📢 DDoS massif contre le site militant ICE List après l’annonce d’une fuite de 4 500 agents fédéraux
📝 Source: The Daily Beast (cité) — Contexte: un site militant (ICE List) a été visé par une attaque par déni de service distribu...
📖 cyberveille : https://cyberveille.ch/posts/2026-01-17-ddos-massif-contre-le-site-militant-ice-list-apres-lannonce-dune-fuite-de-4-500-agents-federaux/
🌐 source : https://hackread.com/ice-agent-doxxing-platform-ddos-attack/
#DDoS #ICE #Cyberveille
DDoS massif contre le site militant ICE List après l’annonce d’une fuite de 4 500 agents fédéraux

Source: The Daily Beast (cité) — Contexte: un site militant (ICE List) a été visé par une attaque par déni de service distribué alors qu’il s’apprêtait à publier des informations personnelles sur des agents fédéraux américains. • L’incident: le site ICE List (ICE List Wiki) a été mis hors ligne par une attaque DDoS massive débutée mardi soir de la semaine dernière, selon son fondateur, l’activiste néerlandais Dominick Skinner. L’attaque visait à empêcher la mise en ligne d’identités de milliers d’agents, notamment de U.S. Immigration and Customs Enforcement (ICE). 🔴

CyberVeille

Aisuru i Kimwolf – jak botnety zmieniają zasady w sieci i zarabiają na nas

Kto naprawdę zarobił na Aisuru i Kimwolf? Podpowiedź: nie tylko autorzy malware i na pewno nie twój dostawca internetu.

Czytaj dalej:
https://pressmind.org/aisuru-i-kimwolf-jak-botnety-zmieniaja-zasady-w-sieci-i-zarabiaja-na-nas/

#PressMindLabs #aisuru #androidtvbox #botnety #ddos #kimwolf

📰 Noction IRP v4.3 Launches with Automated DDoS Detection and Routing-Native Mitigation

Noction releases IRP v4.3 with Automatic Anomaly Detection! 🛡️ The new feature provides rapid, automated DDoS detection & mitigation using routing-native tools like BGP FlowSpec and RTBH to protect networks at the edge. #DDoS #BGP #NetOps #CyberSec...

🔗 https://cyber.netsecops.io/articles/noction-irp-v4-3-introduces-automated-ddos-detection-and-mitigation/?utm_source=mastodon&utm_…

Noction IRP v4.3 Launches with Automated DDoS Detection and Routing-Native Mitigation

Noction has released IRP v4.3, featuring Automatic Anomaly Detection (AAD) for rapid identification and mitigation of DDoS attacks using BGP FlowSpec and RTBH.

CyberNetSec.io
🌖 LWN.net 遭遇史上最強爬蟲攻擊:AI 數據掠奪引發的網站存亡危機
➤ 當 AI 訓練的數據飢渴演變成摧毀原創社羣的暴力
https://social.kernel.org/notice/B2JlhcxNTfI8oDVoyO
知名 Linux 技術媒體 LWN.net 近期正承受前所未有的分散式爬蟲攻擊。負責人 Jonathan Corbet 指出,這場涉及數萬個 IP 位址的攻擊嚴重拖慢了網站反應速度,推測是 AI 公司為了獲取訓練數據而不擇手段地抓取內容。雖然社羣成員提出了封鎖特定網段、強制用戶註冊或數據投毒等防禦方案,但 Corbet 仍陷入兩難:他既想保護網站不受這些「AI 渾蛋」破壞,又希望維持對新讀者的開放性與便利性。這場衝突凸顯了當前網路生態的殘酷現狀——原創內容不僅被掠奪,其服務真實用戶的能力也正被這些貪婪的機器摧毀。
+ AI 公司這種殺雞取卵的行為真的非常自私,他們正在摧毀自己賴以生存的高品質數據源。
+ 強烈支持針對惡意爬蟲回傳垃圾數據!既然他們要偷,就讓他們訓練出的模型徹底崩潰。
#網路安全 #AI 爬蟲 #DDoS 攻擊 #LWN #開源社羣
Jonathan Corbet (@corbet@social.kernel.org)

So @lwn is currently under the heaviest scraper attack seen yet. It is a DDOS attack involving tens of thousands of addresses, and that is affecting the responsiveness of the site, unfortunately. ...

📢⚠️ A coordinated DDoS attack knocked the ICE List site offline just as it prepared to publish thousands of ICE agent identities from an alleged DHS whistleblower dataset last week.

Read: https://hackread.com/ice-agent-doxxing-platform-ddos-attack/

#CyberAttack #DDoS #ICEList #DataLeak #ICE #Whistleblower

ICE Agent Doxxing Platform was Crippled After Coordinated DDoS Attack

Follow us on Bluesky, Twitter (X), Mastodon and Facebook at @Hackread

"Teardrop Falling" - A Deep House anthem against censorship & cyber warfare! First track in our cybersecurity series addressing DDoS attacks & the fight for digital freedom. Featuring AENDZI's haunting vocals. Stand strong against digital oppression!
Listen here: https://activ8te.io/links
#DeepHouse #cybersecurity #DDoS #freedom
API Payload Size Guard #reliability

YouTube

last night half a million IPs requested 1 million unique URLs from a website I run.

every single aspect of the crawl was randomised, a typical AI crawl.

except for two things... the HTTP accept header and that the country was all US.

as the accept header is more specific, that's what to block:

text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7

this is not a common accept header, very low percent of good traffic have this, but 100% of the attack had it.

block it in nginx.

if you're using Cloudflare, then the firewall rules don't offer to filter on accept, but I would recommend this:

(any(http.request.headers["accept"][*] eq "text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7"))

I've set that to a managed challenge.

#infosec #ddos #ai

Email received from Abuse @hetzner which originated from @certbund

Very very much appreciated !
Thanks for helping us to keep our services safe ❤️

P.S.: If you host service(s), please check if your machine is having rpcbind listening on tcp:111 😊

#datalove #ddos #dos #security #systemd #debian #ubuntu #proxmox

@evan

This would sound a little bit like spam...

I already experience one instance, where i follow one account and get all posts of all accounts on that instance (sent to my instance). (And i'm thinking about to maybe need to block this instance...)

At the end, such behaviour would end up in a kind of #DDOS for the whole #Fediverse.

Imagine, you operate a small instance and you had to deal with all incoming public activities from all instances, that are aware of your small instance...

It would put a lot of load on the sender(s) and the receiver(s).

Just thinking about mastodon.social with more than three millions registered user accounts... i already see how many delete activities my instance(s) get from this one instance. Getting everything... no...

So this behaviour would disturb a lot... and would lead to blocks...

So i'm "No, but..."... there may exist single tasks, where sending to all known instances would appropriate... but not as a normal default behaviour.