[133540] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: LOIC tool used in the "Anonymous" attacks

daemon@ATHENA.MIT.EDU (Marshall Eubanks)
Sat Dec 11 16:39:59 2010

From: Marshall Eubanks <tme@americafree.tv>
In-Reply-To: <20101211212129.GA42207@ussenterprise.ufp.org>
Date: Sat, 11 Dec 2010 16:39:55 -0500
To: Leo Bicknell <bicknell@ufp.org>
Cc: North American Network Operators Group <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org


On Dec 11, 2010, at 4:21 PM, Leo Bicknell wrote:

> In a message written on Sat, Dec 11, 2010 at 10:19:32AM -0500, =
Marshall Eubanks wrote:
>> LOIC makes no attempt to hide the IP addresses of the attackers, =
making it easy to trace them if they are using their own computers.=20
>=20
> Perhaps the authors of the tool would rather keep the finite law
> enforcement busy rounding up clueless highschool kids who install
> this tool.
>=20
> In that sense it's both a network packet DDOS, and a law enforcement
> attacker DDOS.  Brilliant in a way.

Or maybe that's a feature, not a bug. False flag operations to ensnare =
the clueless have a long history of
running code.

Regards
Marshall


>=20
>=20
> --=20
>       Leo Bicknell - bicknell@ufp.org - CCIE 3440
>        PGP keys at http://www.ufp.org/~bicknell/



home help back first fref pref prev next nref lref last post