Stories
Slash Boxes
Comments

SoylentNews is people

posted by n1 on Tuesday June 02 2015, @11:55AM   Printer-friendly
from the net-neutrality dept.

Earlier this month, Brett Wentworth took Level 3 Communications Inc. into territory that most rivals have been reluctant to enter. The director of global security at the largest carrier of Internet traffic cut off data from reaching a group of servers in China that his company believed was involved in an active hacking attack.

The Broomfield, Colo., company handles roughly 40% of internet traffic and is taking an aggressive—and some say risky approach—to battling criminal activity. Risky because hackers often hijack legitimate machines to do their dirty work, raising the risk of collateral damage by sidelining a business using the same group of servers. Such tactics also run against a widely held belief that large carriers should be facilitating traffic, not halting it.


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 3, Interesting) by wantkitteh on Tuesday June 02 2015, @12:21PM

    by wantkitteh (3362) on Tuesday June 02 2015, @12:21PM (#191109) Homepage Journal

    My Minecraft server was unreachable for several days when Microsoft went after No-IP's DNS services. That was a targeted (if bungled) move against a botnet's command and control system - this is blanket traffic blocking, you can only go after so many targets like that until you "accidentally" take out something legit.

    Starting Score:    1  point
    Moderation   +1  
       Interesting=1, Total=1
    Extra 'Interesting' Modifier   0  
    Karma-Bonus Modifier   +1  

    Total Score:   3  
  • (Score: 0) by Anonymous Coward on Tuesday June 02 2015, @12:44PM

    by Anonymous Coward on Tuesday June 02 2015, @12:44PM (#191116)

    They probably have much the same perspective that the RBL guys did about blacklisting entire ISPs: yeah, there's collateral damage, but it might provide an incentive for those ISPs to start policing their own users. And it pretty much did, although I don't know that we like the method they ultimately chose (block outbound port 25).

  • (Score: 0) by Anonymous Coward on Tuesday June 02 2015, @01:03PM

    by Anonymous Coward on Tuesday June 02 2015, @01:03PM (#191121)

    Idea: botnet command and control via minecraft signs.

    • (Score: 2) by Marand on Tuesday June 02 2015, @03:23PM

      by Marand (1081) on Tuesday June 02 2015, @03:23PM (#191162) Journal

      Idea: botnet command and control via minecraft signs.

      Can go further than that. There's a mod [ocdoc.cil.li] that adds "computer" blocks to the game and gives in-game access to Lua scripting, which can be configured to allow internet access [ocdoc.cil.li] from within the game. You could control a botnet from within minecraft, maybe even trigger changes via the game's circuits (redstone).

      For a less malicious use, you could probably use it to facilitate cross-server communication, like some sort of minecraft-specific gopher or usenet implementation.

      (All hypothetical, I never did much with the computer mods other than read up on them a bit)

    • (Score: 0) by Anonymous Coward on Tuesday June 02 2015, @05:11PM

      by Anonymous Coward on Tuesday June 02 2015, @05:11PM (#191194)

      Network security researchers usually investigate botnets based on which server they talk to. The fact that your bots keep talking to hosts acting like Minecraft servers will be picked up quickly for anything but the tiniest botnet.

  • (Score: 2, Interesting) by VLM on Tuesday June 02 2015, @01:14PM

    by VLM (445) on Tuesday June 02 2015, @01:14PM (#191124)

    unreachable for several days

    Technically your domain name was unresolvable, I'm sure if you used another DNS provider you'd be fine, or distributed ip addrs.

    Something to consider is there's no 1:1 mapping requirement in DNS. You can have both something.no-ip.com and something.someOtherProvider.com point to the same address.

    • (Score: 0) by Anonymous Coward on Tuesday June 02 2015, @05:15PM

      by Anonymous Coward on Tuesday June 02 2015, @05:15PM (#191196)

      Oooh, so the attack only affected 99% of all Internet users. That makes it so much better!

  • (Score: 1) by penguinoid on Tuesday June 02 2015, @03:52PM

    by penguinoid (5331) on Tuesday June 02 2015, @03:52PM (#191170)

    you can only go after so many targets like that until you "accidentally" take out something legit

    On the other hand, botnets can also take down something legit.

    --
    RIP Slashdot. Killed by greedy bastards.