<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Spamhaus DDoS attacks</title>
	<atom:link href="http://www.epanorama.net/blog/2013/03/28/spamhaus-ddos-attacks/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2013/03/28/spamhaus-ddos-attacks/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Sun, 05 Apr 2026 18:35:45 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Address Look Up</title>
		<link>https://www.epanorama.net/blog/2013/03/28/spamhaus-ddos-attacks/comment-page-1/#comment-33510</link>
		<dc:creator><![CDATA[Address Look Up]]></dc:creator>
		<pubDate>Sun, 18 Aug 2013 08:08:17 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=18442#comment-33510</guid>
		<description><![CDATA[Great points altogether, you simply gained a new reader. What could you suggest in regards to your post that you made some days in the past? Any certain?]]></description>
		<content:encoded><![CDATA[<p>Great points altogether, you simply gained a new reader. What could you suggest in regards to your post that you made some days in the past? Any certain?</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: ddos protected vps</title>
		<link>https://www.epanorama.net/blog/2013/03/28/spamhaus-ddos-attacks/comment-page-1/#comment-33509</link>
		<dc:creator><![CDATA[ddos protected vps]]></dc:creator>
		<pubDate>Sun, 04 Aug 2013 19:53:48 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=18442#comment-33509</guid>
		<description><![CDATA[Thanks designed for sharing such a fastidious opinion, article is good, thats why i
have read it entirely]]></description>
		<content:encoded><![CDATA[<p>Thanks designed for sharing such a fastidious opinion, article is good, thats why i<br />
have read it entirely</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2013/03/28/spamhaus-ddos-attacks/comment-page-1/#comment-33508</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 21 May 2013 09:30:52 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=18442#comment-33508</guid>
		<description><![CDATA[The man who &#039;nearly broke the internet&#039;
http://www.guardian.co.uk/technology/2013/may/20/man-accused-breaking-the-internet

Sven Olaf Kamphuis is accused of global cybercrime, but Spanish police found him in a squalid flat with his name on the letterbox

Kamphuis, 35, is one of the most controversial characters in the murky world of spam and hacking – deemed the internet&#039;s public enemy number one by some, though others believe his reputation has been blown out of proportion by the grandstanding of his foes.

he allegedly masterminded a flurry of March internet attacks that the security company CloudFlare claimed &quot;almost broke the internet&quot;,

Kamphuis displayed a Napoleonic sense of grandeur. &quot;He claimed he had diplomatic status,&quot; said the Spanish police officer who led the operation, but asked not to be named. &quot;He said he was the telecommunications minister and foreign minister of a place called the Cyberbunker Republic. He didn&#039;t seem to be joking.&quot;

Britain, the United States and Germany were all affected by the massive denial of service attacks that he launched.

&quot;The van was fitted out as a mobile office from which he could launch his attacks.&quot;

The result was what the New York Times called an attack of previously &quot;unknown magnitudes&quot;, producing a 300bn-bits-per-second data stream that targeted the British and Swiss-based anti-spam operator Spamhaus and its allies. This had reportedly blacklisted his CB3ROB/Cyberbunker company

the huge number of spammers he hosts has led even hacktivists sympathetic to his pro-Pirate party, Anonymous and Julian Assange&#039;s stance to question his real activities.

