APWG and M3AAWG Survey Finds ICANN WHOIS Changes Impede Cyber Investigations
Conservative abuse reporting throws new TLD program under the bus

Network hijacking: everything old is new again

My friends at Spamhaus published a fine summary of several types of network hijacking attacks, see Network hijacking: the low down.

image from securityskeptic.typepad.comI wrote a series of posts, Internet address hijacking, spoofing and squatting attacks in 2011. This series of articles explores attacks that exploit the Internet’s routing system in this manner. The series also describes the motives for such attacks, classifies the attacks based on certain distinguishing characteristics, and suggests measures that can be taken to mitigate attacks of these kinds. 

Mine is a good complement to Spamhaus' assessment of the current hijacking landscape if you're interested in digging deeper.

It's depressing that many of the 2011 attack forms remain popular today. 

We really don't learn very well, or very fast, do we?

Comments

Feed You can follow this conversation by subscribing to the comment feed for this post.

Verify your Comment

Previewing your Comment

This is only a preview. Your comment has not yet been posted.

Working...
Your comment could not be posted. Error type:
Your comment has been saved. Comments are moderated and will not appear until approved by the author. Post another comment

The letters and numbers you entered did not match the image. Please try again.

As a final step before posting your comment, enter the letters and numbers you see in the image below. This prevents automated programs from posting comments.

Having trouble reading this image? View an alternate.

Working...

Post a comment

Comments are moderated, and will not appear until the author has approved them.

Your Information

(Name is required. Email address will not be displayed with the comment.)