Got a couple of reports recently about an increase in port 1434 scanning for the infamous “Slammer” (aka “Saphire”) MS-SQL Server vulnerability. Sad to say: It looks like it never went away… There appears to be still a “background” of about 50 source IPs/day that scan for port 1434. Now this is way down from the numbers we had in 2003/2004 (20-30,000 sources per day). But to put it in perspective: This was still about an order of magnitude lower than what we see for Mirai now. So let’s look at this again in 13 years, and see how many DVRs are still sending Mirai style scans. Just like with Slammer, all it takes is a couple of them to survive to immediately infect new systems as they come online.
If you want a list of yesterday’s sources, check here: https://isc.sans.edu/dailysources.html?mintargetport=1434&maxtargetport=1434
After removing some of the research scanners (Shodan, Shadowserver, Quadmetrics), I am left with this list:
ASN | IP Address | CT | Network Name 278 | 22.214.171.124 | MX | Universidad Nacional Autonoma de Mexico, MX 3462 | 126.96.36.199 | TW | HINET Data Communication Business Group, TW 3786 | 188.8.131.52 | KR | LGDACOM LG DACOM Corporation, KR 4134 | 184.108.40.206 | CN | CHINANET-BACKBONE No.31,Jin-rong Street, CN 4816 | 220.127.116.11 | CN | CHINANET-IDC-GD China Telecom (Group), CN 4837 | 18.104.22.168 | CN | CHINA169-BACKBONE CNCGROUP China169 Backbone, CN 5650 | 22.214.171.124 | US | FRONTIER-FRTR - Frontier Communications of America, Inc., US 6739 | 126.96.36.199 | ES | ONO-AS Cableuropa - ONO, ES 7018 | 188.8.131.52 | US | ATT-INTERNET4 - AT&T Services, Inc., US 7029 | 184.108.40.206 | US | WINDSTREAM - Windstream Communications Inc, US 7162 | 220.127.116.11 | BR | Universo Online S.A., BR 7418 | 18.104.22.168 | CL | TELEFÓNICA CHILE S.A., CL 7470 | 22.214.171.124 | TH | TRUEINTERNET-AS-AP TRUE INTERNET Co.,Ltd., TH 7643 | 126.96.36.199 | VN | VNPT-AS-VN Vietnam Posts and Telecommunications (VNPT), VN 7922 | 188.8.131.52 | US | COMCAST-7922 - Comcast Cable Communications, LLC, US 8342 | 184.108.40.206 | RU | RTCOMM-AS , RU 8560 | 220.127.116.11 | US | ONEANDONE-AS Brauerstrasse 48, DE 9808 | 18.104.22.168 | CN | CMNET-GD Guangdong Mobile Communication Co.Ltd., CN 11014 | 22.214.171.124 | AR | CPS, AR 11650 | 126.96.36.199 | US | PLDI - Pioneer Long Distance Inc., US 15311 | 188.8.131.52 | CL | Telefonica Empresas, CL 16276 | 184.108.40.206 | FR | OVH , FR 16509 | 220.127.116.11 | US | AMAZON-02 - Amazon.com, Inc., US 17676 | 18.104.22.168 | JP | GIGAINFRA Softbank BB Corp., JP 19108 | 22.214.171.124 | US | SUDDENLINK-COMMUNICATIONS - Suddenlink Communications, US 27892 | 126.96.36.199 | VE | Universidad del Zulia, VE 29073 | 188.8.131.52 | NL | QUASINETWORKS , NL 60781 | 184.108.40.206 | NL | LEASEWEB-NL Netherlands, NL
No idea if these are actually infected systems, or if these systems are just scanning for various “research projects” as well. Right now, none of the systems appears up.
Source: SANS Internet Storm Center, InfoCON: green @ November 30, 2016 at 11:03AM