If this was one of the most successful spammers in history, why was he living in a squalid flat and a camper van?]]></description>
		<content:encoded><![CDATA[<p>The man who &#8216;nearly broke the internet&#8217;<br />
<a href="http://www.guardian.co.uk/technology/2013/may/20/man-accused-breaking-the-internet" rel="nofollow">http://www.guardian.co.uk/technology/2013/may/20/man-accused-breaking-the-internet</a></p>
<p>Sven Olaf Kamphuis is accused of global cybercrime, but Spanish police found him in a squalid flat with his name on the letterbox</p>
<p>Kamphuis, 35, is one of the most controversial characters in the murky world of spam and hacking – deemed the internet&#8217;s public enemy number one by some, though others believe his reputation has been blown out of proportion by the grandstanding of his foes.</p>
<p>he allegedly masterminded a flurry of March internet attacks that the security company CloudFlare claimed &#8220;almost broke the internet&#8221;,</p>
<p>Kamphuis displayed a Napoleonic sense of grandeur. &#8220;He claimed he had diplomatic status,&#8221; said the Spanish police officer who led the operation, but asked not to be named. &#8220;He said he was the telecommunications minister and foreign minister of a place called the Cyberbunker Republic. He didn&#8217;t seem to be joking.&#8221;</p>
<p>Britain, the United States and Germany were all affected by the massive denial of service attacks that he launched.</p>
<p>&#8220;The van was fitted out as a mobile office from which he could launch his attacks.&#8221;</p>
<p>The result was what the New York Times called an attack of previously &#8220;unknown magnitudes&#8221;, producing a 300bn-bits-per-second data stream that targeted the British and Swiss-based anti-spam operator Spamhaus and its allies. This had reportedly blacklisted his CB3ROB/Cyberbunker company</p>
<p>the huge number of spammers he hosts has led even hacktivists sympathetic to his pro-Pirate party, Anonymous and Julian Assange&#8217;s stance to question his real activities.</p>
<p>If this was one of the most successful spammers in history, why was he living in a squalid flat and a camper van?</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2013/03/28/spamhaus-ddos-attacks/comment-page-1/#comment-33507</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 29 Apr 2013 09:18:06 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=18442#comment-33507</guid>
		<description><![CDATA[Police arrest suspect in BIGGEST DDoS ATTACK IN HISTORY
Dutch suspect snatched in Spain
http://www.theregister.co.uk/2013/04/26/police_arrest_spamhaus_ddos_suspect/

The Dutch police have confirmed the arrest of man suspected of taking part in a massive DDoS attack against the anti-spam group Spamhaus back in March.

The 35 year-old man is a Dutch national but was arrested at his home in Barcelona under a European arrest warrant, the Netherlands National Prosecution Office told the BBC.

Although the identity of the man hasn&#039;t been released it has been suggested that he&#039;s Sven Kamphuis, the owner and manager of Dutch hosting firm Cyberbunker, which has been feuding with Spamhaus for years and is claimed by some to be responsible for the DDoS attack.]]></description>
		<content:encoded><![CDATA[<p>Police arrest suspect in BIGGEST DDoS ATTACK IN HISTORY<br />
Dutch suspect snatched in Spain<br />
<a href="http://www.theregister.co.uk/2013/04/26/police_arrest_spamhaus_ddos_suspect/" rel="nofollow">http://www.theregister.co.uk/2013/04/26/police_arrest_spamhaus_ddos_suspect/</a></p>
<p>The Dutch police have confirmed the arrest of man suspected of taking part in a massive DDoS attack against the anti-spam group Spamhaus back in March.</p>
<p>The 35 year-old man is a Dutch national but was arrested at his home in Barcelona under a European arrest warrant, the Netherlands National Prosecution Office told the BBC.</p>
<p>Although the identity of the man hasn&#8217;t been released it has been suggested that he&#8217;s Sven Kamphuis, the owner and manager of Dutch hosting firm Cyberbunker, which has been feuding with Spamhaus for years and is claimed by some to be responsible for the DDoS attack.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: mistakes in web design</title>
		<link>https://www.epanorama.net/blog/2013/03/28/spamhaus-ddos-attacks/comment-page-1/#comment-33506</link>
		<dc:creator><![CDATA[mistakes in web design]]></dc:creator>
		<pubDate>Tue, 09 Apr 2013 15:05:09 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=18442#comment-33506</guid>
		<description><![CDATA[C&#1072;n &#1091;ou tell us mo&#1075;e about this? I&#039;d like to find out some additional information.

my site &lt;a href=&quot;http://www.porclas-racing.com/infusions/guest_book/guest_book.php&quot; rel=&quot;nofollow&quot;&gt;mistakes in web design&lt;/a&gt;]]></description>
		<content:encoded><![CDATA[<p>C&#1072;n &#1091;ou tell us mo&#1075;e about this? I&#8217;d like to find out some additional information.</p>
<p>my site <a href="http://www.porclas-racing.com/infusions/guest_book/guest_book.php" rel="nofollow">mistakes in web design</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2013/03/28/spamhaus-ddos-attacks/comment-page-1/#comment-33505</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 08 Apr 2013 11:30:43 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=18442#comment-33505</guid>
		<description><![CDATA[How Spamhaus’ attackers turned DNS into a weapon of mass destruction
DNS amplification can clog the Internet&#039;s core—and there&#039;s no fix in sight.
http://arstechnica.com/information-technology/2013/03/how-spamhaus-attackers-turned-dns-into-a-weapon-of-mass-destruction/

