Ancestors

Toot

Written by scy on 2024-10-29 at 21:46

Interesting type of attack: People sending out TCP packets with a spoofed source address, targeting port 22 on random (or not) IP addresses on the net.

Not to probe whether there's SSH on that server, but to generate abuse reports against the spoofed IP, in order to force it off the net.

https://delroth.net/posts/spoofed-mass-scan-abuse/

Keep this in mind when you receive abuse reports. Especially if you're an ISP.

[#]infosec #networking #sysadmin

=> More informations about this toot | More toots from scy@chaos.social

Descendants

Written by Korrupt on 2024-10-30 at 06:24

@scy that is actually an issue on the Tor ML, since some relay Servers were also used. See also https://gitlab.torproject.org/tpo/network-health/analysis/-/issues/85

=> More informations about this toot | More toots from korrupt@nrw.social

Written by scy on 2024-10-30 at 09:36

@korrupt @uhuru Yes, currently this appears to be targeted against Tor. The whole article is talking about that.

But since the attack is not Tor-specific in any way (and I fully expect it to be used against other things and groups of people in the future), I didn't mention it. Tor admins probably already know about it, and I don't want others to dismiss it as "oh, that's just a Tor problem".

=> More informations about this toot | More toots from scy@chaos.social

Proxy Information
Original URL
gemini://mastogem.picasoft.net/thread/113392901473623293
Status Code
Success (20)
Meta
text/gemini
Capsule Response Time
298.712198 milliseconds
Gemini-to-HTML Time
0.721544 milliseconds

This content has been proxied by September (3851b).