[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Tier1 ISP]: Vulnerable to a new DDoS amplification attack
- Subject: [Tier1 ISP]: Vulnerable to a new DDoS amplification attack
- From: beecher at beecher.cc (Tom Beecher)
- Date: Wed, 21 Dec 2016 22:23:55 -0500
- In-reply-to: <[email protected]>
- References: <[email protected]>
NTP Monlist was what, 200x? 100x amplification attacks are soooo 2013. :)
I doubt many will fall for your Rolodex expanding exercise though, sorry. (
Do people still have Rolodexes? )
On Wed, Dec 21, 2016 at 11:05 AM, Jean | ddostest.me via NANOG <
nanog at nanog.org> wrote:
> Hello all, I'm a first time poster here and hope to follow all rules.
> I found a new way to amplify traffic that would generate really high
> volume of traffic.+10Tbps
> ** There is no need for spoofing ** so any device in the world could
> initiate a really big attack or be part of an attack.
> We talk about an amplification factor x100+. This mean that a single
> computer with 1 Gbps outgoing bandwidth would generate a 100 Gbps DDoS.
> Imagine what a botnet could do?
> The list of affected business is huge and I would like to privately
> disclose the details to the Tier1 ISP as they are highly vulnerable.
> XO Comm
> Level 3
> Windstream Comm
> MCI Comm/Verizon Buss
> Comcast Cable Comm
> I know it's Christmas time and there is no rush in disclosing this but, it
> could be a nice opportunity to meditate and shed some lights on this new
> DDoS threat. We could start the real work in January.
> If you are curious and you operate/manage one of the network mentioned
> above, please write to me at tornaddos at ddostest.me from your job email to
> confirm the identity. I will then forward you the DDoS details.
> Best regards
> Jean St-Laurent
> 365 boul. Sir-Wilfrid-Laurier #202
> Beloeil, QC J3G 4T2