当前位置:网站首页>Large scale DDoS attacks and simulated DDoS tests against VoIP providers
Large scale DDoS attacks and simulated DDoS tests against VoIP providers
2022-06-30 02:08:00 【zy18165754120】
At the time of writing , A group called VoIP.ms The main VoIP Provider is experiencing a distributed denial of service (DDoS) Since the attack for more than a week . result , They can't serve their customers , Everyone and their dogs complain that they can't connect to VoIP.ms Of SIP Servers and other resources . meanwhile , Some people claim to be REvil A member of the ransomware organization , Blackmailing suppliers .
This is not an isolated case , Because earlier this month , Some British suppliers have also been attacked , The report also mentions REvil Is the source of the attack . Many people from the safe community think it is unlikely to be true REvil, But this is not what I want to write here .
We did contact the person of one of the attacked British suppliers , He explained that the , In their sampling of attack traffic , They didn't see anything SIP Data packets . contrary , What they do see is DNS、SNMP And others usually appear in amplification attacks and botnets DDoS Traffic in attack .
Not just about SIP Denial of service
By reading about these DDoS Public reports of attacks , Obviously , The victimized company is not only in its SIP Suffer at the end . It is mentioned that a large amount of traffic indicates that the attack may be of capacity , Not application specific .
stay VoIP.ms Under the circumstances , They originally had a DNS interrupt , Then turn to using Cloudflare As their DNS. They also put their website on Cloudflare Website DDoS After protection , And start asking for verification code, etc .
They also moved POP( Access point )SIP Server's IP Address , And you can see people complaining on the forum SIP The connection fails . lately , People noticed that they were passing Cloudflare Of Magic Transit Route their SIP Traffic , The Magic Transit Provide UDP DDoS Protect .
However , They still seem to have intermittent connections , Or sometimes it seems to be offline .
边栏推荐
- Implementation of a simple camera based on pyqt5
- A summary of the quantification of deep network model
- Using grpcui to test asp Net core grpc service
- A keepalived high availability accident made me learn it again!
- Where can I find a pre training model for pytoch model training?
- 33Mysql
- 【二叉树】最大二叉树 II
- Module import reload method
- Is it safe to open an account in Sinosteel futures?
- 006_ radio
猜你喜欢
Using face_ Recognition library reports an error reason: cudnn_ STATUS_ NOT_ SUPPORTED
AI落地制造业:智能机器人应具备这4种能力
Scala基础【入门及安装】
[MySQL 06] backup and restore MySQL database in Linux + docker container environment
Tencent released the first Office Photo 23 years ago. It's so chronological
AI landing manufacturing: intelligent robots should have these four abilities
一种跳板机的实现思路
Is the processor the main factor in buying a mobile phone?
【银河麒麟V10】【桌面】火狐浏览器设置主页不生效
004_ icon
随机推荐
MySQL monitoring 6
ROS Bridge 笔记(01)— apt 安装、源码编译安装、安装依赖、运行显示
013_ slider
[MySQL 05] SUSE 12 SP5 modifies the MySQL password for the first time after installing MySQL
Pytoch modifies the hook source code to obtain per layer output parameters (with layer name)
Illustration Google V8 19: asynchronous programming (II): how does V8 implement async/await?
Internet Crime Complaint Center reports an increase in DDoS Attacks
The birth of the cheapswap protocol
The (3n+1) conjecture that C language kills people without paying for their lives
DDoS "fire drill" service urges companies to prepare
Que se passe - t - il si un faux divorce devient un vrai divorce?
记录生产的一次OOM异常
[graph neural network] overview of graph classification learning [2]: graph classification based on graph neural network
Leetcode 46 Full arrangement (February 15, 2022)
A summary of the quantification of deep network model
[machine learning Q & A] cosine similarity, cosine distance, Euclidean distance and the meaning of distance in machine learning
Is the processor the main factor in buying a mobile phone?
图解 Google V8 # 19 :异步编程(二):V8 是如何实现 async/await 的?
Upload, use of Avatar
Radware warns about the next round of DDoS Attacks