Botnets Hit Perl Testers With Denial of Service Attack

According to a posting on the CPAN Testers’ blog, the CPAN Testers’ server has been being aggressively scanned by “20-30 bots every few seconds” in what they call “a dedicated denial of service attack”; these bots “completely ignore the rules specified in robots.txt”. Read the full article. [The H Security]

According to a posting on the CPAN Testers’ blog, the CPAN Testers’ server has been being aggressively scanned by “20-30 bots every few seconds” in what they call “a dedicated denial of service attack”; these bots “completely ignore the rules specified in robots.txt”. Read the full article. [The H Security]

Suggested articles

Discussion

  • Anonymous on

    The problem has been caused by Microsoft's spidering bots, not a botnet, per se.

  • Anonymous on

    believe it or not, my systems are the command and control center for the botnet, i can tell ya all about it and all my experiments.  everytime i found a way to bypass the bot, it would immediatly adjust.  been fighting it since aug 2008.  i been pinging over 2000 an hour 24/7 since febuary.  its linked 100percent to the tcp/ip 6.   when it all started, i was getting dns errors every 30 min 24/7 for months on end.  the lags that go on for 2 or 3 days at a time are not from the OS, they are kernel or higher.  the main botbet used the conficters as decoys even though it consist of all conficters combined and is undetectable.  as time goes on, i learn more and more and can tell ya the history of the birth of it.  its the most advanced i have ever seen and if im to guess, its made specifically(not only as a backdoor to all systems), but to bypass any fbi or higher ways of fighting.   it loves decoys and track covering.  example.  not only does the bot that the hacker connects to(higher than boot) wipe the IP address using *, NULL, <no name>,  and have only a PID to go on, but also it changes dates to all servers the hacker enters to eather 2004 or 2 years prior to the current date. 

    after 2 years of intercepting all distress calls i sent, i finally got some help and shared some info i know.   i was told to get a hold of ed gibson whos info i cant find cept that he is leaving microsoft.  i need him for fbi purposes.....-

Subscribe to our newsletter, Threatpost Today!

Get the latest breaking news delivered daily to your inbox.