© 2019 Peter N. M. Hansteen
The year is 2019. By now Blade Runner is a movie about the past, but there are still bots out there trying to guess our passwords. It gets betterworse from here while the dictionaries expand.
The year is coming to an end and events during that year, as they happened, somehow lead to me leaving writing mainly to one side and blog posting only until I saw a bigger picture.
Note: This piece is also available with trackers but nicer formatting here.
Now with only a couple of days left to go, we see that this year began much like the previous, with a not too bright set of bots endlessly trying to guess passwords. But on January 2, a new development caught my eye:
— Peter N. M. Hansteen (@pitrh) January 2, 2019
[Sat Dec 28 17:01:28] peter@skapet:~/website$ grep 2019 spamtraps-dateadded.txt | grep -c SSH
51233You should be able to find further absurdities of a similar kind by looking for the hashtags #blooper_reel from that tweet as well ast #turbators. With those hashtags you will notice that there is at least anecdotal evidence that messages of the same kind have been directed at a significant subset of our spamtraps here (which for obvious reasons would not have been used in connection with any actual user login anywhere), evidenced by the spamd(8) log snippet preserved in this tweet:Once more for the #blooper_reel, this time in German, TXT w/headers https://t.co/xcH0vmBQYs, PNG https://t.co/DnvMZrbCAG - note that all those messages come with List-Unsubscribe: headers. How utterly nice of them. pic.twitter.com/OhYWvsEtVX— Peter N. M. Hansteen (@pitrh) January 11, 2019
And as noted in the followup tweet, other weirness was already happening:I almost wish they'd sent to actual users' addresses so I could see the full text:— Peter N. M. Hansteen (@pitrh) February 11, 2019
Feb 11 11:08:17 skapet spamd[79149]: 74.6.131.123: Body: s letter is not a hoax mail and I urge you to treat it serious. This letter=
(another wankvid-hoax-blackmail attempt most likely).
Also in a parallel development, the list of imaginary friends at https://t.co/3uthWgKWmL rolled past 64K today (a pointless statistic to anyone except me, I know), proving that if you do something for long enough, true absurdity is achievable.— Peter N. M. Hansteen (@pitrh) February 11, 2019
Possibly in the spirit of the upcoming holidays, this morning somebot in .cn tried delivering mail to new imaginary friend Jesus Mao:— Peter N. M. Hansteen (@pitrh) April 17, 2019
Apr 17 06:08:51 skapet spamd[32133]: new entry 106.13.14.227 from <ywlxo@funnyconsult.com> to <jesusmao@bsdly.net>, helo https://t.co/WC2xsKJs5N
This must mean we have reached peak something:— Peter N. M. Hansteen (@pitrh) May 31, 2019
May 31 05:48:50 skapet sshd[35089]: Failed password for invalid user * from 178.62.90.135 port 53721 ssh2
grep(1)-based script that among other things turns up new candiates for spamtraps. But again it was an early indication that by their incompetence at least some of the bot herders had exposed their methods. Weird things turn up on occasion, but it took until October before it dawned on me that at least some of the password guessing bots could be running with their username and passwords fields swithched around:The overnight haul of new user names attempted for ssh logins looks a lot like somebot switched the usenames and password columns around. Probably what passes for innovation in those parts of the world.— Peter N. M. Hansteen (@pitrh) October 4, 2019
I have tried but probably will keep failing at writing a coherent article about the bot that apparently has its username and passwords fields reversed. To wit,— Peter N. M. Hansteen (@pitrh) October 26, 2019
Oct 25 12:26:11 skapet sshd[78767]: Failed password for invalid user /']\\\\\\\\ from 188.254.0.226 port 51958 ssh2
grep(1)-centric script for detecting candiates would relatively frequently fail while trying to interpret what looked like regular expressions, with messages such as
grep: repetition-operator operand invalid
-bash: [: ==: unary operator expected