It sounds like you want something like this:
https://github.com/facebookarchive/fbtracert
We have an internal tool that works on generally similar principles, works
pretty well.
( I have no relationship with Facebook; I just always remember their presos
on UDPinger and FBTracert from my first NA
I had a bit of an odd one this morning, I received two emails through
contacts listed in whois subject: "Urgent: Threat actor in systems" from
"e...@ic.fbi.gov". I was all set to ignore them as an odd bit of spam
but did a quick check on the headers and was surprised to see it had
valid dkim a
> On Nov 13, 2021, at 5:02 PM, Glenn McGurrin via NANOG wrote:
>
> I had a bit of an odd one this morning
It’s this:
https://www.engadget.com/fbi-email-server-hack-221052368.html
-Bill
signature.asc
Description: Message signed with OpenPGP
> Date: Monday, November 15, 2021 10:14:30 -0500
> From: Christopher Morrow
>
> https://www.washingtonpost.com/nation/2021/11/14/fbi-hack-email-cyb
> erattack/
>
> On Mon, Nov 15, 2021, 09:56 Glenn McGurrin wrote:
>
>> I had a bit of an odd one this morning, I received two emails
>> through c
Quite a bit of discussion on the outages mailing list. It was an
exploited HTML form on the FBI site.
The text reminds me of the Turboencabulator data sheet.
Full body of the email:
Our intelligence monitoring indicates exfiltration of several of your
virtualized clusters in a sophisticated c
> Quite a bit of discussion on the outages mailing list. It was an exploited
> HTML form on the FBI site.
That's a flashback to the '90s :)
Sander
FYI.
Mark.
Forwarded Message
Subject:[APRICOT-PC-Chairs] APRICOT 2022 Call for Presentations
Date: Thu, 7 Oct 2021 21:16:43 +1000
From: Philip Smith
Reply-To: APRICOT PC Chairs
Organization: Asia Pacific Regional Conference on Operational Technologies
To:
7 matches
Mail list logo