toad.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Mastodon server operated by David Troy, a tech pioneer and investigative journalist addressing threats to democracy. Thoughtful participation and discussion welcome.

Administered by:

Server stats:

275
active users

#ddos

5 posts4 participants0 posts today
dercraig<p>🚀 My new <a href="https://infosec.exchange/tags/DDoS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DDoS</span></a> book "DDoS: Understanding Real-Life Attacks and Mitigation Strategies" is now also available as an eBook! 🎉</p><p>Check it out here: <a href="https://ddos-book.com/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">ddos-book.com/</span><span class="invisible"></span></a></p><p>I’ve packed in everything I’ve learned from defending major German government sites against groups like Anonymous, Killnet, and NoName057(16).</p><p>It covers mitigations against <a href="https://infosec.exchange/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a> <a href="https://infosec.exchange/tags/crawlers" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>crawlers</span></a> and many other defenses for all network layers. </p><p>If you find it useful, I’d love it if you could boost and share to help more people defend themselves. ❤️</p><p>Thank you! 🙏</p><p><a href="https://infosec.exchange/tags/DDoSProtection" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DDoSProtection</span></a> <a href="https://infosec.exchange/tags/NetworkSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NetworkSecurity</span></a> <a href="https://infosec.exchange/tags/DDoS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DDoS</span></a> <a href="https://infosec.exchange/tags/RealWorldDefense" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RealWorldDefense</span></a> <a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/eBook" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>eBook</span></a> <a href="https://infosec.exchange/tags/book" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>book</span></a></p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://infosec.exchange/@cR0w" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>cR0w</span></a></span> <span class="h-card" translate="no"><a href="https://haunted.computer/@Dio9sys" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>Dio9sys</span></a></span> <span class="h-card" translate="no"><a href="https://infosec.exchange/@da_667" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>da_667</span></a></span> </p><p>Propably Soon: another <a href="https://infosec.space/tags/DDoS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DDoS</span></a> <a href="https://infosec.space/tags/botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>botnet</span></a> made out of them , cuz even the most butchered <a href="https://infosec.space/tags/linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linux</span></a>-based <a href="https://infosec.space/tags/firmware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>firmware</span></a> can run a statically-linked version of <a href="https://infosec.space/tags/curl" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>curl</span></a>. </p><ul><li>In fact I'd not be surprised if cybercriminals later on will basically flash their own <a href="https://infosec.space/tags/CFW" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CFW</span></a> (custom firmware) to prevent others from pwning their <a href="https://infosec.space/tags/pwned" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pwned</span></a> boxes and retain persistent control.</li></ul><p>It would certainly make sense IMHO! I just don't do it as a matter of principle!</p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://infosec.exchange/@JessTheUnstill" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>JessTheUnstill</span></a></span> <span class="h-card" translate="no"><a href="https://retro.pizza/@mrencyclopedia" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>mrencyclopedia</span></a></span> or rather the same WiFi Chipset and/or decade-long unmaintained Firmware with more CVEs than clients it's DHCP server can handle and more <a href="https://infosec.space/tags/Shitcoin" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Shitcoin</span></a>-<a href="https://infosec.space/tags/mining" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mining</span></a> and <a href="https://infosec.space/tags/DDoS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DDoS</span></a>-<a href="https://infosec.space/tags/Botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Botnet</span></a>-<a href="https://infosec.space/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a> targeting it than it has Ethernet ports in the rear...</p>
