"&gt;8167&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td num="" align="right"&gt;9816&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td&gt;TELESC - Telecomunicacoes de Santa Catarina SA&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height: 12.75pt;" height="17"&gt;   &lt;td style="height: 12.75pt;" num="" align="right" height="17"&gt;24863&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td num="" align="right"&gt;9602&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td&gt;LINKDOTNET-AS LINKdotNET AS number&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height: 12.75pt;" height="17"&gt;   &lt;td style="height: 12.75pt;" num="" align="right" height="17"&gt;5384&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td num="" align="right"&gt;9277&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td&gt;EMIRATES-INTERNET&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height: 12.75pt;" height="17"&gt;   &lt;td style="height: 12.75pt;" num="" align="right" height="17"&gt;9506&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td num="" align="right"&gt;9063&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td&gt;MAGIX-SG-AP&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height: 12.75pt;" height="17"&gt;   &lt;td style="height: 12.75pt;" num="" align="right" height="17"&gt;7132&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td num="" align="right"&gt;8863&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td&gt;SBC Internet Services&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height: 12.75pt;" height="17"&gt;   &lt;td style="height: 12.75pt;" num="" align="right" height="17"&gt;22047&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td num="" align="right"&gt;8407&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td&gt;VTR BANDA ANCHA S.A.&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height: 12.75pt;" height="17"&gt;   &lt;td style="height: 12.75pt;" num="" align="right" height="17"&gt;8764&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td num="" align="right"&gt;8334&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td&gt;TELECOMLT-AS&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height: 12.75pt;" height="17"&gt;   &lt;td style="height: 12.75pt;" num="" align="right" height="17"&gt;6478&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td num="" align="right"&gt;8156&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td&gt;AT&amp;T WorldNet Services&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height: 12.75pt;" height="17"&gt;   &lt;td style="height: 12.75pt;" num="" align="right" height="17"&gt;6400&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td num="" align="right"&gt;8141&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td&gt;Codetel&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height: 12.75pt;" height="17"&gt;   &lt;td style="height: 12.75pt;" num="" align="right" height="17"&gt;5483&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td num="" align="right"&gt;8126&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td&gt;HTC-AS Hungarian Telecom&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height: 12.75pt;" height="17"&gt;   &lt;td style="height: 12.75pt;" num="" align="right" height="17"&gt;5089&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td num="" align="right"&gt;8105&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td&gt;NTL NTL Group Limited&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height: 12.75pt;" height="17"&gt;   &lt;td style="height: 12.75pt;" num="" align="right" height="17"&gt;3257&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td num="" align="right"&gt;7803&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td&gt;TISCALI-BACKBONE&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height: 12.75pt;" height="17"&gt;   &lt;td style="height: 12.75pt;" num="" align="right" height="17"&gt;7693&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td num="" align="right"&gt;7696&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td&gt;COMNET-TH&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height: 12.75pt;" height="17"&gt;   &lt;td style="height: 12.75pt;" num="" align="right" height="17"&gt;12542&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td num="" align="right"&gt;7594&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td&gt;TVCABO Autonomous System&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height: 12.75pt;" height="17"&gt;   &lt;td style="height: 12.75pt;" num="" align="right" height="17"&gt;6849&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td num="" align="right"&gt;7444&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td&gt;UKRTELNET&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height: 12.75pt;" height="17"&gt;   &lt;td style="height: 12.75pt;" num="" align="right" height="17"&gt;15311&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td num="" align="right"&gt;7095&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td&gt;Telefonica Empresas&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height: 12.75pt;" height="17"&gt;   &lt;td style="height: 12.75pt;" num="" align="right" height="17"&gt;1221&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td num="" align="right"&gt;6908&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td&gt;ASN-TELSTRA&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height: 12.75pt;" height="17"&gt;   &lt;td style="height: 12.75pt;" num="" align="right" height="17"&gt;6057&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td num="" align="right"&gt;6886&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td&gt;Administracion Nacional de Telecomunicaciones&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height: 12.75pt;" height="17"&gt;   &lt;td style="height: 12.75pt;" num="" align="right" height="17"&gt;6799&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td num="" align="right"&gt;6715&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td&gt;OTENET-GR OTEnet S.A. Multiprotocol Backbone&lt;br /&gt;&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height: 12.75pt;" height="17"&gt;   &lt;td style="height: 12.75pt;" num="" align="right" height="17"&gt;7029&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td num="" align="right"&gt;6510&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td&gt;Alltel Information Services, Inc.