Hey, Pete!
 
Here's Steve Linford's posting about the most-recent Denial of Service
against SpamHaus:
 
http://groups.google.ch/group/news.admin.net-abuse.email/msg/28d49877cc8
dbc2d
 
Meanwhile, the SARE and URIBL seem to be responsive now while suffering
under the same campaign, but their websites aren't back yet.  SURBL has
changed their DNS to point to the loopback address, presumably to blunt
the attack and turn them back on themselves.
 
Given Steve Linford's comment, I was wondering if some spammer's network
has been busy sending the SYN flood (and whatever else) at the expense
of sending spam, as evinced by a hypothetical drop in fast-flux spam
campaigns?
 
Or is the opposite true? Does a massive DDoS against one or more
antispam outfits act as cover while the bad guys try to send out new
campaigns while "protected" from the listings of the antispammers?
 
Andrew.
 
 
 
 
 
 
 

Reply via email to