nrw.social ist einer von vielen unabhängigen Mastodon-Servern, mit dem du dich im Fediverse beteiligen kannst.
Wir sind eine freundliche Mastodon Instanz aus Nordrhein-Westfalen. Ob NRW'ler oder NRW-Sympathifanten, jeder ist hier willkommen.

Serverstatistik:

2,8 Tsd.
aktive Profile

#DDoS

7 Beiträge7 Beteiligte3 Beiträge heute
Antwortete im Thread

@setto

things with second- and Nth-order effects on the material realm - e.g. protecting the environment - are already more difficult to coordinate.

but responsible use of one's own mind, identity, and comms channels? those are things that exist primarily in the information realm.

right now, they're a complete race-to-the-bottom free-for-all.

hence, the connection i draw between the language of #ai based #ddos of humans, and the language of interpersonal #abuse and #brainwashing.

Trust is the foundation of our digital world but what happens when it’s exploited?

Every day, we rely on trust: in the emails we open, the websites we browse, and the calls we answer. But #cybercriminals exploit this trust through #spoofing, a deceptive tactic that hijacks familiar names, brands, and channels to blur the line between legitimacy and fraud.

⚠️The consequences? Breaches, financial loss, and eroded confidence.

Read our latest article where we break down:
- The most common types of spoofing
- Its real-world impact
- How to defend yourself and your organization

🚨 Don’t wait until it’s too late.
Knowledge is your best defense: crowdsec.net/glossary/what-is-

crowdsec.netWhat Is Spoofing? | CrowdSecUnderstand what is spoofing, the types of spoofing methods, their devastating impact, and, how to protect yourself and your organization.

I have just taken the time to thoroughly read the following article

This article has led me to the conclusion that an Open{source} War will have to be waged against LLM large language model abusers of data collection.

The work of these bots is pure DDoS denial of service. An interesting set of offensive tools have been programmed and are already implemented. They have proven to be quite effective and are being refined into sophistication to literally work to knock these networks of bots offline, in a DOT MMORPG approach.

It is unthinkable that LLM bots steal our Open Source resources servers bandwidth and financial cashflow without serious repercussions!

WTF are LLM companies thinking? Even Meta has waged war against us!

LLM has waged a brutal war.

The Open Source Community is responding; even those at The Dark Side of the internet are making tools to assist everyone against Artificial Intelligence LLM DDoS attacks, which knock whole Open Source Networks offline, as we speak.

It doesn't matter if in the end it looks like a Terminator landscape globally on the IT scale. Open source will win. LLM will disappear...

#DDoS#LLM#bots

Via #LLRX @psuPete Recommends Weekly highlights on cyber security issues, 4/12/25 5 highlights - #Biometrics vs. #passcodes: What lawyers recommend if you’re worried about #warrantless phone searches; #DDoS Attacks Now Key Weapons in Geopolitical Conflicts, NETSCOUT Warns; #Google Maps doubles down on preventing fake reviews; Large number of US adults view #AI as a threat: Report; Explosive Growth of Non-Human Identities Creating Massive #Security Blind Spots llrx.com/2025/04/pete-recommen #privacy

Just wanted to share some thoughts on #RFC9715 - an #RFC that defines standards on reducing the #DNS issue of IP fragmentation over #UDP. It's not a long read, but a good one for everyone who understands the issues of large UDP responses on the #Internet. A great leap forward to (hopefully) reduce the reflection/amplification #DDoS potential of DNS.

Just today I learned that #Google will share their public DNS resolvers to limit to ~1400 bytes (smaller adjustments expected while figuring out the sweet spot in production). From now on, DNS responses which exceed this limit will have the truncated flag set instructing the client to resolve back to #TCP.

Had to adjust my .htaccess file today, because a SEO company had their bot trying to scrape my site. It didn't get further than the index-page, but it was comparable to a small DDoS, as in 5700 hits per minute.
Now let's hope the adjustment helps.
If it doesn't then their domain will be added to the firewall. And if they continue, I'll ask my lawyer to send a cease & desist. But for now: let's hope those motherfuckers stay away.

#ai#bots#seo

I'm having trouble figuring out what kind of botnet has been hammering our web servers over the past week. Requests come in from tens of thousands of addresses, just once or twice each (and not getting blocked by fail2ban), with different browser strings (Chrome versions ranging from 24.0.1292.0 - 108.0.5163.147) and ridiculous cobbled-together paths like /about-us/1-2-3-to-the-zoo/the-tiny-seed/10-little-rubber-ducks/1-2-3-to-the-zoo/the-tiny-seed/the-nonsense-show/slowly-slowly-slowly-said-the-sloth/the-boastful-fisherman/the-boastful-fisherman/brown-bear-brown-bear-what-do-you-see/the-boastful-fisherman/brown-bear-brown-bear-what-do-you-see/brown-bear-brown-bear-what-do-you-see/pancakes-pancakes/pancakes-pancakes/the-tiny-seed/pancakes-pancakes/pancakes-pancakes/slowly-slowly-slowly-said-the-sloth/the-tiny-seed

(I just put together a bunch of Eric Carle titles as an example. The actual paths are pasted together from valid paths on our server but in invalid order, with as many as 32 subdirectories.)

Has anyone else been seeing this and do you have an idea what's behind it?

#botnet#ddos#webscraping