Used by nation-states and crime groups, fast flux bypasses many common defenses.
See full article...
See full article...
bypasses many common defenses.
^ This.It's absolutely impossible to be worried about national security issues like this when the people running the entire national security apparatus are incompetent buffoons who don't even know how classified information works. The NSA should issue some warnings about that.
Until they get serious about the appalling national security threat that is the Trump administration I can't have any confidence in anything they say. You want me to be worried about ransomware? Fine. Put some people in charge who are actually qualified to protect us from all this scary shit.
The bad people are lining up to do us harm because they know the people in charge are asleep at the wheel, or worse, ready to join them in their bad deeds.
"He-Who-Must-Not-Be-Named" we have come to this.^ This.
I work for Meta (Facebook), and we're now helping the government track anyone who uses the word"protest".Our government seems more worried about their own citizens getting upset, than they seem to be worried about outside threats. I am glad someone within the NSA is doing their job and put out this notice, but I doubt most of the people running things care, or would know what the true threat is.
^ This.
I work for Meta (Facebook), and we're now helping the government track anyone who uses the word "protest". Our government seems more worried about their own citizens getting upset, than they seem to be worried about outside threats. I am glad someone within the NSA is doing their job and put out this notice, but I doubt most of the people running things care, or would know what the true threat is.
Now I'm curious. If you know this to be true and disagree with it, why are you still working there?^ This.
I work for Meta (Facebook), and we're now helping the government track anyone who uses the word "protest". Our government seems more worried about their own citizens getting upset, than they seem to be worried about outside threats. I am glad someone within the NSA is doing their job and put out this notice, but I doubt most of the people running things care, or would know what the true threat is.
Can you provide any more details? That's quite the thing to drop causally in a commentwork for Meta (Facebook), and we're now helping the government track anyone who uses the word "protest".
Oh, you're not wrong. But if you check your inbox lately, everything from Facebook, Google, Amazon, Uber, Lyft, GrubHub, InstaCart, Twitch, Twitter, Reddit, and more, have been updating their privacy policies and terms of services the past month or so. We are far from alone, and you're right it is dangerous.The true threat is companies like yours that played a big part into making the current administration happen.
It's not clear from either of the diagrams how bad actors can rapidly change the domain name 'malwaredomain.com' to avoid detection.Fast flux works by cycling through a range of IP addresses and domain names that these botnets use to connect to the Internet.
They pay me.Now I'm curious. If you know this to be true and disagree with it, why are you still working there?
Not trying to be a jerk. Not trying to be sanctimonious. What practical reasons have kept you in place?
Generally, it's not malwaredomain.com, it's dynamically generated asdfrq3tewrt3tfsrd.info domains where the malware that's initially dropped has a domain generation algorithm. Then the attackers register one of the domains, and when the malware cycles through the options, it eventually hits the valid domain, at which point the IP resolution kicks in, and the query is resolved to one of the many possible IPs. This IP then sends new data back to the victim, which can even involve an IP lookup table that's only valid for a few hours and bypasses further DNS lookups altogether. The next time the malware calls home to the IP, it's assigned a new IP for the next callhome. As a result, it's really difficult to pin down a specific C2 server, even though it's often the same actual server (or botnet) on the other end sending the information.From the article (bolded for emphasis):
It's not clear from either of the diagrams how bad actors can rapidly change the domain name 'malwaredomain.com' to avoid detection.
If the secret sauce of this technique is related to how wildcard records in DNS redirect to non-existent subdomains, then that should be explained a bit better.
Thank you for taking the time to explain that.Generally, it's not malwaredomain.com, it's dynamically generated asdfrq3tewrt3tfsrd.info domains where the malware that's initially dropped has a domain generation algorithm. Then the attackers register one of the domains, and when the malware cycles through the options, it eventually hits the valid domain, at which point the IP resolution kicks in, and the query is resolved to one of the many possible IPs. This IP then sends new data back to the victim, which can even involve an IP lookup table that's only valid for a few hours and bypasses further DNS lookups altogether. The next time the malware calls home to the IP, it's assigned a new IP for the next callhome. As a result, it's really difficult to pin down a specific C2 server, even though it's often the same actual server (or botnet) on the other end sending the information.
This technique is effective against protections that depend on (sometimes temporarily) blocklisting IP addresses based on activity, reputation or known malware sources. So as usual, defense in depth is important.
This is not true, it is more difficult but not impossible.. In the incident response field we've seen a drop in notifications about Russian actors but there are still many within DISA and other organizations trying their hardest to do the right thing. And it is important. Just because the head of the US government is rotten does not mean that the rest of government is rotten and certainly all of us that interface with those resources are still in the fight for the right reasons.It's absolutely impossible to be worried about national security issues like this when the people running the entire national security apparatus are incompetent buffoons who don't even know how classified information works. The NSA should issue some warnings about that.
Until they get serious about the appalling national security threat that is the Trump administration I can't have any confidence in anything they say. You want me to be worried about ransomware? Fine. Put some people in charge who are actually qualified to protect us from all this scary shit.
The bad people are lining up to do us harm because they know the people in charge are asleep at the wheel, or worse, ready to join them in their bad deeds.
At a wild guess, how about earning money like 99.99% of the population?Now I'm curious. If you know this to be true and disagree with it, why are you still working there?
