Security Incidents mailing list archives

*MAJOR SECURITY BREACH AT CCBILL**


From: Dayne Jordan <djordan () completeweb net>
Date: Wed, 19 Dec 2001 04:14:48 -0500

It appears that perhaps tens of thousands of username/passwords for valid
shell logins ALL ACROSS THE NET may have been compromised at CCBILL,
a large internet credit card/check processor used for e-commerce and
adult sites, read carefully!!

Well, after the user complaint below, we began some investigation
and found about 6 of these IRC bots running on our network as well.
All with a fartone.conf and fartone eggdrop irc daemon listening
on port 9872... this is across 6 different machines alone in our
server farm, so far that we have found, we are scanning right now
to find out if there are more listening on port 9872 in our address
spaces.

Interestingly enough, the common tie between all these compromised
accounts is that they are ALL CCBILL customers. Being CCBILL customers,
they have all their userid and password information to ssh to their
website(s)/server(s) to update scripts and databases as required.
Was CCBILL hacked? OR do they have someone inside who has released
the user information abroad? We called a couple other hosts whom
we communicate with and voila.. they have boxes with IRC bots 
running on port 9872 as well... also CCBILL clients.

It appears whomever has obtained the CCBILL list of usernames/passwords
systematically SSH's into their customers server, installs the irc
eggdrop bot and leaves.

I have found no instances of root kits, or anything else malicious
being performed or installed. In fact, in all 6 instances they left
all their .tar and config files, AND their .history files intact.
Looking thru normal daily log files would not tip you off to any sort
of compromise at all -No multiple password failures, etc etc because
they already have the correct password to login :)

It is my opinion that Cavecreek/CCBILL has had a breach of security
thus releasing user ids and logins on various servers around the
internet. CCBILLS customer base is in the tens of thousands.

It appears the bots are merely sitting and listening waiting for
commands for perhaps a large distributed DoS attack, it does not
appear that they are logging any sensitive data transmitted thru
the server(s). I tcpdumped the port and logged in and out of the
server to make sure it wasnt transmitting any data elsewhere. I
also confirmed that the bots were not logging anything locally
either.

I have attached a sample output of strings on the binary file
called 'fartone' for your review, please note there are *several*
cavecreek machines who are listed as well as many others.
ALL these machines below have been verified to have port 9872 open
and listening with perhaps this same type IRC Eggdrop bot running.
Also please note, all these servers/domains listed below are
current CCBILL subscribers:

