Iran DDoS Activity: Chatter, Tools and Traffic Rates
I’m here in Talinn at the CCD COE Cyber Warfar Conference listening to Martin Libicki’s perspectives on information warfare in modern warfare theories. This is an interesting week to be here with last...
View ArticleWhere Did All the Tweets Go?
At roughly 9:00am (EDT) this morning, the Twitisphere fell silent (or at least significantly fewer twitters). And though you could not follow the outage via tweets, Twitter’s blog announced the popular...
View ArticleThe Other Attacks Last Thursday
Yesterday morning was a busy time for Internet security. As an illustration of this activity, the graph below shows a summary of attack traffic across the 77 Observatory ISPs reporting anonymized...
View ArticleTwitter-based Botnet Command Channel
UPDATED TO ADD STATS AND JAIKU PROFILE AND A TUMBLR PROFILE While digging around I found a botnet that uses Twitter as its command and control structure. Basically what it does is use the status...
View ArticleYour DNS is an Asset (Twitter DNS Woes…)
Given all the hoopla surrounding yesterday’s Twitter outage, and the apparent source of the outage being the result of nothing more than some maliciously modified DNS resource records enabled by a...
View ArticleTwitter and MSN: Driving Malcode Distribution
We recently came across a bot that merged MSN Messenger link spam with Twitter to get users to download malcode. Twitter malcode is nothing new, but this one adds a twist to those that monitor IM link...
View ArticleFollow the ASERT blog with Twitter
Twitter is a free service that lets you keep in touch with people through the exchange of quick, frequent answers to one simple question: What are you doing? Join today to start receiving Arbor...
View ArticleMetasploit And Other Sites DDoSed
At about 12:52 PM Feb 7th, HD Moore (leader of the Metasploit project) twittered “heh, metasploit.com is being DDoS’d again”. A little while he pointed to a traffic graph and asked, “see if you can...
View ArticleMany Days of DDoS for Everyone
The past few weeks have been a flurry of activity for me and everyone at Arbor. We’ve been very involved in the Conficker Working Group efforts and notifying lots of people using ATLAS. Even after that...
View ArticleLessons for the Internet from Swine Flu: Bear with me!
This morning on my drive to work I listened to a story on NPR about swine flu in relation to past epidemics. Just an hour or so earlier I had sent a message over Twitter that I was trying to avoid the...
View ArticleIran DDoS Activity: Chatter, Tools and Traffic Rates
I’m here in Talinn at the CCD COE Cyber Warfar Conference listening to Martin Libicki’s perspectives on information warfare in modern warfare theories. This is an interesting week to be here with last...
View ArticleWhere Did All the Tweets Go?
At roughly 9:00am (EDT) this morning, the Twitisphere fell silent (or at least significantly fewer twitters). And though you could not follow the outage via tweets, Twitter’s blog announced the popular...
View ArticleThe Other Attacks Last Thursday
Yesterday morning was a busy time for Internet security. As an illustration of this activity, the graph below shows a summary of attack traffic across the 77 Observatory ISPs reporting anonymized...
View ArticleTwitter-based Botnet Command Channel
UPDATED TO ADD STATS AND JAIKU PROFILE AND A TUMBLR PROFILE While digging around I found a botnet that uses Twitter as its command and control structure. Basically what it does is use the status...
View ArticleYour DNS is an Asset (Twitter DNS Woes…)
Given all the hoopla surrounding yesterday’s Twitter outage, and the apparent source of the outage being the result of nothing more than some maliciously modified DNS resource records enabled by a...
View Article
More Pages to Explore .....