lingo.lol is one of the many independent Mastodon servers you can use to participate in the fediverse.
A place for linguists, philologists, and other lovers of languages.

Server stats:

55
active users

#DDoS

3 posts3 participants0 posts today
Arch Linux :archlinux:<p>[arch-announce] Recent services outages</p><p><a href="https://archlinux.org/news/recent-services-outages/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">archlinux.org/news/recent-serv</span><span class="invisible">ices-outages/</span></a></p><p><a href="https://fosstodon.org/tags/ArchLinux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ArchLinux</span></a> <a href="https://fosstodon.org/tags/OpenSource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSource</span></a> <a href="https://fosstodon.org/tags/devops" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>devops</span></a> <a href="https://fosstodon.org/tags/Community" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Community</span></a> <a href="https://fosstodon.org/tags/ddos" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ddos</span></a> <a href="https://fosstodon.org/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a></p>
Miguel Afonso Caetano<p>"A 22-year-old man from the U.S. state of Oregon has been charged with allegedly developing and overseeing a distributed denial-of-service (DDoS)-for-hire botnet called RapperBot.</p><p>Ethan Foltz of Eugene, Oregon, has been identified as the administrator of the service, the U.S. Department of Justice (DoJ) said. The botnet has been used to carry out large-scale DDoS-for-hire attacks targeting victims in over 80 countries since at least 2021.</p><p>Foltz has been charged with one count of aiding and abetting computer intrusions. If convicted, he faces a maximum penalty of 10 years in prison. In addition, law enforcement authorities conducted a search of Foltz's residence on August 6, 2025, seizing administrative control of the botnet infrastructure."</p><p><a href="https://thehackernews.com/2025/08/doj-charges-22-year-old-for-running.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thehackernews.com/2025/08/doj-</span><span class="invisible">charges-22-year-old-for-running.html</span></a></p><p><a href="https://tldr.nettime.org/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://tldr.nettime.org/tags/CyberCrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberCrime</span></a> <a href="https://tldr.nettime.org/tags/Botnet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Botnet</span></a> <a href="https://tldr.nettime.org/tags/DDoS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DDoS</span></a></p>
Klaus Zimmermann :unverified:<p>Oh my, some of <a href="https://c.im/tags/ArchLinux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ArchLinux</span></a>'s services are under <a href="https://c.im/tags/DDoS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DDoS</span></a></p><p><a href="https://status.archlinux.org" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">status.archlinux.org</span><span class="invisible"></span></a></p><p>Good thing that the mirrors are hosted by many other volunteers 'round the globe. Updates are still going smooth!</p>
keef<p>So my first evil genius robot honeypot, the word frequency one, seems to be getting hit by a distributed botnet.</p><p>It started around 2-3 requests per second but seems to be ramping up. </p><p>It's using IP addresses from all over the world - could be hacked personal devices? - and a wide range of plausible-looking User Agent strings.</p><p>My server is fine for now - 95% idle CPU.</p><p>Are there people for whom any of the IP or agent data might be useful? Botnet detectorists?</p><p><a href="https://mastodon.online/tags/botnet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>botnet</span></a> <a href="https://mastodon.online/tags/ddos" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ddos</span></a> <a href="https://mastodon.online/tags/cybersec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersec</span></a> <a href="https://mastodon.online/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a></p>
