Security Alerts & News
by Tymoteusz A. Góral

History
#1602 Spreading the DDoS disease and selling the cure
Earlier this month a hacker released the source code for Mirai, a malware strain that was used to launch a historically large 620 Gbps denial-of-service attack against this site in September. That attack came in apparent retribution for a story here which directly preceded the arrest of two Israeli men for allegedly running an online attack for hire service called vDOS. Turns out, the site where the Mirai source code was leaked had some very interesting things in common with the place vDOS called home.

The domain name where the Mirai source code was originally placed for download — santasbigcandycane[dot]cx — is registered at the same domain name registrar that was used to register the now-defunct DDoS-for-hire service vdos-s[dot]com.

Normally, this would not be remarkable, since most domain registrars have thousands or millions of domains in their stable. But in this case it is interesting mainly because the registrar used by both domains — a company called namecentral.com — has apparently been used to register just 38 domains since its inception by its current owner in 2012, according to a historic WHOIS records gathered by domaintools.com.
Read more
#1608 Linux kernel bugs: we add them in and then take years to get them out
#1607 Oracle puts out 253 fixes and a request to please apply patches NOW!
#1606 Your dynamic IP address is now protected personal data under EU law
#1605 Russian hacker, wanted by FBI, is arrested in Prague, Czechs say
#1604 Flaw in Intel chips could make malware attacks more potent
#1603 LinkedIn says hacking suspect is tied to breach that stole 117M passwords
#1602 Spreading the DDoS disease and selling the cure
History
2017: 01 02 03 04 05
2016: 01 02 03 04 05 06 07 08 09 10 11 12