C.<p>Is it just my imagination, or is Wikipedia incredibly, painfully slow today?</p><p>The graphs at <a href="https://www.wikimediastatus.net/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">wikimediastatus.net/</span><span class="invisible"></span></a> don't show anything out of the ordinary, but I've been seeing page load times in the tens of seconds.</p><p><a href="https://mindly.social/tags/wikipedia" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>wikipedia</span></a> <a href="https://mindly.social/tags/wikimedia" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>wikimedia</span></a> <a href="https://mindly.social/tags/DDOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DDOS</span></a> <a href="https://mindly.social/tags/oops" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>oops</span></a></p>
OTX Bot<p>Analysis of the latest Mirai wave exploiting TBK DVR devices with CVE-2024-3721</p><p>A new wave of Mirai botnet attacks is exploiting CVE-2024-3721 to target TBK DVR devices. The campaign uses a POST request to execute system commands without authorization, downloading and running an ARM32 binary. This Mirai variant includes features like RC4 string encryption, anti-VM checks, and anti-emulation techniques. The malware verifies if it's running in a virtual environment and checks for allowed directories. Infected devices are primarily located in China, India, Egypt, Ukraine, Russia, Turkey, and Brazil. Over 50,000 exposed DVR devices are potentially vulnerable. The botnet's main goal is to conduct DDoS attacks. Updating vulnerable devices and performing factory resets are recommended as protective measures.</p><p>Pulse ID: 6842e2da7eafc4bf38554913<br>Pulse Link: <a href="https://otx.alienvault.com/pulse/6842e2da7eafc4bf38554913" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">otx.alienvault.com/pulse/6842e</span><span class="invisible">2da7eafc4bf38554913</span></a> <br>Pulse Author: AlienVault<br>Created: 2025-06-06 12:45:14</p><p>Be advised, this data is unverified and should be considered preliminary. Always do further verification.</p><p><a href="https://social.raytec.co/tags/Brazil" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Brazil</span></a> <a href="https://social.raytec.co/tags/China" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>China</span></a> <a href="https://social.raytec.co/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://social.raytec.co/tags/DDoS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DDoS</span></a> <a href="https://social.raytec.co/tags/DoS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DoS</span></a> <a href="https://social.raytec.co/tags/ESET" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ESET</span></a> <a href="https://social.raytec.co/tags/Encryption" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Encryption</span></a> <a href="https://social.raytec.co/tags/India" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>India</span></a> <a href="https://social.raytec.co/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> <a href="https://social.raytec.co/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a> <a href="https://social.raytec.co/tags/Mirai" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Mirai</span></a> <a href="https://social.raytec.co/tags/OTX" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OTX</span></a> <a href="https://social.raytec.co/tags/OpenThreatExchange" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenThreatExchange</span></a> <a href="https://social.raytec.co/tags/Russia" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Russia</span></a> <a href="https://social.raytec.co/tags/Turkey" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Turkey</span></a> <a href="https://social.raytec.co/tags/UK" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>UK</span></a> <a href="https://social.raytec.co/tags/Ukr" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ukr</span></a> <a href="https://social.raytec.co/tags/Ukraine" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ukraine</span></a> <a href="https://social.raytec.co/tags/bot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bot</span></a> <a href="https://social.raytec.co/tags/botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>botnet</span></a> <a href="https://social.raytec.co/tags/AlienVault" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AlienVault</span></a></p>