Christoph Schmees<p>Russisches DDoS Botnet abgeschaltet</p><p>Das BKA meldet einen Erfolg gegen politisch motivierte Cyber-Kriminalität. Weitere Sekundär-Meldungen gibt es beispielsweise hier oder hier. Die russische Formation NoName057(16) hat ihr gleichnamiges Botnet nur für DDoS-Angriffe benutzt - soweit wir bisher wissen. Die Angriffe richteten sich gegen "unliebsame" </p><p><a href="https://www.pc-fluesterer.info/wordpress/2025/07/20/russisches-ddos-botnet-abgeschaltet/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">pc-fluesterer.info/wordpress/2</span><span class="invisible">025/07/20/russisches-ddos-botnet-abgeschaltet/</span></a></p><p><a href="https://social.tchncs.de/tags/Allgemein" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Allgemein</span></a> <a href="https://social.tchncs.de/tags/Hintergrund" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hintergrund</span></a> <a href="https://social.tchncs.de/tags/botnet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>botnet</span></a> <a href="https://social.tchncs.de/tags/cybercrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybercrime</span></a> <a href="https://social.tchncs.de/tags/ddos" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ddos</span></a> <a href="https://social.tchncs.de/tags/politik" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>politik</span></a></p>
abuse.ch :verified:<p>We are incredibly proud to have assisted Europol 🇪🇺 in a global operation against the notorious pro-Russian <a href="https://ioc.exchange/tags/hacktivist" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacktivist</span></a> group <a href="https://ioc.exchange/tags/NoName057" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NoName057</span></a>(16) 🥳</p><p>Over the years, NoName057(16) has carried out thousands of <a href="https://ioc.exchange/tags/DDoS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DDoS</span></a> attacks against websites of western organisations and national critical infrastructure 🏛️ , aiming to spread pro-Russian ideology 🇷🇺 and stir up distrust and uncertainty in the western hemisphere 🌎 😵‍💫</p><p><a href="https://www.europol.europa.eu/media-press/newsroom/news/global-operation-targets-noname05716-pro-russian-cybercrime-network" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">europol.europa.eu/media-press/</span><span class="invisible">newsroom/news/global-operation-targets-noname05716-pro-russian-cybercrime-network</span></a></p>
@francks<p>Our small team vs millions of bots</p><p><a href="https://www.fsf.org/blogs/sysadmin/our-small-team-vs-millions-of-bots" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">fsf.org/blogs/sysadmin/our-sma</span><span class="invisible">ll-team-vs-millions-of-bots</span></a></p><p><a href="https://mstdn.fr/tags/fsf" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fsf</span></a> <a href="https://mstdn.fr/tags/freesoftware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>freesoftware</span></a> <a href="https://mstdn.fr/tags/ddos" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ddos</span></a> <a href="https://mstdn.fr/tags/javascrip" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>javascrip</span></a> <a href="https://mstdn.fr/tags/anubis" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>anubis</span></a> <a href="https://mstdn.fr/tags/botnet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>botnet</span></a> <a href="https://mstdn.fr/tags/llm" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>llm</span></a> <a href="https://mstdn.fr/tags/scraper" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>scraper</span></a> <a href="https://mstdn.fr/tags/crawler" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>crawler</span></a> <a href="https://mstdn.fr/tags/proprietarysoftware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>proprietarysoftware</span></a> <a href="https://mstdn.fr/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a></p>
ltning<p>Yay! Or maybe AIEEE! Seems like I'm giving a talk at <a class="hashtag" href="https://pleroma.anduin.net/tag/eurobsdcon" rel="nofollow noopener" target="_blank">#EuroBSDCon</a> again this year!</p><p>Anyone who has been following me here for a while will know I'm a hopeless <a class="hashtag" href="https://pleroma.anduin.net/tag/retrocomputing" rel="nofollow noopener" target="_blank">#retrocomputing</a> nerd, and I will make no attempt at hiding it during my talk:</p><p>Dirty Tricks: Using nginx and Lua to thwart bots and skript kiddies</p><p>I'll (try to) show how you can protect your <a class="hashtag" href="https://pleroma.anduin.net/tag/bbs" rel="nofollow noopener" target="_blank">#BBS</a> from drive-by portscans and your production systems from <a class="hashtag" href="https://pleroma.anduin.net/tag/ddos" rel="nofollow noopener" target="_blank">#DDoS</a> attacks using all the wrong tools.</p><p>Dietary warning: may contain traces of floppies.</p><p><a href="https://events.eurobsdcon.org/2025/talk/review/RHDFBQWZEVC833T3WDLDEXYFQVRWJKMN" rel="nofollow noopener" target="_blank">https://events.eurobsdcon.org/2025/talk/review/RHDFBQWZEVC833T3WDLDEXYFQVRWJKMN</a> <a class="hashtag" href="https://pleroma.anduin.net/tag/freebsd" rel="nofollow noopener" target="_blank">#FreeBSD</a> <a class="hashtag" href="https://pleroma.anduin.net/tag/bsd" rel="nofollow noopener" target="_blank">#BSD</a> <a class="hashtag" href="https://pleroma.anduin.net/tag/unix" rel="nofollow noopener" target="_blank">#Unix</a> <a class="hashtag" href="https://pleroma.anduin.net/tag/dos" rel="nofollow noopener" target="_blank">#DOS</a> <a class="hashtag" href="https://pleroma.anduin.net/tag/runbsd" rel="nofollow noopener" target="_blank">#RunBSD</a></p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://disabled.social/@MikeImBack" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>MikeImBack</span></a></span> no, just being hammered by scrapers aka. <a href="https://infosec.space/tags/DDoS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DDoS</span></a>'d!</p>