ares# strings fartone
#4v: eggdrop v1.6.7 -- betty -- written Wed Dec 19 02:00:00 2001
goldeneye  - bfoN                    
--BOTADDR insecure.nl:4567/4567
--BOTFL ghp
--HOSTS *!*lagg () blackhole iarga com
--LASTON 1008733201 #(_(_)============D
--XTRA created 1008544330
--PASS 0dz32ajse1wsg
arsch      - bfoN                    
--HOSTS *!*jb@*.t-dialin.net
--LASTON 1008721551 #testtest
--BOTADDR 123.123.123.123:25432/25432
--XTRA created 1008687422
--PASS fnh4psb7x07rnr
Nitallica  - bfoN                    
--HOSTS *!*maul@205.244.47.249
--LASTON 1008723944 #torisbots
--BOTADDR smtp.webpipe.net:6000/6000
--XTRA created 1008687422
--PASS 29tuhow2of
FrauAntje  - bfoN                    
--HOSTS *!*cf () rise and.shine
--BOTADDR cc118955-b.groni1.gr.nl.home.com:5555/5555
--XTRA created 1008687422
--LASTON 1008715911 #fattool
--PASS 6qgkm19qzmqr41
hispa      - bfoN                    
--HOSTS *!*hispa@209.61.189.230
--HOSTS *!*hispa () thunder2 cwihosting com
--LASTON 1008727382 #(_(_)============D
--BOTADDR thunder2.cwihosting.com:9872/9872
--XTRA created 1008687422
--PASS 4rg6kei8cz
livedom    - bfoN                    
--HOSTS *!*livedom () s1 ss klmz mi voyager net
--HOSTS *!*livedom@207.89.177.218
--BOTADDR s1.ss.klmz.mi.voyager.net:9872/9872
--XTRA created 1008687422
--PASS chahi5e10yz
fetishUSA  - bfoN                    
--HOSTS *!*etishUSA@207.246.139.76
--HOSTS *!*etishUSA () fetish-usa com
--BOTADDR fetish-usa.com:9872/9872
--XTRA created 1008687422
--LASTON 1008714534 #fattool.-user
--PASS el44md4jsx
edik       - bfoN                    
--HOSTS *!edik@216.143.123.202
--HOSTS *!*eve3@216.143.123.202
--LASTON 1008721551 #testtest
--BOTADDR 216.143.123.202:9872/9872
--XTRA created 1008687422
--PASS lpk748otq4
undergrou  - bfoN                    
--HOSTS *!undergrou () undergroundmpegs com
--LASTON 1008721551 #testtest
--BOTADDR undergroundmpegs.com:9872/9872
--XTRA created 1008687422
--PASS h9raa3sbzib1isl
cartoon-x  - bfoN                    
--HOSTS *!cartoon-x () dynamic cavecreek net
--HOSTS *!*rtoon-x@64.38.235.20
--LASTON 1008721551 #testtest
--BOTADDR dynamic.cavecreek.net:9872/9872
--XTRA created 1008687422
--PASS jsuf82v4gity
plump      - bfoN                    
--HOSTS *!plump () viper acceleratedweb net
--HOSTS *!*lump@216.118.101.2
--LASTON 1008727382 #(_(_)============D
--BOTADDR viper.acceleratedweb.net:9872/9872
--XTRA created 1008687422
--PASS 01rc6sicoh9
dara       - bfoN                    
--HOSTS *!dara@209.67.61.60
--HOSTS *!*dara () flash41 flashhost com
--HOSTS *!*ara () www genxxx net
--LASTON 1008721551 #testtest
--BOTADDR 209.67.61.60:9872/9872
--XTRA created 1008687422
--PASS 1r52f5hl8ua3
asian      - bfoN                    
--HOSTS *!asian () asianpornoground com
--LASTON 1008727382 #(_(_)============D
--BOTADDR asianpornoground.com:9872/9872
--XTRA created 1008687422
--PASS 8kbbvw1d82r
flashx     - bfoN                    
--HOSTS *!flashx () flashdiet net
--LASTON 1008721551 #testtest
--BOTADDR flashdiet.net:9872/9872
--XTRA created 1008687422
--PASS r1mict2o4p3m2g
bonker     - bfoN                    
--HOSTS *!bonker () la2 reliablehosting com
--BOTADDR la2.reliablehosting.com:9872/9872
--XTRA created 1008687422
--LASTON 1008689564 #fattool
--PASS mstz9bj3w1
cypo       - bfoN                    
--HOSTS *!cypo@66.78.56.62
--LASTON 1008727382 #(_(_)============D
--BOTADDR 66.78.56.62:9872/9872
--XTRA created 1008687422
--PASS b051yatpxv78
adult      - bfoN                    
--HOSTS *!adult@216.66.37.130
--LASTON 1008721551 #testtest
--BOTADDR 216.66.37.130:9872/9872
--XTRA created 1008687422
--PASS 8vk58u93xm0cp
steenbok   - bfoN                    
--HOSTS *!steenbok () navajo b-h-e com
--LASTON 1008727382 #(_(_)============D
--BOTADDR navajo.b-h-e.com:9872/9872
--XTRA created 1008687422
--PASS ky613fzu65pt9
betty      - bfoN                    
--HOSTS *!betty@216.226.153.165
--BOTADDR 216.226.153.165:9872/9872
--XTRA created 1008687422
--PASS svhcr3jpb98bk88
silky      - bfoN                    
