←back to thread

92 points jtbayly | 2 comments | | HN request time: 0.001s | source
Show context
chrismorgan ◴[] No.45858614[source]
> Aisuru switched to invoking Cloudflare’s main DNS server — 1.1.1.1

I don’t suppose they use DNS to find their command-and-control servers? It’d be funny if Cloudflare could steal the botnet that way. (For the public good. I know that actually doing such a thing would raise serious concerns. Never know, maybe there would be a revival of interest in DNSSEC.) I remember reading a case within the last few years of finding expired domains in some malware’s list of C2 servers, and registering them in order to administer disinfectant. Sadly, IoT nonsense probably can’t be properly fixed, so they could probably reinfect it even if you disinfected it.

replies(3): >>45858651 #>>45858963 #>>45859757 #
1. vpShane ◴[] No.45858963[source]
This wouldn't raise serious concerns. Ask the customers/community if doing it before hand is something they agree with in some form of poll, then just do it. At the end of the day DNS is a million years old, out-dated and the mission is to help make a better internet. If Cloudflare straight up asked us all if it was cool to modify their DNS servers to identify / disrupt malicious use from botnets I'd agree. People not using DoH or internal things like dnscrypt-proxy need to get with the times.

There's ethical ways to do things: https://www.justice.gov/archives/opa/pr/court-authorized-ope...

I'm not saying I agree with it but we're all engineers, the internet and everything built on it was engineered, to put up with script kiddies and hacked computers and not-so-tech-savvy internet citizens using their devices and installing Infatica, and other malware/proxy services on their devices because it came within the agreement for installing some free app where their kids could 'pop bubbles' on their parents phones or some free desktop app included it; then distinguishing their IP addresses and IP-scores as they blend in with their regular human traffic makes it hard to block it. Ain't nobody got time for whack-a-mole internet, families and businesses will need to secure their networks.

Honestly I'd be ok with an up-to-date live list of all known infected IP addresses and their last timestamp for what, and who detected them as a bot/malicious IP address so I could just use some simple ipsets and iptables, or make a simple script to disallow things like posting, interactions while still allowing them to see content on websites would be ideal. Add a little banner 'you're infected, or somebody on your network is infected, this is how to fix it and practice best security, and more info on the subject'

These services switched from DDoS/attacks to renting out their hacked network spaces. They don't need to be making bank at our expense.

replies(1): >>45860172 #
2. catlikesshrimp ◴[] No.45860172[source]
My ISP shares its residential IP pool with a middle east country (I can't remember which) users. God knows what those users are doing, but whenever "our" part of the pool is switched with "theirs", I get many more captchas, blocked websites and strange content suggestions.

"We" could pay for VPN access, but paying for the connection twice (local ISP and vpn ISP) adds up. And now the ball is in the VPN provider court.