Frankie ✅<p>This mega DDoS attack broke all records - huge 37.4TB bombardment in 45 seconds against a single victim is the largest ever recorded </p><p><a href="https://www.techradar.com/pro/security/this-mega-ddos-attack-broke-all-records-huge-37-4tb-bombardment-in-45-seconds-against-a-single-victim-is-the-largest-ever-recorded" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">techradar.com/pro/security/thi</span><span class="invisible">s-mega-ddos-attack-broke-all-records-huge-37-4tb-bombardment-in-45-seconds-against-a-single-victim-is-the-largest-ever-recorded</span></a> </p><p><a href="https://mastodon.social/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a> <a href="https://mastodon.social/tags/tech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tech</span></a> <a href="https://mastodon.social/tags/technology" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>technology</span></a> <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://mastodon.social/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://mastodon.social/tags/ddos" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ddos</span></a> <a href="https://mastodon.social/tags/cloudflare" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cloudflare</span></a> <a href="https://mastodon.social/tags/attack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>attack</span></a></p>
Hackread.com<p>Banks are under fire. A new report shows a sharp rise in sophisticated DDoS attacks targeting financial institutions worldwide hitting APIs, websites, and entire networks.</p><p>Read: <a href="https://hackread.com/sophisticated-ddos-campaigns-crippling-global-banks/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackread.com/sophisticated-ddo</span><span class="invisible">s-campaigns-crippling-global-banks/</span></a></p><p><a href="https://mstdn.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mstdn.social/tags/CyberAttack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberAttack</span></a> <a href="https://mstdn.social/tags/DDoS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DDoS</span></a> <a href="https://mstdn.social/tags/Finance" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Finance</span></a> <a href="https://mstdn.social/tags/Banking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Banking</span></a></p>
dercraig<p>🚀 My new <a href="https://infosec.exchange/tags/DDoS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DDoS</span></a> book "DDoS: Understanding Real-Life Attacks and Mitigation Strategies" is now also available as an eBook! 🎉</p><p>Check it out here: <a href="https://ddos-book.com/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">ddos-book.com/</span><span class="invisible"></span></a></p><p>I’ve packed in everything I’ve learned from defending major German government sites against groups like Anonymous, Killnet, and NoName057(16).</p><p>It covers mitigations against <a href="https://infosec.exchange/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a> <a href="https://infosec.exchange/tags/crawlers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>crawlers</span></a> and many other defenses for all network layers. </p><p>If you find it useful, I’d love it if you could boost and share to help more people defend themselves. ❤️</p><p>Thank you! 🙏</p><p><a href="https://infosec.exchange/tags/DDoSProtection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DDoSProtection</span></a> <a href="https://infosec.exchange/tags/NetworkSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NetworkSecurity</span></a> <a href="https://infosec.exchange/tags/DDoS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DDoS</span></a> <a href="https://infosec.exchange/tags/RealWorldDefense" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RealWorldDefense</span></a> <a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/eBook" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>eBook</span></a> <a href="https://infosec.exchange/tags/book" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>book</span></a></p>