Gytis Repečka<p>Attention server admins! Yesterday I've read <a href="https://mastodon.scot/@simon_brooke/114618257884522043" rel="nofollow noopener noreferrer" target="_blank">a post</a> by <span class="h-card"><a href="https://mastodon.scot/@simon_brooke" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>simon_brooke</span></a></span> how nasty AI scraper bots are attacking his self-hosted <span class="h-card"><a href="https://floss.social/@forgejo" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>forgejo</span></a></span> instance. Soon after I'm seeing unusual, periodic traffic spikes on <a href="https://source.gyt.is/" rel="nofollow noopener noreferrer" target="_blank">mine</a> and again - dominated by OpenAI, but some other freeloaders too:</p><pre><code>20.171.207.41 GPTBot/1.2 85.208.96.211 SemrushBot/7~bl 54.36.148.64 AhrefsBot/7.0 114.119.139.53 PetalBot </code></pre><p>With <code>GPTBot</code> and <code>SemrushBot</code> attacking hardest :blobcatscared:</p><p>They've been hammering my little server periodically today as well, slowing down my instance dramatically as if I was experiencing malicious DDoS attack :blobcatfearful: Well, in a sense it is one :blobcatnotlikethis:</p><p>Watch out - it seems corporate AI techbros learned to scrape :forgejo: content and starts doing it on a massive scale :blobcatoutage: Remember when <span class="h-card"><a href="https://social.anoxinon.de/@Codeberg" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>Codeberg</span></a></span> was (and repeatedly is) hit?</p><p>For now blocked IP ranges and <code>User-Agent</code> combinations, not sure for how long that will be enough :blobcatumm:</p><p>Please boost for visibility and be prepared!</p><p><a href="https://social.gyt.is/tags/forgejo" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>forgejo</span></a> <a href="https://social.gyt.is/tags/developerlife" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>developerlife</span></a> <a href="https://social.gyt.is/tags/coding" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>coding</span></a> <a href="https://social.gyt.is/tags/attack" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>attack</span></a> <a href="https://social.gyt.is/tags/techbros" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>techbros</span></a> <a href="https://social.gyt.is/tags/aislop" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>aislop</span></a> <a href="https://social.gyt.is/tags/openai" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>openai</span></a> <a href="https://social.gyt.is/tags/bots" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bots</span></a> <a href="https://social.gyt.is/tags/ddos" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ddos</span></a></p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://infosec.exchange/@ryanc" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>ryanc</span></a></span> using <a href="https://infosec.space/tags/JS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>JS</span></a> <a href="https://infosec.space/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a> to protect against <a href="https://infosec.space/tags/Bots" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Bots</span></a> is just as bad as <a href="https://infosec.space/tags/CryptoJacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CryptoJacking</span></a>.</p><ul><li>Noone gives a shit whether it's <a href="https://infosec.space/tags/shitcoins" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>shitcoins</span></a> or <em>"<a href="https://infosec.space/tags/DDoS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DDoS</span></a> protection"</em> that makes fan go brr and battery go empty in the end!</li></ul>
aproitz<p><span class="h-card" translate="no"><a href="https://infosec.exchange/@briankrebs" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>briankrebs</span></a></span> </p><p>Makes you feel <a href="https://mastodon.social/tags/dizzy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dizzy</span></a>. 😂</p><p><a href="https://mastodon.social/tags/ddos" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ddos</span></a> <a href="https://mastodon.social/tags/ddosed" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ddosed</span></a></p>
Max Resing<p>Anyone who seeks for a well-written analysis of unsolicited <a href="https://infosec.exchange/tags/TCP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TCP</span></a> traffic should give <a href="https://www.netscout.com/blog/asert/decoding-tcp-syn-stronger-network-security" rel="nofollow noopener noreferrer" target="_blank">Decoding TCP SYN for Stronger Network Security</a> a read. The blog post goes into TCP-procotol specifications. Recommended to every <a href="https://infosec.exchange/tags/networkengineer" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>networkengineer</span></a> .</p><p>Props go to <span class="h-card" translate="no"><a href="https://infosec.exchange/@jtk" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>jtk</span></a></span> for his strong analytical skills and excellent writing style.