--HOSTS *!silky () www36 mediaserve net
--LASTON 1008721551 #testtest
--BOTADDR www36.mediaserve.net:9872/9872
--XTRA created 1008703816
vixie      - bfoN                    
--HOSTS *!vixie () zeus envex net
--LASTON 1008721551 #testtest
--BOTADDR zeus.envex.net:9872/9872
--XTRA created 1008703839
c0wboy     - bfoN                    
--HOSTS *!c0wboy () arizonasex com
--LASTON 1008737794 #(_(_)============D
--BOTADDR arizonasex.com:9872/9872
--XTRA created 1008703859
reddawg    - bfoN                    
--HOSTS *!reddawg () 216 215 232 6 nw nuvox net
--LASTON 1008727382 #(_(_)============D
--BOTADDR 216.215.232.6.nw.nuvox.net:9872/9872
--XTRA created 1008703890
blaq       - bfoN                    
--HOSTS *!blaq () www retronudes com
--HOSTS *!*ronudes () www retronudes com
--LASTON 1008727382 #(_(_)============D
--BOTADDR www.retronudes.com:9872/9872
--XTRA created 1008704719
bigdick    - bfoN                    
--HOSTS *!bigdick () playawhile com
--HOSTS *!*yguy () playawhile com
--LASTON 1008727382 #(_(_)============D
--BOTADDR playawhile.com:9872/9872
--XTRA created 1008705304
serve      - bfoN                    
--HOSTS *!serve () server iicinternet com
--HOSTS *!*erve@64.156.139.240
--LASTON 1008731356 #(_(_)============D
--BOTADDR server.iicinternet.com:9872/9872
--XTRA created 1008706464
pedal      - bfoN                    
--HOSTS *!pedal () www1 leftcoast net
--BOTADDR www1.leftcoast.net:9872/9872
--XTRA created 1008707679
sizco      - bfoN                    
--HOSTS *!creme () virtual1 sizco net
--HOSTS *!*tcreme () virtual1 sizco net
--LASTON 1008737609 #(_(_)============D
--BOTADDR virtual1.sizco.net:9872/9872
--XTRA created 1008708744
melody     - bfoN                    
--HOSTS *!melody@64.242.242.9
--LASTON 1008727382 #(_(_)============D
--BOTADDR 64.242.242.9:9872/9872
--XTRA created 1008710553
cukinsin   - bfoN                    
--HOSTS *!cukinsin@209.115.38.113
--LASTON 1008727382 #(_(_)============D
--BOTADDR 209.115.38.113:9872/9872
--XTRA created 1008711094
slettebak  - bfoN                    
--HOSTS *!slettebak () stgeorge janey1 net
--HOSTS *!*ettebak@216.226.157.2
--LASTON 1008737670 #(_(_)============D
--BOTADDR stgeorge.janey1.net:9872/9872
--XTRA created 1008712167
tussy      - bfoN                    
--HOSTS *!tussy () fs2 reliablehosting com
--LASTON 1008721551 #testtest
--BOTADDR fs2.reliablehosting.com:9872/9872
--XTRA created 1008712187
hrm        - bfoN                    
--HOSTS *!hrm () infiniti isprime com
--BOTADDR infiniti.isprime.com:9872/9872
--XTRA created 1008713730
--LASTON 1008713966 #jungbusch
fister     - bfoN                    
--HOSTS *!fister () or9 reliablehosting com
--LASTON 1008727382 #(_(_)============D
--BOTADDR or9.reliablehosting.com:9872/9872
--XTRA created 1008713748
buttfuck   - bfoN                    
--HOSTS *!buttfuck () www bridgetfox com
--HOSTS *!*uttfuck () la4 reliablehosting com
--LASTON 1008727382 #(_(_)============D
--BOTADDR www.bridgetfox.com:9872/9872
--XTRA created 1008715635
nude       - bfoN                    
--HOSTS *!*nude () host210 southwestmedia com
--LASTON 1008727382 #(_(_)============D
--BOTADDR host210.southwestmedia.com:9872/9872
--XTRA created 1008717613
kippe      - bfoN                    
--HOSTS *!*kippe@207.71.95.100
--LASTON 1008727382 #(_(_)============D
--BOTADDR 207.71.95.100@9872:3333/3333
--XTRA created 1008718483
lecker     - bfoN                    
--HOSTS *!*lecker () ladynylons com
--LASTON 1008723944 #torisbots
--BOTADDR ladynylons.com@9872:3333/3333
--XTRA created 1008718866
cf         - hjmnoptx                
--HOSTS -telnet!*@*
--HOSTS cf@pain.killer
--PASS +kqP.7.9x36e.
--XTRA created 1008425222
cf_        - fhjmnoptxZ              
--HOSTS *!cf@pain.killer
--LASTON 1008727068 @bums
--PASS +SO3pi.h66XB1
--XTRA created 1008426075
chumash    - fhpYZ                   
--HOSTS *!nitaisa () shemalepornstar com
--HOSTS *!nitaisa () tightkitten com
--PASS +ghTan/8SXJw1
--COMMENT 1st Offense Badword
--XTRA created 1008426757
