BenjaminHCCarr, to random
@BenjaminHCCarr@hachyderm.io avatar
bortzmeyer, to random French
@bortzmeyer@mastodon.gougere.fr avatar

Le on-va-tous-mourir du jour https://dnsbomb.net/

On a le droit de pomper Dragon Ball Z comme ça ?

BenjaminHCCarr, to Russia
@BenjaminHCCarr@hachyderm.io avatar

Two weeks before invaded in Feb 2022, a large, mysterious new Internet hosting firm called materialized and quickly became the epicenter of massive attacks on government and commercial targets in Ukraine and . An investigation into reveals it is being used as a global proxy network that conceals the true source of and campaigns against enemies of Russia. https://krebsonsecurity.com/2024/05/stark-industries-solutions-an-iron-hammer-in-the-cloud/

nopatience, to random
@nopatience@swecyb.com avatar

NoName are going bananas with DDoS-attacks against Finland since a few days ago.

Sup?

lackattack, to fediverse
@lackattack@mastodon.social avatar

I hesitate to share this for fear of generating a mini #ddos on their site, but i had no idea the #fediverse generated so much traffic due to its inherent nature. Sounds like issue is on the roadmap to getting fixed, but good that folks are sounding off about it.

(sorry for the ddos hug @itsfoss :) )

https://news.itsfoss.com/mastodon-link-problem/

itsfoss,
@itsfoss@mastodon.social avatar

@lackattack Haha! Anytime! :)

Thank you for your kind words, Chris!

Hopefully, this gets enough attention for them to work on a fundamental issue like this.

GrapheneOS, to random
@GrapheneOS@grapheneos.social avatar

Due to frequent DDoS attacks, we're enforcing stricter limits on the number of connections to our servers. By default, each server enforces a limit of 16 or 32 TCP connections from each IPv4 address and IPv6 /64 block. During persistent attacks, these limits will be adjusted.

#netfilter #nftables #synproxy #ddos

GrapheneOS,
@GrapheneOS@grapheneos.social avatar

@Orca Without TCP timestamps, connections where Linux SYN cookies are used due to ongoing SYN flood attacks on a server will get limited to 65535 bytes in flight without timestamps. That means server can only have 65535 bytes on the way to you at a time, limiting you to around 0.655MB/s if you have 100ms round trip time.

TCP timestamps used to leak uptime but Linux has randomized starting offset per connection since 2016:

https://github.com/torvalds/linux/commit/95a22caee396cef0bb2ca8fafdd82966a49367bb

You should enable them for multiple reasons.

GrapheneOS,
@GrapheneOS@grapheneos.social avatar

@Orca TCP timestamps add 10 bytes to each TCP packet header which is below 1% overhead but they can improve congestion control due to accurate round trip time measurement. They're also fairly mandatory for high bandwidth + high latency connections. Windows not enabling TCP timestamps by default interacts badly with Linux SYN cookies and means attackers can easily heavily degrade performance for a lot of users via SYN floods triggering SYN cookies. It's an unfortunate situation.

HotChilliIM, to Matrix German
@HotChilliIM@mastodon.social avatar

Access to the #XMPP server and the #Matrix server are currently limited because the primary IPv4 address was blocked by the provider due to #DDoS. Checking the server revealed no abnormalities and we have applied for unblocking.

gcluley, to Cybersecurity
@gcluley@mastodon.green avatar

Notorious Nemesis Market zapped by video game-loving German police.

Read more in my article on the Tripwire blog: https://www.tripwire.com/state-of-security/notorious-nemesis-market-zapped-video-game-loving-german-police

stefan, to mastodon
@stefan@stefanbohacek.online avatar

Oh great, I just DDoSed myself after posting a link on Mastodon.

Really can't wait for https://github.com/mastodon/mastodon/issues/23662 to be resolved.

stux,
@stux@mstdn.social avatar

@stefan Happens to me too often indeed :blobcatgiggle:

Altough it's a great server test 😇

YourAnonRiots, to random Japanese
@YourAnonRiots@mstdn.social avatar

French government agencies were hit by a severe cyberattack, suspected to be Мassive attacks, that began on Sunday night. The government noted the attack used familiar techniques but was of unprecedented intensity.
https://therecord.media/france-government-ddos-incident

paul_denton, to Ukraine French
@paul_denton@mastodon.social avatar

Numerama a eu à eu accès à un mail titré "Alerte sur le Réseau interministériel de l’État" reçu par des agents de la fonction publique. La chaîne Telegram d’Anonymous Sudan revendique des perturbations au sein du ministère de la Culture, de la santé et des affaires sociales, de l’Économie et des finances, de la Transition écologique et les services du premier ministre par DDoS https://www.numerama.com/cyberguerre/1650508-une-cyberattaque-de-hackers-pro-russes-perturbe-le-reseau-de-ministeres-francais.html

Thierry31,
@Thierry31@piaille.fr avatar

@paul_denton

C'est un réseau privé avec points d'interconnexion, d'après ce que je comprends, je ne comprends donc pas la problématique de DoS: seul les points d'accès peuvent être attaqués, le réseau privé ne devrait pas être impacté, a part les accès VPN.

tdp_org, to infosec
@tdp_org@mastodon.social avatar

If you run a public web service, do you attempt to attribute DDOS to an attacker?
If so, how do you do it?

Interested to see what other folks/orgs do.

governa, to random
@governa@fosstodon.org avatar
nurkiewicz, to DOOM Polish
@nurkiewicz@fosstodon.org avatar

Who needs fake toothbrush #DDoS attack if you can play #DOOM on it? https://youtu.be/cO-Are8053g

AAKL, to Cybersecurity
@AAKL@noc.social avatar

Radware: attacks surge against web apps and APIs https://betanews.com/2024/02/29/ddos-attacks-against-web-apps-and-apis-surge/ @betanews @iandbarker

Radware's 2024 Global Threat Analysis Report: https://www.radware.com/threat-analysis-report/

  • All
  • Subscribed
  • Moderated
  • Favorites
  • anitta
  • thenastyranch
  • rosin
  • GTA5RPClips
  • osvaldo12
  • love
  • Youngstown
  • slotface
  • khanakhh
  • everett
  • kavyap
  • mdbf
  • DreamBathrooms
  • ngwrru68w68
  • megavids
  • magazineikmin
  • InstantRegret
  • normalnudes
  • tacticalgear
  • cubers
  • ethstaker
  • modclub
  • cisconetworking
  • Durango
  • provamag3
  • tester
  • Leos
  • JUstTest
  • All magazines