pouet.chapril.org est l'un des nombreux serveurs Mastodon indépendants que vous pouvez utiliser pour participer au fédiverse.
Chapril https://www.chapril.org est un projet de l'April https://www.april.org

Administré par :

Statistiques du serveur :

1,1K
comptes actifs

#fastflux

3 messages3 participants0 message aujourd’hui
Alejandro Baez<p>I know people like using wildcard domains, but don't.🫠 They're a constant attack vector. </p><p>Newest callrd <a href="https://fosstodon.org/tags/fastflux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fastflux</span></a> even uses MX to do discovery. Very clever. Terrible if impacted. ⚰️</p><p> <a href="https://arstechnica.com/security/2025/04/nsa-warns-that-overlooked-botnet-technique-threatens-national-security/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">arstechnica.com/security/2025/</span><span class="invisible">04/nsa-warns-that-overlooked-botnet-technique-threatens-national-security/</span></a></p>
Quad9DNS<p><a href="https://mastodon.social/tags/FastFlux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FastFlux</span></a> is back again!</p><p><a href="https://mastodon.social/tags/DNS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DNS</span></a> </p><p><a href="https://www.bleepingcomputer.com/news/security/cisa-warns-of-fast-flux-dns-evasion-used-by-cybercrime-gangs/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/cisa-warns-of-fast-flux-dns-evasion-used-by-cybercrime-gangs/</span></a></p>
PrivacyDigest<p><a href="https://mas.to/tags/NSA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NSA</span></a> warns “fast flux” threatens national <a href="https://mas.to/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a>. What is fast flux anyway?</p><p>A technique that hostile nation-states &amp; financially motivated <a href="https://mas.to/tags/ransomware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ransomware</span></a> groups are using to hide their operations poses a threat to critical <a href="https://mas.to/tags/infrastructure" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infrastructure</span></a> &amp; national security, the NSA has warned.</p><p>The technique is known as <a href="https://mas.to/tags/FastFlux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FastFlux</span></a>. It allows decentralized networks operated by threat actors to hide their infrastructure and survive takedown attempts that would otherwise succeed<br><a href="https://mas.to/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a></p><p><a href="https://arstechnica.com/security/2025/04/nsa-warns-that-overlooked-botnet-technique-threatens-national-security/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">arstechnica.com/security/2025/</span><span class="invisible">04/nsa-warns-that-overlooked-botnet-technique-threatens-national-security/</span></a></p>
IT News<p>NSA warns “fast flux” threatens national security. What is fast flux anyway? - A technique that hostile nation-states and financially motivated ransomwar... - <a href="https://arstechnica.com/security/2025/04/nsa-warns-that-overlooked-botnet-technique-threatens-national-security/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">arstechnica.com/security/2025/</span><span class="invisible">04/nsa-warns-that-overlooked-botnet-technique-threatens-national-security/</span></a> <a href="https://schleuss.online/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://schleuss.online/tags/fastflux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fastflux</span></a> <a href="https://schleuss.online/tags/biz" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>biz</span></a>&amp;it</p>
The New Oil<p><a href="https://mastodon.thenewoil.org/tags/CISA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CISA</span></a> warns of <a href="https://mastodon.thenewoil.org/tags/FastFlux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FastFlux</span></a> <a href="https://mastodon.thenewoil.org/tags/DNS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DNS</span></a> evasion used by <a href="https://mastodon.thenewoil.org/tags/cybercrime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybercrime</span></a> gangs</p><p><a href="https://www.bleepingcomputer.com/news/security/cisa-warns-of-fast-flux-dns-evasion-used-by-cybercrime-gangs/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/cisa-warns-of-fast-flux-dns-evasion-used-by-cybercrime-gangs/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>
David J. Bianco (He/Him)<p>In case you're not up-to-speed on what <a href="https://infosec.exchange/tags/FastFlux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FastFlux</span></a> <a href="https://infosec.exchange/tags/DNS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DNS</span></a> is, it's part of the arms race between attackers and defenders:</p><p>THREAT ACTOR: This is my C2 IP<br>BLUE TEAMER: Blocked at the firewall</p><p>TA: Ok, well then, here's my C2 domain. I've rented 50k botnet nodes to use as proxies to my real C2 infrastructure, and I'm going to keep changing the IP the domain points to basically forever. Good luck blocking that. [FAST FLUX]<br>BT: Blocked the domain's nameserver's IPs at the firewall</p><p>🧵 </p><p><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>
grey<p>Friendly reminder that you should be blocking all newly registered domains for your end users. Free lists like the NRD (<a href="https://github.com/xRuffKez/NRD" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/xRuffKez/NRD</span><span class="invisible"></span></a>) exist. Microsoft Defender for Endpoint also has a built in list you can enable via policy.</p><p>IMO everyone should do 365 days but even 30 or 90 will save you so much headache.<br><a href="https://infosec.exchange/tags/DNS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DNS</span></a> <a href="https://infosec.exchange/tags/ThreatIntel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatIntel</span></a> <a href="https://infosec.exchange/tags/FastFlux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FastFlux</span></a></p>