ICANN looks at fast flux

| | Comments (2)
ICANN published a report on fast flux hosting.It's not new information (Jan 26 2009). I have been following this since the initial call for comments and the forums now prove an interesting read. As usual when someone tries to curb technology to prevent human criminal behavior it becomes interesting. Like many, I feel that tighter control over the registrars would offer a more viable route to control rogue domain activity. The EstDomains de-accreditation is one example of this.
The issue no-one seems to touch on however, is the potential for abuse that botnet C&C and other malware domains have after they are discarded, removed or expire.

2 Comments

well, for once, icann, ripe, msft, and a bunch of others are doing their job. the worm was made in my machines. i been pinging 2000 an hour 24/7 since feb, they now just started to address the real worm. the conficters were decoys, the main undetected worm uses bios/firmware/chipset/kernel to make a backdoor. the worm has a 24/7 connection waiting for the hacker to connect. it was built in my machine, and when i used a firewall, it used both sides of the connection to break through. when the dns situation gets fixed, they still have to fix the smartphone/phonetower hack that the hacker uses...

all sites no matter if they think are secure or not are still infected and the spam is coming from our own machines and they are connected somehow...

yahoo getting credit for beating the worm, but they havnt yet. when i connect, i get 100percent overseas attemps to get money out of me. its all on a server level. when i bought a new drive(wouldnt let me low level format), and a new cd drive, i was able to use my computer. that danielle guy that stole p2p.com is involved. the good news is that there is a shutoff code to remove all traces of the worm...

I removed your link since I'm 50/50 on whether you are genuine or not. Your fix could just as easy be a backdoor. I doubt the AV vendors would reject your material if you could back even part of it up with packet captures, file samples, md5sums or anything else. They are your target audience if you are genuine, otherwise you're just another scumbag using information warfare to spread malware...

End users should not download random fixes from random websites, wait for your AV vendor to release a fix.

No Clean Feed - Stop Internet Censorship in Australia
Creative Commons License
This weblog is licensed under a Creative Commons License.