m00b       - h                       
--HOSTS *!b00m@*.planet.arrakis.cz
--LASTON 1008733043 #0dayxxxpasswords
--PASS +REjnv1Q0DAf/
--XTRA created 1008440044
Cyberwolf  - h                       
--HOSTS *!Blah@*.rr.com
--PASS +HPw7k0X0/X51
--XTRA created 1008442445
w33d       - hY                      
--HOSTS *!dope@209.53.205.*
--PASS +w/e/c.r8kog/
--XTRA created 1008455421
--COMMENT 1st Offense Badword
_maddog_   - hY                      
--HOSTS *!*ouchabl@*.dial.net4b.pt
--PASS +w/e/c.r8kog/
--COMMENT 1st Offense Badword
--XTRA created 1008459615
undernetx  - hY                      
--HOSTS *!*dernetx@*.east.verizon.net
--PASS +w/e/c.r8kog/
--COMMENT 1st Offense Badword
--XTRA created 1008460443
O2B3       - hY                      
--HOSTS *!*frischr@*.xtra.co.nz
--PASS +w/e/c.r8kog/
--COMMENT 1st Offense Badword
--XTRA created 1008460560
xxxxx      - hY                      
--HOSTS *!cf@*.and.shine
--PASS +w/e/c.r8kog/
--COMMENT 1st Offense Badword
--XTRA created 1008465019
^[FTO1]^   - hY                      
--HOSTS *![FTO1]^@*.astound.net
--PASS +w/e/c.r8kog/
--XTRA created 1008465619
--COMMENT 1st Offense Badword
showty     - hE                      
--HOSTS *!dfioaj@24.129.181.*
--PASS +w/e/c.r8kog/
--COMMENT 2 Bad Word Offenses
--XTRA created 1008470243
_mysdick   - hY                      
--HOSTS *!mystical () ownz com
--LASTON 1008732953 #0dayxxxpasswords
--PASS +w/e/c.r8kog/
--COMMENT 1st Offense Badword
--XTRA created 1008473951
Shareef_A  - hY                      
--HOSTS *!Ultima@200.56.148.*
--PASS +w/e/c.r8kog/
--COMMENT 1st Offense Badword
--XTRA created 1008477957
aHiMz      - hY                      
--HOSTS *!toophat@210.195.204.*
--PASS +w/e/c.r8kog/
--COMMENT 1st Offense Badword
--XTRA created 1008480641
sr         - hjmnoptx                
--HOSTS *!figge () shemalepornstar com
--LASTON 1008715929 @goldeneye
--PASS +9fX2h.WNiV41
--XTRA created 1008539610
bigwave    - h                       
--HOSTS *!*tchbust () hereistheporn com
--LASTON 1008704750 #jungbusch
--PASS +shNEb1VEXSl1
--XTRA created 1008541504
qon        - h                       
--HOSTS *!jbcqon@*.t-dialin.net
--LASTON 1008701006 #jungbusch
--PASS +HUtku0I/W6R.
--XTRA created 1008678075
qonbot     - h                       
--HOSTS *!qon@*.t-dialin.net
--HOSTS *!*achgott@*.t-dialin.net
--LASTON 1008701417 #jungbusch
--PASS +HUtku0I/W6R.
--XTRA created 1008678105
ice2k      - h                       
! #jungbusch           1008706286 fov        
--HOSTS *!fisch@*.t-dialin.net
--LASTON 1008706286 #jungbusch
--PASS +riut8.jEw3u0
--XTRA created 1008705970
stiffy     - bfoN                    
--HOSTS *!*stiffy () otis siteprotect com
--BOTADDR otis.siteprotect.com@9872:3333/3333
--XTRA created 1008720570
moese      - bfoV                    
--HOSTS *!*moese () ns14 reliablehosting com
--BOTADDR ns14.reliablehosting.com@9872:3333/3333
--XTRA created 1008721358
moepsy     - bfoN                    
--HOSTS *!*moepsy () katarina super nu
--LASTON 1008723455 #fattool
--BOTADDR katarina.super.nu@9872:3333/3333
--XTRA created 1008723363
sicker     - bfoN                    
--HOSTS *!*sicker () 1-nude-girls-sex-pictures com
--LASTON 1008726564 #0dayxxxpasswords
--BOTADDR 1-nude-girls-sex-pictures.com@9872:3333/3333
--XTRA created 1008724705
pullo      - bfoN                    
--HOSTS *!*pullo () co60 reliablehosting com
--LASTON 1008727313 #0dayxxxpasswords
--BOTADDR co60.reliablehosting.com@9872:3333/3333
--XTRA created 1008725430
wixer      - bfoN                    
--HOSTS *!*wixer () co60 reliablehosting com
--LASTON 1008727314 #0dayxxxpasswords
--BOTADDR co60.reliablehosting.com@9871:3333/3333
--XTRA created 1008725589
bums       - bfoN                    
--HOSTS *!*bums () 365host com
--BOTADDR 365host.com@9872:3333/3333
--XTRA created 1008726771
gretl      - bfoN                    
--HOSTS *!*gretl () saturn iwebhosting com
--LASTON 1008727314 #0dayxxxpasswords
--BOTADDR saturn.iwebhosting.com@9871:3333/3333
--XTRA created 1008726906