A little more than a year ago, details emerged about an effort by some members of the hacktivist group Anonymous to build a new weapon to replace their aging denial-of-service arsenal. The new weapon would use the Internet&#039;s Domain Name Service as a force-multiplier to bring the servers of those who offended the group to their metaphorical knees.

an attack using the technique proposed for use in that attack tool and operation—both of which failed to materialize—was at the heart of an ongoing denial-of-service assault on Spamhaus, the anti-spam clearing house organization. And while it hasn&#039;t brought the Internet itself down, it has caused major slowdowns in the Internet&#039;s core networks.

DNS Amplification (or DNS Reflection) remains possible after years of security expert warnings. Its power is a testament to how hard it is to get organizations to make simple changes that would prevent even recognized threats.

But thanks to public cloud services, &quot;bulletproof&quot; hosting services, and other services that allow attackers to spawn and then reap hundreds of attacking systems, DNS amplification attacks can still be launched at the whim of a deep-pocketed attacker—like, for example, the cyber-criminals running the spam networks that Spamhaus tries to shut down.

 on some networks, the DNS resolver closest to the requesting application doesn&#039;t handle all that work. Instead, it sends a &quot;recursive&quot; request to the next DNS server up and lets that server handle all of the walking through the DNS hierarchy for it

To save time, DNS requests don&#039;t use the &quot;three-way handshake&quot; of the Transmission Control Protocol (TCP) to make all these queries. Instead, DNS typically uses the User Datagram Protocol (UDP)—a &quot;connectionless&quot; protocol that lets the server fire and forget requests.

That makes the sending of requests and responses quicker—but it also opens up a door to abuse of DNS that DNS amplification uses to wreak havoc on a target. All the attacker has to do is find a DNS server open to requests from any client and send it requests forged as being from the target of the attack. And there are millions of them.

The &quot;amplification&quot; in DNS amplification attacks comes from the size of those responses. While a DNS lookup request itself is fairly small, the resulting response of a recursive DNS lookup can be much larger. A relatively small number of attacking systems sending a trickle of forged UDP packets to open DNS servers can result in a firehose of data being blasted at the attackers&#039; victim.

 A &quot;root hint&quot; request—sending a request for name servers for the &quot;.&quot; domain—results in a response 20 times larger than the packet the request came in. That&#039;s in part thanks to DNS-SEC, the standard adopted to make it harder to spoof DNS responses, since now the response includes certificate data from the responding server.

There&#039;s been a proposal on the books to fix the problem for nearly 13 years—the Internet Engineering Task Force&#039;s BCP 38, an approach to &quot;ingress filtering&quot; of packets.

ISPs generally do &quot;egress filtering&quot;—they check outbound traffic to make sure it&#039;s coming from IP addresses within their network.  This prevents them from filling up their peering connections with bad traffic

