If those where in fact non-spoofed sources, then i am surely interested in getting that list in order to put it into my dnsbl (dronebl). So if someone has it, or can tell me who to contact. Feel free to provide me with it offlist.
Especially if this botnet uses one of the many irc networks (like undernet) that is utilizing the dnsbl list and the cc is harbored there, it might help.
Also, most 'admins' only start realizing something is wrong in their network once their precious bizmail won't arrive at clients because their infected ip is listed and the remote mx refuses the mail because of the listing.
- Technical Maintenance Engineer Parkstad Support BV- Maintainer DroneBL- Peplink Certified Engineer
-------- Oorspronkelijk bericht --------Van: Hugo Slabbert <firstname.lastname@example.org> Datum: 26-09-16 05:54 (GMT+01:00) Aan: "John R. Levine" <email@example.com> Cc: firstname.lastname@example.org Onderwerp: Re: Krebs on Security booted off Akamai network after DDoS attack proves pricey
The attack is triggered by a few spoofs somewhere in the world. It is not
feasible to stop this.
That paper is about reflection attacks. From what I've read, this was
not a reflection attack. The IoT devices are infected with botware
which sends attack traffic directly. Address spoofing is not particularly
useful for controlling botnets.
But that's not only remaining use of source address spoofing in direct
attacks, no? Even if reflection and amplification are not used, spoofing
can still be used for obfuscation.