</p><p><a href="https://infosec.exchange/tags/honeypots" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>honeypots</span></a> <a href="https://infosec.exchange/tags/tcpflood" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tcpflood</span></a> <a href="https://infosec.exchange/tags/tcpsyn" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tcpsyn</span></a> <a href="https://infosec.exchange/tags/networkanomaly" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>networkanomaly</span></a> <a href="https://infosec.exchange/tags/netsec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>netsec</span></a> <a href="https://infosec.exchange/tags/ddos" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ddos</span></a></p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://c.im/@torf" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>torf</span></a></span> <span class="h-card" translate="no"><a href="https://social.coop/@lukeshu" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>lukeshu</span></a></span> <span class="h-card" translate="no"><a href="https://mastodon.social/@torproject" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>torproject</span></a></span> well, most high-traffic <a href="https://infosec.space/tags/OnionServices" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OnionServices</span></a> use either <a href="https://infosec.space/tags/OnionBalance" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OnionBalance</span></a> and/or <a href="https://infosec.space/tags/CAPTCHAs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CAPTCHAs</span></a> and/or rely on <a href="https://infosec.space/tags/Tor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tor</span></a>'s <a href="https://infosec.space/tags/PoW" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PoW</span></a> system designed to combat <a href="https://infosec.space/tags/DDoS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DDoS</span></a> and <a href="https://infosec.space/tags/Bots" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Bots</span></a>…</p>
dercraig<p><span class="h-card" translate="no"><a href="https://en.osm.town/@osm_tech" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>osm_tech</span></a></span> Do you guys want a free copy of my book on DDoS attacks and mitigation? <a href="https://buchshop.bod.de/ddos-understanding-real-life-attacks-and-mitigation-strategies-stefan-behte-9783819226212" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">buchshop.bod.de/ddos-understan</span><span class="invisible">ding-real-life-attacks-and-mitigation-strategies-stefan-behte-9783819226212</span></a> For now just print, but eBook will be available in 1-2 weeks according to my publisher. 😊 <a href="https://infosec.exchange/tags/ddos" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ddos</span></a> <a href="https://infosec.exchange/tags/ddosattack" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ddosattack</span></a></p>
OpenStreetMap Ops Team<p>Unfortunately the <a href="https://en.osm.town/tags/OpenStreetMap" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenStreetMap</span></a> wiki is very slow today. We are fighting an aggressive web scraper bot. 10,000 of IPs involved. Randomised User-Agent. Ignoring robots.txt <a href="https://en.osm.town/tags/aibot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>aibot</span></a> <a href="https://en.osm.town/tags/ddos" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ddos</span></a></p><p>Update: Fixed. We've been able to mitigate the bot traffic. <a href="https://en.osm.town/tags/fail2ban" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fail2ban</span></a></p>
Cyb3r1c 🇧🇪 ☠️<p>Dans les premiers jours de l’invasion à grande échelle de la <a href="https://mastodon.social/tags/Russie" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Russie</span></a>, l’<a href="https://mastodon.social/tags/Ukraine" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ukraine</span></a> a lancé un appel ouvert aux <a href="https://mastodon.social/tags/Hackers" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hackers</span></a> pour rejoindre un front numérique contre le Kremlin. Depuis lors, l’<a href="https://mastodon.social/tags/ITArmyOfUkraine" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ITArmyOfUkraine</span></a> s’est transformée en une force <a href="https://mastodon.social/tags/Cybern%C3%A9tique" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybernétique</span></a> agile à grande échelle, dont l’efficacité n’est plus à démontrer.</p><p><a href="https://mastodon.social/tags/Guerre" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Guerre</span></a> <a href="https://mastodon.social/tags/CyberGuerre" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberGuerre</span></a> <a href="https://mastodon.social/tags/DDoS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DDoS</span></a> <a href="https://mastodon.social/tags/Informatique" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Informatique</span></a> <a href="https://mastodon.social/tags/Hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hacking</span></a> <a href="https://mastodon.social/tags/Anonymous" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Anonymous</span></a> <a href="https://mastodon.social/tags/SupportUkraine" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SupportUkraine</span></a> <a href="https://mastodon.social/tags/Russie" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Russie</span></a> <a href="https://mastodon.social/tags/FuckPoutine" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FuckPoutine</span></a></p><p><a href="https://bindinghook.com/articles-hooked-on-trends/ukraines-volunteer-it-army-is-making-gains-on-the-cyber-front/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">bindinghook.com/articles-hooke</span><span class="invisible">d-on-trends/ukraines-volunteer-it-army-is-making-gains-on-the-cyber-front/</span></a></p>
OMG 🇪🇺 🇺🇦 :linux:<p><span class="h-card" translate="no"><a href="https://social.tchncs.de/@simsus" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>simsus</span></a></span><br>Im Hacki-Meal immer dabei Windopf, Windopf Server, UnCloud, PaaStinake.</p><p>Wie bestellt und outgesourced, so wirds auch angerichtet.</p><p>Ob das EU weit zum Appetit auf Cybersecurity und FLOSSengerichte anregt?</p><p>Vermutlich nicht. </p><p>Der Gutschein von Fasttech im OneDriveIn ist einfach verlockend. Immerhin gibts einen "Kaffee auf" umsonst.</p><p><a href="https://infosec.exchange/tags/DDoS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DDoS</span></a> <a href="https://infosec.exchange/tags/Schweiz" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Schweiz</span></a> <a href="https://infosec.exchange/tags/Hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hacking</span></a> <a href="https://infosec.exchange/tags/Switzerland" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Switzerland</span></a></p>
Marcel SIneM(S)US<p>Ungewöhnlich lange <a href="https://social.tchncs.de/tags/DDoS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DDoS</span></a>-Angriffe in der <a href="https://social.tchncs.de/tags/Schweiz" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Schweiz</span></a> 🇨🇭 - inside-it[.]CH <a href="https://www.inside-it.ch/ungewoehnlich-lange-ddos-angriffe-in-der-schweiz-20250515" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">inside-it.ch/ungewoehnlich-lan</span><span class="invisible">ge-ddos-angriffe-in-der-schweiz-20250515</span></a> <a href="https://social.tchncs.de/tags/Hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hacking</span></a> <a href="https://social.tchncs.de/tags/Switzerland" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Switzerland</span></a> 🇨🇭</p>
TugaTech 🖥️<p>X volta a falhar: Utilizadores relatam problemas há mais de um dia<br>🔗&nbsp;<a href="https://tugatech.com.pt/t67082-x-volta-a-falhar-utilizadores-relatam-problemas-ha-mais-de-um-dia" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">tugatech.com.pt/t67082-x-volta</span><span class="invisible">-a-falhar-utilizadores-relatam-problemas-ha-mais-de-um-dia</span></a></p><p><a href="https://masto.pt/tags/ddos" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ddos</span></a> <a href="https://masto.pt/tags/despedimentos" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>despedimentos</span></a> <a href="https://masto.pt/tags/elonmusk" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>elonmusk</span></a> <a href="https://masto.pt/tags/mundo" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mundo</span></a> <a href="https://masto.pt/tags/online" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>online</span></a> <a href="https://masto.pt/tags/seguran%C3%A7a" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>segurança</span></a> <a href="https://masto.pt/tags/twitter" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>twitter</span></a>&nbsp;</p>
OTX Bot<p>Operation Endgame 2.0</p><p>International law enforcement agencies have taken additional actions in Operation Endgame, targeting cybercriminal organizations, particularly those behind DanaBot. DanaBot is a powerful modular malware family written in Delphi, capable of keylogging, capturing screenshots, recording desktop videos, exfiltrating files, injecting content into web browsers, and deploying second-stage malware. It operates as a Malware-as-a-Service platform, enabling various attacks. DanaBot has been used in targeted attacks against government officials in the Middle East and Eastern Europe, and for DDoS attacks against Ukrainian servers. The malware implements a custom binary protocol encrypted with RSA and AES, and uses hardcoded C2 servers with Tor as a backup communication channel. Over 50 nicknames have been associated with DanaBot affiliates.</p><p>Pulse ID: 683046e8073360953a9307d2<br>Pulse Link: <a href="https://otx.alienvault.com/pulse/683046e8073360953a9307d2" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">otx.alienvault.com/pulse/68304</span><span class="invisible">6e8073360953a9307d2</span></a> <br>Pulse Author: AlienVault<br>Created: 2025-05-23 09:59:04</p><p>Be advised, this data is unverified and should be considered preliminary. Always do further verification.</p><p><a href="https://social.raytec.co/tags/Browser" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Browser</span></a> <a href="https://social.raytec.co/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://social.raytec.co/tags/DDoS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DDoS</span></a> <a href="https://social.raytec.co/tags/DanaBot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DanaBot</span></a> <a href="https://social.raytec.co/tags/Delphi" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Delphi</span></a> <a href="https://social.raytec.co/tags/DoS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DoS</span></a> <a href="https://social.raytec.co/tags/EasternEurope" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EasternEurope</span></a> <a href="https://social.raytec.co/tags/Europe" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Europe</span></a> <a href="https://social.raytec.co/tags/Government" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Government</span></a> <a href="https://social.raytec.co/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> <a href="https://social.raytec.co/tags/LawEnforcement" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LawEnforcement</span></a> <a href="https://social.raytec.co/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a> <a href="https://social.raytec.co/tags/MalwareAsAService" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MalwareAsAService</span></a> <a href="https://social.raytec.co/tags/MiddleEast" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MiddleEast</span></a> <a href="https://social.raytec.co/tags/OTX" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OTX</span></a> <a href="https://social.raytec.co/tags/OpenThreatExchange" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenThreatExchange</span></a> <a href="https://social.raytec.co/tags/RAT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RAT</span></a> <a href="https://social.raytec.co/tags/RCE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RCE</span></a> <a href="https://social.raytec.co/tags/UK" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>UK</span></a> <a href="https://social.raytec.co/tags/Ukr" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ukr</span></a> <a href="https://social.raytec.co/tags/Ukrainian" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ukrainian</span></a> <a href="https://social.raytec.co/tags/bot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bot</span></a> <a href="https://social.raytec.co/tags/AlienVault" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AlienVault</span></a></p>
Stéphane Bortzmeyer<p><a href="https://mastodon.gougere.fr/tags/CENTR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CENTR</span></a> <a href="https://mastodon.gougere.fr/tags/dDoS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dDoS</span></a> Interesting talk since it was not a talk: after a short introduction, people in the room were told to gather in small groups (with no group hving two persons from the same domain registry), discuss on one of the proposed statements, and synthetize their discussion at the end.<br>Everybody agrees that we should share more information (heard many times in the last 25 years at CENTR...)</p>
Max Resing<p><a href="https://news.risky.biz/telegram-is-cooperating-with-authorities-for-now/" rel="nofollow noopener noreferrer" target="_blank">Telegram Is Cooperating With Authorities, For Now</a> - This is good news for the benign side of the cyber world. What we in the <a href="https://infosec.exchange/tags/DDoS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DDoS</span></a> mitigation industry observe are Telegram channels for e.g. <a href="https://infosec.exchange/tags/marketplaces" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>marketplaces</span></a> for <a href="https://infosec.exchange/tags/DDoSforhire" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DDoSforhire</span></a> services or <a href="https://infosec.exchange/tags/threatactor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatactor</span></a> coordination.</p><p>Seeing that <a href="https://infosec.exchange/tags/Telegram" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Telegram</span></a> seizes to be the safe haven for shady, or straight up illegal activities that are a burden to the <a href="https://infosec.exchange/tags/Internet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Internet</span></a> at large is really good news.</p>
ResearchBuzz: Firehose<p>Krebs on Security: KrebsOnSecurity Hit With Near-Record 6.3 Tbps DDoS. “KrebsOnSecurity last week was hit by a near record distributed denial-of-service (DDoS) attack that clocked in at more than 6.3 terabits of data per second (a terabit is one trillion bits of data). The brief attack appears to have been a test run for a massive new Internet of Things (IoT) botnet capable of launching […]</p><p><a href="https://rbfirehose.com/2025/05/22/krebs-on-security-krebsonsecurity-hit-with-near-record-6-3-tbps-ddos/" class="" rel="nofollow noopener noreferrer" target="_blank">https://rbfirehose.com/2025/05/22/krebs-on-security-krebsonsecurity-hit-with-near-record-6-3-tbps-ddos/</a></p>