[Info-vax] [Change topic] VMS systems botnets
Kerry Main
kemain.nospam at gmail.com
Sat Oct 29 21:12:49 EDT 2016
> -----Original Message-----
> From: Info-vax [mailto:info-vax-bounces at rbnsn.com] On Behalf
> Of Simon Clubley via Info-vax
> Sent: 29-Oct-16 4:35 PM
> To: info-vax at rbnsn.com
> Cc: Simon Clubley <clubley at remove_me.eisner.decus.org-
> Earth.UFP>
> Subject: Re: [Info-vax] [Change topic] VMS systems botnets
>
> On 2016-10-28, Roy Omond <roy at omond.net> wrote:
> > On 27/10/16 12:03, Stephen Hoffman wrote:
> >
> >> [...snip...]
> >
> >> I've cleaned up various
> >> down-revision or misconfigured OpenVMS boxes that were
> parts of botnets.
> >
> >> [...snip...]
> >
> >> Running old software — particularly on servers exposed to the
> 'net —
> >> is risky at best, and more than a few folks with OpenVMS
> servers have
> >> gotten bagged into botnets due to down-revision network
> services, or
> >> other issues.
> >
> > Hoff, I'd appreciate if you could expand on this. How were
> these VMS
> > systems acting as botnets ?
>
> For one thing, VMS systems have been used for the NTP DDOS
> amplification/reflection attacks.
>
> Simon.
>
Here is more formal info on this and the recommended fix that was published:
http://bit.ly/2dZd8QO
Full url:
http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04790232
Regards,
Kerry Main
Kerry dot main at starkgaming dot com
More information about the Info-vax
mailing list