Another possible solution that would eliminate the problem entirely is to make DNS use TCP for everything—reducing the risk of forged packets.  DNS already uses TCP for tasks like zone transfers. But that would require a change to DNS itself, so it&#039;s unlikely that would ever happen, considering that you can&#039;t even convince people to properly configure their DNS servers to begin with.]]></description>
		<content:encoded><![CDATA[<p>How Spamhaus’ attackers turned DNS into a weapon of mass destruction<br />
DNS amplification can clog the Internet&#8217;s core—and there&#8217;s no fix in sight.<br />
<a href="http://arstechnica.com/information-technology/2013/03/how-spamhaus-attackers-turned-dns-into-a-weapon-of-mass-destruction/" rel="nofollow">http://arstechnica.com/information-technology/2013/03/how-spamhaus-attackers-turned-dns-into-a-weapon-of-mass-destruction/</a></p>
<p>A little more than a year ago, details emerged about an effort by some members of the hacktivist group Anonymous to build a new weapon to replace their aging denial-of-service arsenal. The new weapon would use the Internet&#8217;s Domain Name Service as a force-multiplier to bring the servers of those who offended the group to their metaphorical knees.</p>
<p>an attack using the technique proposed for use in that attack tool and operation—both of which failed to materialize—was at the heart of an ongoing denial-of-service assault on Spamhaus, the anti-spam clearing house organization. And while it hasn&#8217;t brought the Internet itself down, it has caused major slowdowns in the Internet&#8217;s core networks.</p>
<p>DNS Amplification (or DNS Reflection) remains possible after years of security expert warnings. Its power is a testament to how hard it is to get organizations to make simple changes that would prevent even recognized threats.</p>
<p>But thanks to public cloud services, &#8220;bulletproof&#8221; hosting services, and other services that allow attackers to spawn and then reap hundreds of attacking systems, DNS amplification attacks can still be launched at the whim of a deep-pocketed attacker—like, for example, the cyber-criminals running the spam networks that Spamhaus tries to shut down.</p>
<p> on some networks, the DNS resolver closest to the requesting application doesn&#8217;t handle all that work. Instead, it sends a &#8220;recursive&#8221; request to the next DNS server up and lets that server handle all of the walking through the DNS hierarchy for it</p>
<p>To save time, DNS requests don&#8217;t use the &#8220;three-way handshake&#8221; of the Transmission Control Protocol (TCP) to make all these queries. Instead, DNS typically uses the User Datagram Protocol (UDP)—a &#8220;connectionless&#8221; protocol that lets the server fire and forget requests.</p>
<p>That makes the sending of requests and responses quicker—but it also opens up a door to abuse of DNS that DNS amplification uses to wreak havoc on a target. All the attacker has to do is find a DNS server open to requests from any client and send it requests forged as being from the target of the attack. And there are millions of them.</p>
<p>The &#8220;amplification&#8221; in DNS amplification attacks comes from the size of those responses. While a DNS lookup request itself is fairly small, the resulting response of a recursive DNS lookup can be much larger. A relatively small number of attacking systems sending a trickle of forged UDP packets to open DNS servers can result in a firehose of data being blasted at the attackers&#8217; victim.</p>
<p> A &#8220;root hint&#8221; request—sending a request for name servers for the &#8220;.&#8221; domain—results in a response 20 times larger than the packet the request came in. That&#8217;s in part thanks to DNS-SEC, the standard adopted to make it harder to spoof DNS responses, since now the response includes certificate data from the responding server.</p>
<p>There&#8217;s been a proposal on the books to fix the problem for nearly 13 years—the Internet Engineering Task Force&#8217;s BCP 38, an approach to &#8220;ingress filtering&#8221; of packets.</p>
<p>ISPs generally do &#8220;egress filtering&#8221;—they check outbound traffic to make sure it&#8217;s coming from IP addresses within their network.  This prevents them from filling up their peering connections with bad traffic</p>
<p>Another possible solution that would eliminate the problem entirely is to make DNS use TCP for everything—reducing the risk of forged packets.  DNS already uses TCP for tasks like zone transfers. But that would require a change to DNS itself, so it&#8217;s unlikely that would ever happen, considering that you can&#8217;t even convince people to properly configure their DNS servers to begin with.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2013/03/28/spamhaus-ddos-attacks/comment-page-1/#comment-33504</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 04 Apr 2013 08:34:56 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=18442#comment-33504</guid>
		<description><![CDATA[A DDoS (Distributed Denial of Service) Threat has now become the #1 threat to availability &amp; security for enterprise. But the true impact goes far beyond the financial cost…..

