Category Archives: Cloudmark

A DNS cache-busting technique for DDOS-style attacks against Authoritative Name Servers

During the course of a recent analysis of DNS traffic at a customer site, I noticed a high volume of requests had been made for a relatively small set of domains. As it turned out, the traffic was part of an attack on the customer’s DNS infrastructure; however, the point of these requests was initially […]

DNS Gang Wars of the Wild Wild East

What does running the DNS infrastructure of a major ISP have in common with operating an online gambling site based in China? If you are running DNS operations of any scale then you are almost certainly participating in a world wide racketeering campaign specifically targeting online gambling sites, many of which operate out of China […]

DNS Tunneling (Ab)Uses

Abuse of global DNS infrastructure for the purpose of distributed denial-of-service (DDoS) attacks on various Internet services has been a hot topic in the news for some time now. But there is another unintended use of DNS that can be exploited for a wide range of purposes: DNS tunneling. These purposes can range from benign […]

BitTorrent Sync is the Preferred Method for Sharing Stolen Celebrity Photos

As a fourth wave of stolen celebrity nude photos and videos is being distributed on the Internet, lawyers for some of the affected celebrities are suing Google for making it too easy to find their stolen images. However, the more savvy voyeurs are not using Google to search for the latest leaks, they are simply […]

True Names and Identity on the Internet

As received by: Transceiver Relay03 at Relay Language path: Firetongue->Cloudmark->Triskweline, SjK units [Firetongue and Cloudmark are High Beyond trade languages. Only core meaning is rendered by this translation.] From: Arbitration Arts Corporation at Firecloud Nebula [A High Beyond military[?] organization. Known age ~100 years] Subject: Reason for concern Cloudmark took its name from a language […]

Virus Bulletin 2014: Leaking data of the quantified self

Quantify yourself much?  Candid Wüest of Symantec gave a fascinating presentation on the lax security in various wearable devices at the 2014 Virus Bulletin conference in Seattle.  The so-called “quantifiable self” is a trend in gadgetry that most people will be aware of, if not necessarily by name.  Probably the most famous example is the […]

Spammer Using Hacked Websites To Sell Stolen Photographs of Naked Celebrities

A long established porn spammer who uses compromised web servers to host his landing pages has modified his pitch to include copies of the recently released stolen photographs of naked celebrities, including a picture of McKayla Maroney which according to her lawyers was taken before she was eighteen years old, and so could be illegal […]

BREAKING: Emma Watson Nude Photo Threat Claimed To Be From Rantic Marketing, Not 4chan

The latest headlines in the stolen celebrity photos story are about the web site EmmaYouAreNext.com, which displays a countdown. This was first publicized by the web site Foxweekly.com which said, “Emma Watson Nude Photos To Be Leaked By 4Chan Hacker?” FoxWeekly has no connection with NewsCorp or Fox News. The EmmaYouAreNext.com website also contained an […]

Celebrity Nudes and iCloud Phishing

The recent leak of celebrities personal photographs demonstrates just how weak our defenses are against determined attackers. From the internal evidence and the chatter on 4chan and Reddit, it does not look as if this was the result of a single attack or a single hacker. Various sources say that there was a ring of […]

Learn More About Cloudmark
Our Products
News and Events
Site Map  •  Privacy Policy  •  ©2002–2014 Cloudmark, Inc.