Please note the .history file just from this one account,
and this is merely a small sample, please note, these are
all CCBILL accounts:

ssh -l f215109 www.extremeteens.net
telnet www.extremeteens.net
ssh -l amfight www.amfight.com
ssh -l sm-online www.sm-online.net
telnet www.musicchief.com
telnet www.studspa.com
ssh -l gmill www.G2mil.com
ssh -l sweetcreme www.sweetcreme.com
ssh -l roach www.exposedfantasy.com
ssh -l tfi0080192 www.whores.telinco.co.uk
ftp www.whores.telinco.co.uk
ssh -l jen11sex www.jensex.com
ssh -l webusr www.asianvixens.net 
ssh -l freakfest www.chicagofreakfest.com
telnet www.gangbang-wife.com
ftp gangbang-wife.com
ssh -l gangbang ganbang-wife.com
ssh -l gangbang gangbang-wife.com
ssh -l norfun www.norfun.com
ssh -l doublejay doublejay.ultraadult.com
ftp ultraadult.com
ftp www.internetpleasure.net
telnet www.internetpleasure.net
ssh -l admin www.internetpleasure.net
ftp www.internetpleasure.net
mail
w
ftp www.teenpussy2001.com
w
ssh -l livedom www.livedom.com
ssh -l dmartin2 www.sweetcuties.com
w
ssh -l fetish www.fetish-usa.com
ssh -l dodger www.dodger.co.uk
ssh -l beavis www.eroticamazon.com
w
ls
ssh -l www.thebondagechanne www.thebondagechannel.com
ftp www.thebondagechannel.com
ssh -l hispa hispamagic.com
ssh -l dodger www.dodger.co.uk
ssh -l livedom www.livedom.com 
ssh -l fetish www.fetish-usa.com
ssh -l jen11sex www.jensex.com
ssh -l stephenp www.thefun-times.com
ssh -l barbie www.VoyeurCamCondo.com
ssh -l eve3 www.strumpfhosen-girls.com
ssh -l melody www.undergroundmpegs.com
mail
telnet www.AMAHO.COM
ssh -l blueflamedesigns www.blueflamedesigns.com
ssh -l dynamic www.cartoon-x.net
ssh -l u1498 www.plumptious.com
ssh -l rowan55 www.dirtydara.com
ssh -l barbara www.asianpornoground.com
ssh -l alenko www.alenko.com
ssh -l hispa hispamagic.com
ssh -l livedom www.livedom.com
ssh -l melody www.undergroundmpegs.com
ssh -l u1498 www.plumptious.com
ssh -l rowan55 www.dirtydara.com
ssh -l rburdwood www.southcouple.com
ssh -l flashdiet flashdiet.net
ssh -l cypo www.cypo.com
ssh -l u44048 adultfrontier.com
ssh -l u44048 www.adultfrontier.com
ssh -l avrcon avrcon.com
ssh -l sara www.boobtique.com
ssh -l extreme-g www.xtreme-girls.com
ssh -l lynnol www.lynncarroll.net
exit
ssh -l www.extremeteens.net
/bin/bash
ssh -l websex www.websex.org
ssh -l playsi www.silkyplay.com
ssh -l linda www.nastylinda.com
ssh -l ndevine www.nikkidevine.com
ssh -l belleleigh www.belleleigh.com
ssh -l gtdfor www.arizonasex.com
ssh -l voyearexpo www.voyeurexpo.com
/bin/bash
ssh -l voyeurexpo www.voyeurexpo.com
ssh -l markiemark www.profitbusiness.com
telnet www.analaddiction.com
ssh -l pplump www.proudly-plump.com
ssh -l taboo www.incesttaboo.com
ssh -l legendaryreddog www.legendaryreddog.com
telnet www.adultamateursexpictures.com
ssh -l miami miamistudios.com
ssh -l envex www.envex.net
ssh -l voyeurmyth www.voyeurmyth.com
ssh -l netpimp www.exhibitionfetish.com
ssh -l teressam www.teressamoss.com
ssh -l gospeltr www.gospeltribune.com
ssh -l mcooper www.findfreefiles.com
telnet www.retronudes.com
ssh -l nyguy www.playawhile.com
ssh -l wickedgamers www.wickedgamers.net
ssh -l wengle www.hentaidimension.com
ssh -l nudistphotogallery www.nudistphotogallery.net