The 7 Deadly Syns of a DDoS Attack
1. 	Distraction - IT personnel tied up addressing the attack
2. 	 Interference - Larger number of help desk calls
3. 	Toil - Extra manual work to re-enter transactions
4. 	Disruption - Lost employee output
5. 	 Expense - Increased SLA Credit payments
6. 	Deprivation - Current and prospective business loss
7. 	Disgrace - Reputation impact

Source: http://exclusive-networks.mailpv.net/a/s/10044338-6f028429c318bc9712facf566cadde2e/322561]]></description>
		<content:encoded><![CDATA[<p>A DDoS (Distributed Denial of Service) Threat has now become the #1 threat to availability &amp; security for enterprise. But the true impact goes far beyond the financial cost…..</p>
<p>The 7 Deadly Syns of a DDoS Attack<br />
1. 	Distraction &#8211; IT personnel tied up addressing the attack<br />
2. 	 Interference &#8211; Larger number of help desk calls<br />
3. 	Toil &#8211; Extra manual work to re-enter transactions<br />
4. 	Disruption &#8211; Lost employee output<br />
5. 	 Expense &#8211; Increased SLA Credit payments<br />
6. 	Deprivation &#8211; Current and prospective business loss<br />
7. 	Disgrace &#8211; Reputation impact</p>
<p>Source: <a href="http://exclusive-networks.mailpv.net/a/s/10044338-6f028429c318bc9712facf566cadde2e/322561" rel="nofollow">http://exclusive-networks.mailpv.net/a/s/10044338-6f028429c318bc9712facf566cadde2e/322561</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2013/03/28/spamhaus-ddos-attacks/comment-page-1/#comment-33503</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sun, 31 Mar 2013 13:22:01 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=18442#comment-33503</guid>
		<description><![CDATA[Yes, This Week’s DDoS Attack Was Huge, And Part Of An Ominous Trend
http://readwrite.com/2013/03/29/ddos-attack-was-huge-and-part-of-a-trend

Depending on who you believe, the week long Spamhaus-Cyberbunker cyberattack we covered Wednesday was either a threat to the Internet itself or hyped up by an overzealous security vendor. Either way, it was still serious business.

distributed denial-of-service assaults that aim to knock target computers off the Internet — are real, and have been on the rise since 2010.

This week’s attack was more than 300Gbps — way above the norm, in other words.

That’s because the attackers actually co-opted part of the Internet’s basic infrastructure — the Domain Name System, or DNS — in such a way as to greatly amplify the firehose stream of data they were directing at target computers.

Holden says DNS is becoming an increasingly popular target for DDoS. As many as 27 million DNS servers across the Internet are “open” in a way that allows them to be hijacked this way.]]></description>
		<content:encoded><![CDATA[<p>Yes, This Week’s DDoS Attack Was Huge, And Part Of An Ominous Trend<br />
<a href="http://readwrite.com/2013/03/29/ddos-attack-was-huge-and-part-of-a-trend" rel="nofollow">http://readwrite.com/2013/03/29/ddos-attack-was-huge-and-part-of-a-trend</a></p>
<p>Depending on who you believe, the week long Spamhaus-Cyberbunker cyberattack we covered Wednesday was either a threat to the Internet itself or hyped up by an overzealous security vendor. Either way, it was still serious business.</p>
<p>distributed denial-of-service assaults that aim to knock target computers off the Internet — are real, and have been on the rise since 2010.</p>
<p>This week’s attack was more than 300Gbps — way above the norm, in other words.</p>
<p>That’s because the attackers actually co-opted part of the Internet’s basic infrastructure — the Domain Name System, or DNS — in such a way as to greatly amplify the firehose stream of data they were directing at target computers.</p>
<p>Holden says DNS is becoming an increasingly popular target for DDoS. As many as 27 million DNS servers across the Internet are “open” in a way that allows them to be hijacked this way.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2013/03/28/spamhaus-ddos-attacks/comment-page-1/#comment-33502</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 28 Mar 2013 11:30:58 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=18442#comment-33502</guid>
		<description><![CDATA[Operators confessed ordered a giant online online crime attack

The attack method is to send queries to open name servers from fake network address. The attacker found the victim&#039;s address, the name of the server to send back messages bombarding the victim&#039;s address until the attack on the victim&#039;s overloaded servers.

The attacks was organized by Stophaus Movement group, which includes operators that think they are wrongly placed on blacklist.

Dutch telecom operator Cb3robin representative Sven Kamphuis says the news service Idgns for that he is not Spammer and there is no one else Stop Haus member. Kamphuis says Spam Haus are acting as if it were the internet police.