&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height: 12.75pt;" height="17"&gt;   &lt;td style="height: 12.75pt;" num="" align="right" height="17"&gt;6830&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td num="" align="right"&gt;6482&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td&gt;UPC&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height: 12.75pt;" height="17"&gt;   &lt;td style="height: 12.75pt;" num="" align="right" height="17"&gt;13285&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td num="" align="right"&gt;6291&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td&gt;OPALTELECOM-AS&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height: 12.75pt;" height="17"&gt;   &lt;td style="height: 12.75pt;" num="" align="right" height="17"&gt;8881&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td num="" align="right"&gt;6178&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td&gt;VERSATEL&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height: 12.75pt;" height="17"&gt;   &lt;td style="height: 12.75pt;" num="" align="right" height="17"&gt;8402&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td num="" align="right"&gt;6086&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td&gt;CORBINA-AS&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height: 12.75pt;" height="17"&gt;   &lt;td style="height: 12.75pt;" num="" align="right" height="17"&gt;2860&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td num="" align="right"&gt;6038&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td&gt;NOVIS Novis Telecom, S.A.&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height: 12.75pt;" height="17"&gt;   &lt;td style="height: 12.75pt;" num="" align="right" height="17"&gt;6855&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td num="" align="right"&gt;5853&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td&gt;SK SLOVAK TELECOM, AS6855&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height: 12.75pt;" height="17"&gt;   &lt;td style="height: 12.75pt;" num="" align="right" height="17"&gt;20838&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td num="" align="right"&gt;5851&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td&gt;YIF-AS&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height: 12.75pt;" height="17"&gt;   &lt;td style="height: 12.75pt;" num="" align="right" height="17"&gt;11427&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td num="" align="right"&gt;5718&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td&gt;Road Runner&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height: 12.75pt;" height="17"&gt;   &lt;td style="height: 12.75pt;" num="" align="right" height="17"&gt;7018&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td num="" align="right"&gt;5587&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td&gt;AT&amp;T WorldNet Services&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height: 12.75pt;" height="17"&gt;   &lt;td style="height: 12.75pt;" num="" align="right" height="17"&gt;10091&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td num="" align="right"&gt;5542&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td&gt;SCV-AS-AP&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height: 12.75pt;" height="17"&gt;   &lt;td style="height: 12.75pt;" num="" align="right" height="17"&gt;19548&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td num="" align="right"&gt;5507&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td&gt;Adelphia&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height: 12.75pt;" height="17"&gt;   &lt;td style="height: 12.75pt;" num="" align="right" height="17"&gt;12880&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td num="" align="right"&gt;5472&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td&gt;DCI-AS&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height: 12.75pt;" height="17"&gt;   &lt;td style="height: 12.75pt;" num="" align="right" height="17"&gt;10318&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td num="" align="right"&gt;5206&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td&gt;CABLEVISION S.A.&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height: 12.75pt;" height="17"&gt;   &lt;td style="height: 12.75pt;" num="" align="right" height="17"&gt;15475&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td num="" align="right"&gt;5140&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td&gt;NOL&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height: 12.75pt;" height="17"&gt;   &lt;td style="height: 12.75pt;" num="" align="right" height="17"&gt;5668&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td num="" align="right"&gt;5103&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td&gt;CenturyTel Internet Holdings, Inc.