Threat Level: green Handler on Duty: Rob VandenBrink

SANS ISC: Interesting scan for medical certification information... - SANS Internet Storm Center SANS ISC InfoSec Forums

Participate: Learn more about our honeypot network

Sign Up for Free!   Forgot Password?
Log In or Sign Up for Free!
Interesting scan for medical certification information...

Craig contacted the Storm Center inquiring about an interesting scan he has seen on his server for the last several days.  The scan is at the same time everyday and only runs for a brief time, but it comes from random IPs and at a volume which almost cripples his web server for the duration of the scan.

Below are some sample logs: - - [13/Aug/2012:06:12:53 -0500] "GET /usmle-step-2-ck%26sa%3DU%26ei%3DweAoUKXcGO7ciQLpqoHACQ%26ved%3D0CCAQFjAE%26usg%3DAFQjCNGLZeLateC1dfcmOI4HHHZ33eaFbQ HTTP/1.1" 404 27320 - - [13/Aug/2012:06:12:53 -0500] "GET /usmle-step-1/step1%26sa%3DU%26ei%3DweAoUKXcGO7ciQLpqoHACQ%26ved%3D0CDIQFjAN%26usg%3DAFQjCNE7gGV1WVr1oas2WycwK6HXMTDc9Q HTTP/1.1" 404 27323 - - [13/Aug/2012:06:12:55 -0500] "GET /comlex-level-1%26sa%3DU%26ei%3DweAoUKXcGO7ciQLpqoHACQ%26ved%3D0CCQQFjAG%26usg%3DAFQjCNE9KmW1x2RLSZwTtSFJQlaciBdtZQ HTTP/1.1" 404 27319 - - [13/Aug/2012:06:12:53 -0500] "GET /pharmacology/%26sa%3DU%26ei%3DweAoUKXcGO7ciQLpqoHACQ%26ved%3D0CBoQFjAB%26usg%3DAFQjCNGWpETjIQO-QezV9OEnvmPeKrlWDA HTTP/1.1" 404 27318 - - [13/Aug/2012:06:12:53 -0500] "GET /usmle-step-2-ck/coupons/2g35%26sa%3DU%26ei%3DweAoUKXcGO7ciQLpqoHACQ%26ved%3D0CDAQFjAM%26usg%3DAFQjCNEgHYVBqXDBUNuyVgwAjaAlyRl12A HTTP/1.1" 404 27333


They all appear to be a potentially valid URL followed by an encoded string and all the requests appear to be looking for content related to US medical certification exams. 

I haven't been able to find any further information on this scan.  If any of you has seen this, or can provide any insight we would appreciate a heads up, either through our comments section or our contact page.  I will summarize any information that comes in.

-- Rick Wanner - rwanner at isc dot sans dot org - - Twitter:namedeplume (Protected)


324 Posts
ISC Handler
Aug 13th 2012
The url's are valid url's up to the part the begins with '%26sa%'

These requests hit our web server approximately the same time every day for the past 7 days at approximately the same time, and all the requests seem to come from random ip's owned by the 'Solution Pro' hosting company
Here are the decoded urls, might help understand what is going on.





a google search for AFQjCN (the common leading chars of the usg params, above) reveals a couple of TWiki sandbox instances which appear to be easy targets for posting SPAM
are there any Google Analytics "usg" parameters that don't begin as AFQjCN?

Sign Up for Free or Log In to start participating in the conversation!