Source: http://www.tietoviikko.fi/kaikki_uutiset/operaattorit+tunnustivat+tilanneensa+jattimaisen+nettihyokkayksen+verkkorikollisilta/a890644?s=r&amp;wtm=tietoviikko/-28032013&amp;]]></description>
		<content:encoded><![CDATA[<p>Operators confessed ordered a giant online online crime attack</p>
<p>The attack method is to send queries to open name servers from fake network address. The attacker found the victim&#8217;s address, the name of the server to send back messages bombarding the victim&#8217;s address until the attack on the victim&#8217;s overloaded servers.</p>
<p>The attacks was organized by Stophaus Movement group, which includes operators that think they are wrongly placed on blacklist.</p>
<p>Dutch telecom operator Cb3robin representative Sven Kamphuis says the news service Idgns for that he is not Spammer and there is no one else Stop Haus member. Kamphuis says Spam Haus are acting as if it were the internet police.</p>
<p>Source: <a href="http://www.tietoviikko.fi/kaikki_uutiset/operaattorit+tunnustivat+tilanneensa+jattimaisen+nettihyokkayksen+verkkorikollisilta/a890644?s=r&#038;wtm=tietoviikko/-28032013&#038;amp" rel="nofollow">http://www.tietoviikko.fi/kaikki_uutiset/operaattorit+tunnustivat+tilanneensa+jattimaisen+nettihyokkayksen+verkkorikollisilta/a890644?s=r&#038;wtm=tietoviikko/-28032013&#038;amp</a>;</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2013/03/28/spamhaus-ddos-attacks/comment-page-1/#comment-33501</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 28 Mar 2013 10:41:34 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=18442#comment-33501</guid>
		<description><![CDATA[Firm Is Accused of Sending Spam, and Fight Jams Internet
http://www.nytimes.com/2013/03/27/technology/internet/online-dispute-becomes-internet-snarling-attack.html?pagewanted=1&amp;_r=0

A squabble between a group fighting spam and a Dutch company that hosts Web sites said to be sending spam has escalated into one of the largest computer attacks on the Internet, causing widespread congestion and jamming crucial infrastructure around the world.

Millions of ordinary Internet users have experienced delays in services like Netflix or could not reach a particular Web site for a short time.

Spamhaus’s role was to generate a list of Internet spammers.
Of Cyberbunker, he added: “These guys are just mad. To be frank, they got caught. They think they should be allowed to spam.”

 “We are aware that this is one of the largest DDoS attacks the world had publicly seen.”

“Nobody ever deputized Spamhaus to determine what goes and does not go on the Internet,”

“You can’t stop a DNS flood by shutting down those servers because those machines have to be open and public by default. The only way to deal with this problem is to find the people doing it and arrest them.”]]></description>
		<content:encoded><![CDATA[<p>Firm Is Accused of Sending Spam, and Fight Jams Internet<br />
<a href="http://www.nytimes.com/2013/03/27/technology/internet/online-dispute-becomes-internet-snarling-attack.html?pagewanted=1&#038;_r=0" rel="nofollow">http://www.nytimes.com/2013/03/27/technology/internet/online-dispute-becomes-internet-snarling-attack.html?pagewanted=1&#038;_r=0</a></p>
<p>A squabble between a group fighting spam and a Dutch company that hosts Web sites said to be sending spam has escalated into one of the largest computer attacks on the Internet, causing widespread congestion and jamming crucial infrastructure around the world.</p>
<p>Millions of ordinary Internet users have experienced delays in services like Netflix or could not reach a particular Web site for a short time.</p>
<p>Spamhaus’s role was to generate a list of Internet spammers.<br />
Of Cyberbunker, he added: “These guys are just mad. To be frank, they got caught. They think they should be allowed to spam.”</p>
<p> “We are aware that this is one of the largest DDoS attacks the world had publicly seen.”</p>
<p>“Nobody ever deputized Spamhaus to determine what goes and does not go on the Internet,”</p>
<p>“You can’t stop a DNS flood by shutting down those servers because those machines have to be open and public by default. The only way to deal with this problem is to find the people doing it and arrest them.”</p>
]]></content:encoded>
	</item>
</channel>
</rss>