&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height: 12.75pt;" height="17"&gt;   &lt;td style="height: 12.75pt;" num="" align="right" height="17"&gt;4775&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td num="" align="right"&gt;5080&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td&gt;GLOBE-TELECOM-AS&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height: 12.75pt;" height="17"&gt;   &lt;td style="height: 12.75pt;" num="" align="right" height="17"&gt;5466&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td num="" align="right"&gt;5067&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td&gt;EIRCOM Eircom&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height: 12.75pt;" height="17"&gt;   &lt;td style="height: 12.75pt;" num="" align="right" height="17"&gt;4780&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td num="" align="right"&gt;4962&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td&gt;SEEDNET Digital United Inc.&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height: 12.75pt;" height="17"&gt;   &lt;td style="height: 12.75pt;" num="" align="right" height="17"&gt;11426&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td num="" align="right"&gt;4949&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td&gt;Road Runner&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height: 12.75pt;" height="17"&gt;   &lt;td style="height: 12.75pt;" num="" align="right" height="17"&gt;6327&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td num="" align="right"&gt;4871&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td&gt;Shaw Communications Inc.&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height: 12.75pt;" height="17"&gt;   &lt;td style="height: 12.75pt;" num="" align="right" height="17"&gt;8866&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td num="" align="right"&gt;4803&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td&gt;BTC-AS&lt;/td&gt;  &lt;/tr&gt;  &lt;tr style="height: 12.75pt;" height="17"&gt;   &lt;td style="height: 12.75pt;" num="" align="right" height="17"&gt;28573&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td num="" align="right"&gt;4753&lt;/td&gt;   &lt;td&gt;&lt;br /&gt;&lt;/td&gt;   &lt;td&gt;NET Servicos de Comunicao S.A.&lt;/td&gt;  &lt;/tr&gt; &lt;/tbody&gt;&lt;/table&gt;</content><link rel='alternate' type='text/html' href='http://blog.support-intelligence.com/2006/11/introducing-digest-of-abuse-report.html' title='Introducing the Digest of Abuse Report'/><link rel='replies' type='application/atom+xml' href='http://blog.support-intelligence.com' title='Post Comments'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/34036745/posts/default/116465696209405197'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/34036745/posts/default/116465696209405197'/><author><name>Support Intelligence</name></author></entry><entry><id>tag:blogger.com,1999:blog-34036745.post-116251641329574483</id><published>2006-11-02T16:48:00.000-08:00</published><updated>2006-11-03T14:44:00.123-08:00</updated><title type='text'>What's New at Support Intelligence?</title><content type='html'>We've been busy as bees here at SI the last month despite the endless sunshine here in SF tempting us to go ride mountan bikes instead. So what's new you ask?&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;New REACT Features&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;First of all, we've released a new rev of the REACT anti-abuse tool with new knobs and dials. The new version includes a column for data source letting users see exactly where individual abuse reports are coming from.  You'll now be able to see your favorite black lists called out in addition to the type of abuse listed.  A lot of our users asked for this so here it is. You'll also see data labeled SI which comes from our own spam traps and honey pots.   Very cool.&lt;br /&gt;&lt;br /&gt;For the large networks, we've also instituted pagination for networks with longer abuse reports. And as always the Download CSV button will give you a full view of your abuse report.&lt;br /&gt;&lt;br /&gt;If you haven't checked out the demo - log on in -&lt;br /&gt;&lt;br /&gt;   email: &lt;span style="font-weight: bold;"&gt;demo&lt;br /&gt;   &lt;/span&gt;passwd: &lt;span style="font-weight: bold;"&gt;demo&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;We think it's pretty cool.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;Upcoming REACT Features&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;So what's coming next? As always we follow our users feedback - Real time alerts, a trouble ticketing system interface so you can automatically open tickets, reverse DNS lookups, volume data on spam senders, more data sources and a handful of other goodies to help you track down and stomp out abuse.&lt;br /&gt;&lt;br /&gt;We'll have at least two more releases before the end of the year, so hang onto your hats.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;Digest of Abuse&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;In addition to working on REACT, we're also launching a new list tracking the overall state of internet abuse called the DOA List. Maybe it really stands for Dead on Arrival, maybe not - we're not saying. Either way, the weekly list will contain abuse reports on the top networks broken out by ASN and geography.  Should be fun and a bit surprising. Check it out on the &lt;a href="http://www.support-intelligence.com/doa/"&gt;Digest of Abuse Page&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;&lt;span style="font-weight: bold;"&gt;&lt;span style="font-weight: bold;"&gt;&lt;span style="font-weight: bold;"&gt;&lt;span style="font-weight: bold;"&gt;&lt;span style="font-weight: bold;"&gt;&lt;span style="font-weight: bold;"&gt;&lt;/span&gt;Rick Wesson at APWG&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;Rick will be speaking on a pannel at the upcoming Anti-Phishing Working Group meeting in Orlando Florida on the 15th of November. Sharing the pannel with him will be Randy Vaughn of Baylor University and David Dagon of Georgia Tech. The subject? Botnet infection rates.