stan () visox com wrote:


Here is a message regarding a hack attempt. They have stated that the
hack was also from our server 216.226.xxx.xxx. How can we check who/what
happened from that server. The details from there logs are below.

Stan
****

-------- Original Message --------
From: - Tue Dec 18 21:57:22 2001
X-UIDL: c531b934e8e90feedce1e9ab85425a46
X-Mozilla-Status: 0001
X-Mozilla-Status2: 00000000
Received: from gelt.cavecreek.net (gelt.cavecreek.net [64.38.195.170])
by zeus.xxxxxxxxxx (8.8.5/8.8.5) with ESMTP id AAA22149 for
<stan@xxxxxxxxxx>; Wed, 19 Dec 2001 00:49:52 -0500 (EST)
Received: from biz-link.com (cx832301-d.chnd1.az.home.com
[24.14.253.216]) by gelt.cavecreek.net (8.11.2/8.11.1) with ESMTP id
fBJ5thY93497; Tue, 18 Dec 2001 22:55:44 -0700 (MST) (envelope-from
wolkove () biz-link com)
Message-ID: <3C202C0C.CDD0D35D () biz-link com>
Date: Tue, 18 Dec 2001 22:56:28 -0700
From: Jeff Wolkove <wolkove () biz-link com>
Reply-To: wolkove () biz-link com
Organization: SVM
X-Mailer: Mozilla 4.77 [en] (Windows NT 5.0; U)
X-Accept-Language: en
MIME-Version: 1.0
To: abuse () home com, stan@xxxxxxxxx
CC: support () cavecreek com
Subject: Illegal hacking activity
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
X-UIDL: c531b934e8e90feedce1e9ab85425a46

LEGAL NOTICE TO abuse () home com and stan@xxxxxxxxxx
Courtesy Copy To: support () cavecreek com

One of your users illegally accessed a server I own and illegally
installed and ran software on it. The hacker gained access to the
system using a hacked or stolen password and installed "eggdrop"
an IRC bot with the capability of launching distributed denial
of service attacks.

This hacker accessed my system from cc118955-a.groni1.gr.nl.home.com
by FTP as per the following entry in my system FTP logs. All times
are Mountain Standard Time (Arizona, USA).

Dec 18 11:48:04 gelt ftpd[23349]: connection from
cc118955-a.groni1.gr.nl.home.com (213.51.147.235)

The user also accessed the system using interactive SSH from
216.226.xxx.xxx
according to the following entries in syslog

Dec 18 11:37:51 gelt sshd2[16845]: DNS lookup failed for
"216.226.xxx.xxx".
Dec 18 11:38:02 gelt sshd2[16845]: User gtdfor's local password
accepted.
Dec 18 11:38:02 gelt sshd2[16845]: Password authentication for user
gtdfor accepted.
Dec 18 11:38:02 gelt sshd2[16845]: User gtdfor, coming from
216.226.xxx.xxx, authenticated.

This is a private server and the gtdfor user ID is used only by myself,
the system administrator. This is a unix-level login, not a web site
account. This(these) user(s) therefore gained access illegally.


----------------------------------------------------------------------------
This list is provided by the SecurityFocus ARIS analyzer service.
For more information on this free incident handling, management 
and tracking system please see: http://aris.securityfocus.com


Current thread: