![]() ![]() ![]() |
|
>https://horizon.netscout.com/<
What does the 'fireworks' display actually show?
The map of attacks does look like they move around and I suppose the aim is take down one site and then move onto next.
It will take time for the target to recover their system, then you can give them another concentrated bash.
Apparently you can buy zombie sever time on the dark web, free enterprise DDoS.
Australian locations at one point were getting a heavy battering.
At one point there was a lot of attacks disappearing into the Indian Ocean.
I presume its not the location of servers just the .IO domain registered there.
Secret Data Center at Manapouri ,
Hah, Had me thinking the project with its underground caverns would make an ideal Bond Villain Hideout.
My Subs is the one parked in Deep Cove !
NZX, well nanosecond, even day trading distorts the market anyway, so bring back chalky.
I do wonder when authorities around the world will finally take Bot-nets comprising Millions of compromised devices seriously and follow the medical world and enforce a vaccine and quarantine approach. Yes compulsory patching of vulnerable devices by ISPs with disconnect fallback option. ISPs who don’t co-operate get disconnected from higher tier networks. Drastic but its what would work if driven by a few of the top countries all the ISPs want to connect to. Also ensures bad actors cannot use corrupt / owned ISPs to bypass the rules.
Of course it will never happen in the real money driven corporate world.
According to Stuff [https://www.stuff.co.nz/business/122636582/gcsb-examining-extortion-email-sent-to-nzx-ahead-of-ddos-attack] "It is understood that attackers at one point deluged NZX with more than a terabit a second (Tbps) of spurious data."
If that's true, it means this is a very non-trivial attack, and puts the NZX's defences in a different light.
"Technical Approaches to Uncovering and Remediating Malicious Activity" (PDF download).
Released today by The Australian Cyber Security Centre (ACSC), New Zealand’s National Cyber Security Centre (NCSC NZ) and Computer Emergency Response Team NZ (CERT NZ), Canada’s Communications Security Establishment, and the United Kingdom’s National Cyber Security Centre (NCSC UK) teamed up with USA's Cybersecurity and Infrastructure Security Agency (CISA).
Please support Geekzone by subscribing, or using one of our referral links: Samsung | AliExpress | Wise | Sharesies | Hatch | GoodSync | Backblaze backup
PolicyGuy:
According to Stuff [https://www.stuff.co.nz/business/122636582/gcsb-examining-extortion-email-sent-to-nzx-ahead-of-ddos-attack] "It is understood that attackers at one point deluged NZX with more than a terabit a second (Tbps) of spurious data."
If that's true, it means this is a very non-trivial attack, and puts the NZX's defences in a different light.
Would also make it one of the top 10 i think in history
There is this recent Wired article July 2020 which gives a general background.
https://www.wired.com/story/ddos-for-hire-fueling-new-wave-attacks/
Apparently it does not have to be the large brute force volume ( Though there is potentially plenty of that ),
rather more nuanced attack with very high packet rate, a swarm of mosquitos if you will that you have to zap.
""
"Over 50 percent of that 809 million packets-per-second was coming from enterprise-level DVRs," says Roger Barranco, Akamai's vice president of global security operations. "What’s new is the concept of campaigns. We go back a couple of years and 'attack' was the right word to use. There were many attacks every single day, but they weren’t in my opinion campaign-oriented. Some of our more recent ones are campaign-oriented where the attacker is working in a coordinated way over an extended period of time."
""
Surveillance CAM fever ?
ezbee:
"Over 50 percent of that 809 million packets-per-second was coming from enterprise-level DVRs," says Roger Barranco, Akamai's vice president of global security operations.
And people don't understand when we tell them not to port forward to their crappy knock off cameras and that they are opening themselves to be a bot in DDoS operations...
Please support Geekzone by subscribing, or using one of our referral links: Samsung | AliExpress | Wise | Sharesies | Hatch | GoodSync | Backblaze backup
ezbee:The map of attacks does look like they move around and I suppose the aim is take down one site and then move onto next.
I wouldn't read too much into those maps, they're done more to provide eye candy for the media and as a sales tool than as a detailed representation of what's going on.
|
![]() ![]() ![]() |