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;Adam and Rick at ISPCon&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;&lt;/span&gt;&lt;/span&gt;Both of us will be down in Santa Clara next week at ISPCon meeting folks and talking about what's going on on their networks. It'll be a good time and informative as always. &lt;span style="font-weight: bold;"&gt;&lt;span style="font-weight: bold;"&gt;&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-weight: bold;"&gt;&lt;span style="font-weight: bold;"&gt;&lt;span style="font-weight: bold;"&gt;&lt;span style="font-weight: bold;"&gt;&lt;span style="font-weight: bold;"&gt;&lt;span style="font-weight: bold;"&gt;&lt;span style="font-weight: bold;"&gt;&lt;span style="font-weight: bold;"&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;As always, feel free to contact us with ideas, feature requests, and questions....&lt;br /&gt;&lt;br /&gt;-Adam</content><link rel='alternate' type='text/html' href='http://blog.support-intelligence.com/2006/11/whats-new-at-support-intelligence.html' title='What&apos;s New at Support Intelligence?'/><link rel='replies' type='application/atom+xml' href='http://blog.support-intelligence.com' title='Post Comments'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/34036745/posts/default/116251641329574483'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/34036745/posts/default/116251641329574483'/><author><name>Support Intelligence</name></author></entry><entry><id>tag:blogger.com,1999:blog-34036745.post-115767064800108409</id><published>2006-09-07T16:09:00.000-07:00</published><updated>2006-11-02T17:25:34.236-08:00</updated><title type='text'>Have You Been Hacked?</title><content type='html'>One of the scarriest things about getting hacked is you won't even know it.&lt;br /&gt;&lt;br /&gt;Sooner or later your virus scanner will fail, you'll click on the wrong web page, or someone will plug an infected laptop into your network and Kapow! You'll be the latest victim. But odds are you won't notice it until it's too late.&lt;br /&gt;&lt;br /&gt; &lt;span style="font-weight: bold;"&gt;Botnets are Designed for Stealth&lt;/span&gt;&lt;br /&gt;Modern botnets are sneaky creatures. They disable virus scanners, swap out diagnostic tools, and use just enough system resources to fly under the radar. Some polymorphic varieties even reload themselves every six hours in a morphed form so signature scanners can't detect them.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;Virus Scanners Fail&lt;/span&gt;&lt;br /&gt;Even if you're armed with the latest defenses that may not be enough to detect bots running on your systems. Recent reports by Australian CERT show that many popular virus scanners &lt;b&gt; miss up to 80% of viruses.&lt;/b&gt; Youch!&lt;br /&gt;&lt;br /&gt;Old fashioned signature detection is failing against these rapidly morphing, low profile viruses. Taking the same-old precautions you used to take yesterday isn't enough to deal with these new security threats.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;And Now for the Bad News&lt;/span&gt;&lt;br /&gt;But it gets worse. Not only are these bots sending spam like they have for years, they're also stealing more identities than before. Keylogging and packet sniffing are on the rise as organized crime moves into the cyber world.&lt;br /&gt;&lt;br /&gt;Modern botnets for example capture all forms &lt;b&gt;before &lt;/b&gt;they're encrypted by HTTPS - so &lt;b&gt;any &lt;/b&gt;online transaction gets captured, including logins, passwords, social security numbers, addresses, and of course, credit card numbers.&lt;br /&gt;&lt;br /&gt;Once a bot starts running on your systems, it's a race to see how much identity information it can steal before being detected and shut down. Speed is of the essence.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;Behavioral Detection&lt;/span&gt;&lt;br /&gt;So if signature detection isn't enough what are we supposed to do? Fortunately there's a new school of bot detection. Behavioral detection looks for signs of bot activity as opposed to the profile of the infected code.&lt;br /&gt;&lt;br /&gt;For a bot to be effective it has to &lt;b&gt;do &lt;/b&gt;something - and these somethings are detectable. Propagation, "phoning-home" to command and control servers, spamming, offering proxy services, and other behaviors all leave tell tale signs of an infection.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;IP Monitoring&lt;/span&gt;&lt;br /&gt;So unless you're looking for signs of botnet activity on your network you're pretty much sleepwalking into rush hour traffic. The good news is with behavioral based IP monitoring you can be alerted instantly to signs of bot activity on your network.&lt;br /&gt;&lt;br /&gt;No defense if perfect, so you'd better know when they fail. And as soon as possible, because the identity theft clock starts ticking as soon as you're hacked. Behavioral monitoring offers us the best next wave of detection and response to these kind of threats.</content><link rel='alternate' type='text/html' href='http://blog.support-intelligence.com/2006/09/have-you-been-hacked.html' title='Have You Been Hacked?'/><link rel='replies' type='application/atom+xml' href='http://blog.support-intelligence.com' title='Post Comments'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/34036745/posts/default/115767064800108409'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/34036745/posts/default/115767064800108409'/><author><name>Support Intelligence</name></author></entry></feed>