veganism.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Veganism Social is a welcoming space on the internet for vegans to connect and engage with the broader decentralized social media community.

Administered by:

Server stats:

297
active users

#DDOS

11 posts10 participants0 posts today

I'm having trouble figuring out what kind of botnet has been hammering our web servers over the past week. Requests come in from tens of thousands of addresses, just once or twice each (and not getting blocked by fail2ban), with different browser strings (Chrome versions ranging from 24.0.1292.0 - 108.0.5163.147) and ridiculous cobbled-together paths like /about-us/1-2-3-to-the-zoo/the-tiny-seed/10-little-rubber-ducks/1-2-3-to-the-zoo/the-tiny-seed/the-nonsense-show/slowly-slowly-slowly-said-the-sloth/the-boastful-fisherman/the-boastful-fisherman/brown-bear-brown-bear-what-do-you-see/the-boastful-fisherman/brown-bear-brown-bear-what-do-you-see/brown-bear-brown-bear-what-do-you-see/pancakes-pancakes/pancakes-pancakes/the-tiny-seed/pancakes-pancakes/pancakes-pancakes/slowly-slowly-slowly-said-the-sloth/the-tiny-seed

(I just put together a bunch of Eric Carle titles as an example. The actual paths are pasted together from valid paths on our server but in invalid order, with as many as 32 subdirectories.)

Has anyone else been seeing this and do you have an idea what's behind it?

So apart from the attempt to open a lot of Facebook accounts using my domain, my site has also been under sporadic DDoS attacks. I hope you don't have too much trouble connecting at times.

And no, I have no idea who I ticked off now. 😂

Nachdem diverse #ki #ai #crawler besonders respektvoll mit den öffentlichen Ressourcen von Open Source Projekten umgehen, habe ich mich dazu entschlossen eben diese auszusperren. Wir hatten in der Vergangenheit crawls, die im #monitoring als #ddos gewertet wurden.

Diverse AS erfreuen sich nun einem dauerhaften 429, einige wenige die es für alle kaputt machen…

[related]
Article intéressant sur les alliances d’intérêts — ici contre la France — entre groupuscules de mercenaires, avec un petit twist sur ceux qui concentrent leur attention sur les SCADA (infra critiques)
⬇️
"Hacktivists Increasingly Target France for Its Diplomatic Efforts"
"Pro-Russian and pro-Palestinian hacktivist groups share a common adversary in France, leading to coordinated cyberattacks against the country."
👇
cyble.com/blog/hacktivists-fra

& concernant z-pentest et les systèmes de contrôle :
cyble.com/blog/russian-hacktiv

Ce phénomène de mise en commun des ressources pour optimiser les attaques est en forte accélération ces derniers mois.
Côté oursons sans nom, la stratégie de coordination s’est clairement déployée depuis l’an dernier — notamment pour muscler les attaques DDOSIA Layer 7 avec des botnets Mirai "propriétaires" en mode amplification réseau
⬇️
"The Rise of Alliances: NoName057(16)'s Transformation in 2024"
👇
radware.com/security/threat-ad

(cela dit, derrière ces danses en ligne, restent des visages — et des relations — qui commencent à se dessiner / doxer plus clairement :
molfar.com/en/blog/russian-cyb )

#CyberVeille
#DDoS

Cyble · Hacktivists Increasingly Target France for Its Diplomatic EffortsBy Paul Shread

«There’s been something of an epidemic of malicious bots on the internet these days. You may have seen a post recently titled “Please stop externalizing your costs directly into my face“, or “FOSS infrastructure is under attack by AI companies“. Those are all happening to us, too. Surprise.»

TCRF has been getting DDoSed – Xkeeper's blog - blog.xkeeper.net/uncategorized

blog.xkeeper.netTCRF has been getting DDoSed – Xkeeper's blog