1 |
On Friday, 5 February 2021 01:48:09 GMT Adam Carter wrote: |
2 |
> On Thu, Feb 4, 2021 at 6:07 PM Adam Carter <adamcarter3@×××××.com> wrote: |
3 |
> > On Thursday, February 4, 2021, <thelma@×××××××××××.com> wrote: |
4 |
> >> I'm perplex with this entry in apache log. |
5 |
> >> I'm sure it was done by same person as the timing is very sequential and |
6 |
> >> same file-name request, but how they were able to lunch an attack from a |
7 |
> >> different IP's different geographical locations. |
8 |
> >> Can they spoof an IP? |
9 |
> > |
10 |
> > Probably just different instances of the same bot scanning for |
11 |
> > vulnerabilities. I imagine you will keep seeing that log from many |
12 |
> > different ips |
13 |
> |
14 |
> FWIW i'm seeing the same traffic. Here's some numbers; |
15 |
> |
16 |
> $ zgrep -ic wlwmanifest.xml access.log* |
17 |
> access.log:16 |
18 |
> access.log-20210110.gz:0 |
19 |
> access.log-20210117.gz:0 |
20 |
> access.log-20210124.gz:34 |
21 |
> access.log-20210131.gz:0 |
22 |
|
23 |
Bot herders have acquired many geographically dispersed IP addresses to run |
24 |
their reconnaissance scripts from. When you block one subnet or ISP block, |
25 |
they will usually popup in the logs almost immediately from another ISP in the |
26 |
same or different country. Their calls seem to coordinate with evening or day |
27 |
time hours in their respective countries of origin. |
28 |
|
29 |
Script kiddies tend to use mobile IPs, indicating they're using their phone or |
30 |
SIM as a modem. When you block them they don't come back at least until their |
31 |
PAYG phone contract runs out. |
32 |
|
33 |
There may also be state agents, but I would think it unlikely you'll find |
34 |
their fingerprints on your apache logs. :p |
35 |
|
36 |
Depending on your server's IP address featuring on some target list, the |
37 |
volume of calls can become quite high. Trying to manually block the bots is a |
38 |
tedious and ineffective task, because the professionals will add yet one more |
39 |
compromised IP address to their herd faster than you can block them. A |
40 |
scripted honeypot to automatically block typical mass scans, e.g. for |
41 |
wordpress installations, would be more effective. |