Not trying to be a jerk. Not trying to be sanctimonious. What practical reasons have kept you in place?
This is a great boil down. Not that anyone is ceasing blocking by domains and IP space as not all threat actors are so dynamic, but the days of relying on it are well gone.Generally, it's not malwaredomain.com, it's dynamically generated asdfrq3tewrt3tfsrd.info domains where the malware that's initially dropped has a domain generation algorithm. Then the attackers register one of the domains, and when the malware cycles through the options, it eventually hits the valid domain, at which point the IP resolution kicks in, and the query is resolved to one of the many possible IPs. This IP then sends new data back to the victim, which can even involve an IP lookup table that's only valid for a few hours and bypasses further DNS lookups altogether. The next time the malware calls home to the IP, it's assigned a new IP for the next callhome. As a result, it's really difficult to pin down a specific C2 server, even though it's often the same actual server (or botnet) on the other end sending the information.
This technique is effective against protections that depend on (sometimes temporarily) blocklisting IP addresses based on activity, reputation or known malware sources. So as usual, defense in depth is important.
Sounds like we need to develop some AI bots that make random posts with keywords that will attract attention and fill up the buffers of the automation and selected posts for escalation.Can you provide any more details? That's quite the thing to drop causally in a comment
Generally, it's not malwaredomain.com, it's dynamically generated asdfrq3tewrt3tfsrd.info domains
Not sure I follow. The threat actor just needs to spin a couple of the domains up, deploy the malware, and then start the process of registering new domains and dropping the old ones.How do these spread fast enough for the infected clients to resolve them, shouldn't DNS propagation take several hours? Or is that not long enough to detect the malware nature of the site.
If a DNS relay server can recognize such generated domain names (vs just longer but valid domains), then maybe it can track any connection attempts to it and identify some of the client IPs. Not that this would help with subsequent DNS-free lookups, but might be easier to follow up with government or company domains where bad clients can then be kicked off the network.
Fixed that for youJust in time: Dir NSA (and head of US Cyber Command) was just firedon the recommendation ofby Laura Loomer.
https://www.theguardian.com/us-news...-reported-dismissal-of-nsa-director-tim-haugh
Extraordinary claims require at least some evidence. This would be of enormous interest to lots of people with significant legal resources and it doesn't seem to be on anybody's radar. If it is real and you're blabbing it, well then, goodluckwiththat.^ This.
I work for Meta (Facebook), and we're now helping the government track anyone who uses the word "protest". Our government seems more worried about their own citizens getting upset, than they seem to be worried about outside threats. I am glad someone within the NSA is doing their job and put out this notice, but I doubt most of the people running things care, or would know what the true threat is.
I've wondered why registrars don't do entropy checking, but I guess there's plenty of dodgy TLDs and registrars it isn't a concern.Generally, it's not malwaredomain.com, it's dynamically generated asdfrq3tewrt3tfsrd.info domains where the malware that's initially dropped has a domain generation algorithm. Then the attackers register one of the domains, and when the malware cycles through the options, it eventually hits the valid domain, at which point the IP resolution kicks in, and the query is resolved to one of the many possible IPs. This IP then sends new data back to the victim, which can even involve an IP lookup table that's only valid for a few hours and bypasses further DNS lookups altogether. The next time the malware calls home to the IP, it's assigned a new IP for the next callhome. As a result, it's really difficult to pin down a specific C2 server, even though it's often the same actual server (or botnet) on the other end sending the information.
This technique is effective against protections that depend on (sometimes temporarily) blocklisting IP addresses based on activity, reputation or known malware sources. So as usual, defense in depth is important.
Extraordinary claims require at least some evidence. This would be of enormous interest to lots of people with significant legal resources and it doesn't seem to be on anybody's radar. If it is real and you're blabbing it, well then, goodluckwiththat.
Otherwise I will keep up a level of significant doubt.
Maybe you should ask Waltz for Goldberg’s phone number.^ This.
I work for Meta (Facebook), and we're now helping the government track anyone who uses the word "protest". Our government seems more worried about their own citizens getting upset, than they seem to be worried about outside threats. I am glad someone within the NSA is doing their job and put out this notice, but I doubt most of the people running things care, or would know what the true threat is.
And that's why I deleted my account.^ This.
I work for Meta (Facebook), and we're now helping the government track anyone who uses the word "protest". Our government seems more worried about their own citizens getting upset, than they seem to be worried about outside threats. I am glad someone within the NSA is doing their job and put out this notice, but I doubt most of the people running things care, or would know what the true threat is.
Yeah uh when most people say ''I don't like my job'' it's because it's boring. Not because they're part of destroying civilization.So for now, this will do. I may not like it, but as messed up as it is, most people don't always like their job.
Let me give you some https://specificsuggestions.comThey pay me.
I am 44 years, and most of my work history no longer exist because many of the places I worked for went out of business years ago. I am not a young guy fresh out of college that most places are going to take a chance on or be eager to higher as a trainee.
Additionally, because I work for an overseas division of Meta, I still am working remotely from home, and do not need to deal with the usual workplace drama or politics. My manager is on the other side of the planet, and we've not spoken in months.
My company is awful. My hours are long, and the pay is not the greatest, but I do have the best benefits than I ever have had in my life (no co-pays, for example). So for now, this will do. I may not like it, but as messed up as it is, most people don't always like their job.