AS long time readers of this list know, I like to once in a while share
what we are seeing happening in the world, from our Spam Auditor reports
and other data sets..
Have to start off by saying, we have seen a marked drop in spam leakage
from GMAIL over the last couple of weeks, and while it may have
something to do with custom rejection tools for the most common types of
leakage/permitted spam/marketing, I would LIKE to think they have made
some improvements, and commend them.
And while of course some of the same actors names keep coming up, a
marked increase of bad sign-ups at some hosting providers recently,
shows new player activity in this space.
Hostwinds, Digital Ocean, Krypt and OVH et all continue to show daily
new activity from spammers, but some of the IoT big spam bots appear to
have reduced, probably because of some very public take downs of some C2
networks.
But the hackers are always changing tactics... The huge increase of
hacking attacks from Azure, Amazon E2C, and GoogleCloud is an example of
that, and one can only wonder if it is the slow take down cycles that is
making that so attractive to hackers.
And of course OVH, from which still large swathes of IP(s) are engaged
in brute force attacks, with little or no action.
When it comes to IoT attacks, there is still a large problem coming from
Asia and Eastern Europe and South America, primarily from router hacks
and older Windows installation base, and many ISP's in those areas are
still not blocking Port 25 on Egress.
But it does seem that some actors prefer to use one geographic area over
another.. Eg, someone really likes the Kazikstan, Uzbekistan regions..
another likes Vietnam, and another likes Central/South America, probably
due to vendor penetration in an area, and which devices the hacker group
targetted.
And we are anoctodally seeing an escalation of threat actors from the
India/Pakistan regions, whether the sheer number of IoT devices making
it attractive, or by regional actors increasingly getting IP space and
leap frogging through/on North American hosting companies..
And of course, you have to wonder when large swathes of network space
are all engaged in the same activities.. how accidental or coincidental
is it? Trends like this will only result in much more restrictive
internet 'siloing' or outright 'blackhole' if the trend doesn't reverse..
149.56.44.224 x5 224.ip-149-56-44.net
149.56.44.225 x4 225.ip-149-56-44.net
149.56.44.229 x11 229.ip-149-56-44.net
149.56.44.230 x11 230.ip-149-56-44.net
149.56.44.244 x24 244.ip-149-56-44.net
149.56.44.250 x21 250.ip-149-56-44.net
149.56.45.11 x2 11.ip-149-56-45.net
149.56.45.112 x19 112.ip-149-56-45.net
149.56.45.113 x29 113.ip-149-56-45.net
149.56.45.12 x3 12.ip-149-56-45.net
149.56.45.121 x38 121.ip-149-56-45.net
149.56.45.122 x4 122.ip-149-56-45.net
149.56.45.129 x35 129.ip-149-56-45.net
149.56.45.130 x30 130.ip-149-56-45.net
149.56.45.15 x10 15.ip-149-56-45.net
149.56.45.154 x11 154.ip-149-56-45.net
149.56.45.156 x11 156.ip-149-56-45.net
149.56.45.157 x28 157.ip-149-56-45.net
149.56.45.16 x29 16.ip-149-56-45.net
149.56.45.167 x26 167.ip-149-56-45.net
149.56.45.182 x42 182.ip-149-56-45.net
149.56.45.187 x32 187.ip-149-56-45.net
149.56.45.195 x30 195.ip-149-56-45.net
149.56.45.199 x30 199.ip-149-56-45.net
149.56.45.28 x4 28.ip-149-56-45.net
149.56.45.29 x15 29.ip-149-56-45.net
149.56.45.31 x11 31.ip-149-56-45.net
149.56.45.37 x6 37.ip-149-56-45.net
149.56.45.4 x20 4.ip-149-56-45.net
149.56.45.48 x4 48.ip-149-56-45.net
149.56.45.52 x35 52.ip-149-56-45.net
149.56.45.54 x28 54.ip-149-56-45.net
149.56.45.57 x29 57.ip-149-56-45.net
149.56.45.69 x32 69.ip-149-56-45.net
149.56.45.89 x28 89.ip-149-56-45.net
149.56.45.92 x30 92.ip-149-56-45.net
149.56.45.93 x11 93.ip-149-56-45.net
Our team has even been forced to create special rule sets for ANY
activity from some networks, when 99% of the activity detected is part
of the threat landscapes. But in the long run, this MAY harm legitimate
users of those networks. And truly a waste of valuable IPv4 space.
I always thought the Internet netizens would do a better job of self
policing, but I am afraid that little has changed in 20 years.. With a
commercial motive to do so, network operators still treat outbound
threats very low on the priority lists.
Any ways, this is my weekend thoughts and reports, from looking through
reports and records this week..
Have a safe and happy weekend..
--
"Catch the Magic of Linux..."
------------------------------------------------------------------------
Michael Peddemors, President/CEO LinuxMagic Inc.
Visit us at http://www.linuxmagic.com @linuxmagic
A Wizard IT Company - For More Info http://www.wizard.ca
"LinuxMagic" a Registered TradeMark of Wizard Tower TechnoServices Ltd.
------------------------------------------------------------------------
604-682-0300 Beautiful British Columbia, Canada
This email and any electronic data contained are confidential and intended
solely for the use of the individual or entity to which they are addressed.
Please note that any views or opinions presented in this email are solely
those of the author and are not intended to represent those of the company.
_______________________________________________
mailop mailing list
[email protected]
https://chilli.nosignal.org/cgi-bin/mailman/listinfo/mailop