Gytis Repečka<p>Attention server admins! Yesterday I've read <a href="https://mastodon.scot/@simon_brooke/114618257884522043" rel="nofollow noopener" target="_blank">a post</a> by <span class="h-card"><a href="https://mastodon.scot/@simon_brooke" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>simon_brooke</span></a></span> how nasty AI scraper bots are attacking his self-hosted <span class="h-card"><a href="https://floss.social/@forgejo" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>forgejo</span></a></span> instance. Soon after I'm seeing unusual, periodic traffic spikes on <a href="https://source.gyt.is/" rel="nofollow noopener" target="_blank">mine</a> and again - dominated by OpenAI, but some other freeloaders too:</p><pre><code>20.171.207.41 GPTBot/1.2 85.208.96.211 SemrushBot/7~bl 54.36.148.64 AhrefsBot/7.0 114.119.139.53 PetalBot </code></pre><p>With <code>GPTBot</code> and <code>SemrushBot</code> attacking hardest :blobcatscared:</p><p>They've been hammering my little server periodically today as well, slowing down my instance dramatically as if I was experiencing malicious DDoS attack :blobcatfearful: Well, in a sense it is one :blobcatnotlikethis:</p><p>Watch out - it seems corporate AI techbros learned to scrape :forgejo: content and starts doing it on a massive scale :blobcatoutage: Remember when <span class="h-card"><a href="https://social.anoxinon.de/@Codeberg" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>Codeberg</span></a></span> was (and repeatedly is) hit?</p><p>For now blocked IP ranges and <code>User-Agent</code> combinations, not sure for how long that will be enough :blobcatumm:</p><p>Please boost for visibility and be prepared!</p><p><a href="https://social.gyt.is/tags/forgejo" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>forgejo</span></a> <a href="https://social.gyt.is/tags/developerlife" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>developerlife</span></a> <a href="https://social.gyt.is/tags/coding" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>coding</span></a> <a href="https://social.gyt.is/tags/attack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>attack</span></a> <a href="https://social.gyt.is/tags/techbros" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>techbros</span></a> <a href="https://social.gyt.is/tags/aislop" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>aislop</span></a> <a href="https://social.gyt.is/tags/openai" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>openai</span></a> <a href="https://social.gyt.is/tags/bots" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bots</span></a> <a href="https://social.gyt.is/tags/ddos" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ddos</span></a></p>
aproitz<p><span class="h-card" translate="no"><a href="https://infosec.exchange/@briankrebs" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>briankrebs</span></a></span> </p><p>Makes you feel <a href="https://mastodon.social/tags/dizzy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dizzy</span></a>. 😂</p><p><a href="https://mastodon.social/tags/ddos" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ddos</span></a> <a href="https://mastodon.social/tags/ddosed" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ddosed</span></a></p>
jbz<p>🪆 DDoS incident disrupts internet for thousands in Moscow</p><p>「 The attack, first detected on Tuesday, continued into Friday, disrupting ASVT’s mobile app, website and customer accounts. The provider serves mainly large residential complexes, where residents reported being unable to work remotely, pay at local shops using card terminals, or access their buildings due to disabled internet-based intercom systems 」</p><p><a href="https://therecord.media/moscow-internet-provider-asvt-ddos-attack" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">therecord.media/moscow-interne</span><span class="invisible">t-provider-asvt-ddos-attack</span></a></p><p><a href="https://indieweb.social/tags/ddos" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ddos</span></a> <a href="https://indieweb.social/tags/russia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>russia</span></a> <a href="https://indieweb.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a></p>
OpenStreetMap Ops Team<p>Unfortunately the <a href="https://en.osm.town/tags/OpenStreetMap" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenStreetMap</span></a> wiki is very slow today. We are fighting an aggressive web scraper bot. 10,000 of IPs involved. Randomised User-Agent. Ignoring robots.txt <a href="https://en.osm.town/tags/aibot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>aibot</span></a> <a href="https://en.osm.town/tags/ddos" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ddos</span></a></p><p>Update: Fixed. We've been able to mitigate the bot traffic. <a href="https://en.osm.town/tags/fail2ban" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fail2ban</span></a></p>
