I’m also curious if they did as promised. I read this today: https://beta.darkreading.com/threat-intelligence/-fancy-lazarus-criminal-group-launches-ddos-extortion-campaign
Best. On Wed, Jun 9, 2021 at 8:35 AM Edvinas Kairys <edvinas.em...@gmail.com> wrote: > Hey, > > Did you get the attack promised ? after 1 week after notice ? > > Today we've been warned and got some udp flood for 3 hours. > > On Tue, May 25, 2021 at 2:14 PM Jean St-Laurent via NANOG <nanog@nanog.org> > wrote: > >> I don’t believe that these companies are complicit at high level. >> >> My guess is that there are some business salesmen working there that >> needs to fulfill their monthly quota of new clients. >> >> >> >> What is usually common, is that when face by a DDoS for the first time >> without the proper tooling, it sounds like it’s an impossible task to >> solve. The knowledge on internet is pretty limited on the topic. >> >> It takes months and sometimes years to configure all the DDoS gates. >> Rolland’s ppt is a nice place to start as it has valuable knowledge. It’s >> just tough to figure out what is best for you. >> >> >> >> The truth is, it will be more beneficial to your organisation in the >> medium/long term if you start learning and improving your DDoS defenses now >> than to rely 100% on DDoS mitigators. >> >> These companies are fantastic when you protect slow assets like Credit >> card transactions. The customer don’t really care if his transaction to >> validate the CC takes 4 seconds instead of 3. >> >> >> >> In the end, DDoS mitigations is not more complex than what you are used >> to do daily. Protect your routers, protect the control-plane, protect the >> SSH lines, etc. It’s just a different kind of protections. >> >> >> >> Let me know if you need some advices or hints, because I’ve spent some >> freaking long hours fighting them and together we have a better chance to >> win and not pay ransom from blackmails. >> >> I don’t have all the answers on DDoS, but maybe I have the one that you >> are looking for. >> >> >> >> The moment you become very resilient to DDoS attacks, your customers will >> thank you and also support staff that will see the DDoS bounce like >> mosquitoes on the windshield of your car at 90 Mph. >> >> >> >> Start learning now and start improving your DDoS. This won’t go away >> anytime soon. >> >> >> >> Jean >> >> >> >> >> >> *From:* jim deleskie <deles...@gmail.com> >> *Sent:* May 24, 2021 12:38 PM >> *To:* Jean St-Laurent <j...@ddostest.me> >> *Cc:* NANOG Operators' Group <nanog@nanog.org> >> *Subject:* Re: DDoS attack with blackmail >> >> >> >> While I have no design to engage in over email argument over how much >> latency people can actually tolerate, I will simply state that most people >> have a very poor understanding of it and how much additional latency is >> really introduced by DDoS mitigation. >> >> >> >> As for implying that DDoS mitigation companies are complicit or involved >> in attacks, while not the first time i heard that crap it's pretty >> offensive to those that work long hours for years dealing with the >> garbage. If you honestly believe anyone your dealing with is involved with >> launching attacks you clearly have not done your research into potential >> partners. >> >> >> >> >> >> >> >> On Sat., May 22, 2021, 11:20 a.m. Jean St-Laurent via NANOG, < >> nanog@nanog.org> wrote: >> >> Some industries can’t afford that extra delay by DDoS mitigation vendors. >> >> >> >> The video game industry is one of them and there might be others that >> can’t tolerate these extra ms. Telemedicine, video-conference, fintech, etc. >> >> >> >> As a side note, my former employer in video game was bidding for these >> vendors offering DDoS protection. While bidding, we were hit with abnormal >> patterns. As soon as we chose one vendors those very tricky DDoS patterns >> stopped. >> >> I am not saying they are working on both side, but still the coincidence >> was interesting. In the end, we never used them because they were not able >> to perfectly block the threat without impacting all the others projects. >> >> >> >> I think these mitigators are nice to have as a very last resort. I >> believe what is more important for Network Operators is: to be aware of >> this, to be able to detect it, mitigate it and/or minimize the impact. It’s >> like magic, where did that rabbit go? >> >> >> >> The art of war taught me everything there is to know about DDoS attacks >> even if it was written some 2500 years ago. >> >> >> >> I suspect that the attack that impacted Baldur’s assets was a very easy >> DDoS to detect and block, but can’t confirm. >> >> >> >> @Baldur: do you care to share some metrics? >> >> >> >> Jean >> >> >> >> *From:* NANOG <nanog-bounces+jean=ddostest...@nanog.org> *On Behalf Of *Jean >> St-Laurent via NANOG >> *Sent:* May 21, 2021 10:52 AM >> *To:* 'Lady Benjamin Cannon of Glencoe, ASCE' <l...@6by7.net>; 'Baldur >> Norddahl' <baldur.nordd...@gmail.com> >> *Cc:* 'NANOG Operators' Group' <nanog@nanog.org> >> *Subject:* RE: DDoS attack with blackmail >> >> >> >> I also recommend book Art of War from Sun Tzu. >> >> >> >> All the answers to your questions are in that book. >> >> >> >> Jean >> >> >> >> *From:* NANOG <nanog-bounces+jean=ddostest...@nanog.org> *On Behalf Of *Lady >> Benjamin Cannon of Glencoe, ASCE >> *Sent:* May 20, 2021 7:18 PM >> *To:* Baldur Norddahl <baldur.nordd...@gmail.com> >> *Cc:* NANOG Operators' Group <nanog@nanog.org> >> *Subject:* Re: DDoS attack with blackmail >> >> >> >> 20 years ago I wrote an automatic teardrop attack. If your IP spammed us >> 5 times, then a script would run, knocking the remote host off the internet >> entirely. >> >> >> >> Later I modified it to launch 1000 teardrop attacks/second… >> >> >> >> Today, contact the FBI. >> >> >> >> And get a mitigation service above your borders if you can. >> >> >> >> >> >> —L.B. >> >> >> >> Ms. Lady Benjamin PD Cannon of Glencoe, ASCE >> >> 6x7 Networks & 6x7 Telecom, LLC >> >> CEO >> >> l...@6by7.net >> >> "The only fully end-to-end encrypted global telecommunications company in >> the world.” >> >> FCC License KJ6FJJ >> >> >> >> >> On May 20, 2021, at 12:26 PM, Baldur Norddahl <baldur.nordd...@gmail.com> >> wrote: >> >> >> >> Hello >> >> >> >> We got attacked by a group that calls themselves "Fancy Lazarus". They >> want payment in BC to not attack us again. The attack was a volume attack >> to our DNS and URL fetch from our webserver. >> >> >> >> I am interested in any experience in fighting back against these guys. >> >> >> >> Thanks, >> >> >> >> Baldur >> >> >> >> >> >> -- Brandon Svec 15106862204 ☎️ or 💬