Neil Craig<p>Pretty much the only regions on the planet from which we *don't* see regular volumetric DDOS against www.bbc.co.uk &amp; www.bbc.com is central Africa &amp; the poles.</p><p>This is map shows the number of time each country was a DDOS traffic source in the last 30 days (larger circles == more DDOS attacks).</p><p>The botnets are really well globally distributed these days (and we typically see thousands or tens of thousands of source IPs per attack - mostly compromised servers).</p><p><a href="https://mastodon.social/tags/DDOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DDOS</span></a> <a href="https://mastodon.social/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://mastodon.social/tags/BotNet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BotNet</span></a></p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://mstdn.social/@Npars01" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>Npars01</span></a></span> and even then to me this looks more like a <em>"bad" <a href="https://infosec.space/tags/PR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PR</span></a> stunt</em> to me.</p><ul><li>An <a href="https://infosec.space/@kkarhan/114522070702829242" rel="nofollow noopener" target="_blank">expensive one</a> for shure.</li></ul><p>It's the digital equivalent of kids shooting paintballs at a parked cop car in a monsoon rain and that got only noticed retroactively...</p><ul><li>I just think it's wasteful to <a href="https://infosec.space/tags/DDoS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DDoS</span></a> <span class="h-card" translate="no"><a href="https://infosec.exchange/@briankrebs" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>briankrebs</span></a></span> 's website because it's only a <a href="https://infosec.space/tags/blog" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>blog</span></a>, he doesn't pay any <a href="https://infosec.space/tags/ransom" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ransom</span></a>, is extremely well protected <em>and</em> outage of it doesn't generate the same public or financial pressure compared to businesses and governmental institutions.</li></ul><p>Like even <em>if</em> they had succeeded, what would've been the outcome? Maybe line that reads: <em>"Congrats Kiddo, you just wasted thousands if not millions of dollars worth in Monero just to create an outage of a tiny blog. Go give yourself a star in your exercise book!"</em>…</p><ul><li>Someone just had more money than sense I guess...</li></ul>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://infosec.exchange/@briankrebs" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>briankrebs</span></a></span> TBH, I think <a href="https://infosec.space/tags/DDoS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DDoS</span></a>'ing <em>your blog</em> is kinda wasteful beyond <em>"<a href="https://infosec.space/tags/BraggingRights" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BraggingRights</span></a>"</em> because it's not only <em>well protected</em> but the amount of damage / revenue by <a href="https://infosec.space/tags/blackmailing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>blackmailing</span></a> they could expect is just zero.</p><ul><li>I mean, it shure is a way to get <em>your attention</em> but that doesn't mean any <a href="https://infosec.space/tags/BlackHat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BlackHat</span></a> should <em>ask for that</em>!</li></ul><p>But there are thousands if not millions of weaker targets they could've attacked.</p><ul><li>Seems like the <a href="https://www.youtube.com/watch?v=qi0G0b1dNzE" rel="nofollow noopener" target="_blank">muggers from Crocodile Dundee</a> <em>but dumber</em> cuz they try to puncture your tires but you're sitting in a tracked tank.</li></ul><p>Pretty shure had <a href="https://infosec.space/tags/Google" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Google</span></a> not told you or anyone else you would not have even noticed it.</p>
🆘Bill Cole 🇺🇦<p>Meanwhile at $DAYJOB we have routers being pounded into catatonia by VPN credstuffers on $US-HOSTER and $EU-HOSTER who seem to not have noticed that we want an all-important 2nd factor. (yeah, can't name them. they are who you'd expect) </p><p><a href="https://toad.social/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://toad.social/tags/DDoS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DDoS</span></a></p>