#NetworkAbuse

The Spamhaus Projectspamhaus@infosec.exchange
2024-05-20

👏 Big shout out to Marco Schmidt and Rene Wilhelm of RIPE NCC for their insightful article on the concerning trend of IPv6 stockpiling, a phenomenon Spamhaus has observed for some time.

Schmidt highlights, "Lastly, we should also consider that such blocks might attract actors who prefer to operate discreetly.For instance, they may intend to use these IPv6 blocks for spamming or other malicious actions. [..] As a regional Internet registry, we are accountable to competent authorities and governments, which places upon us the responsibility to ensure that the resources we steward are not misused or abused."

Although it's great to see RIPE NCC acknowledging this issue, it will be interesting to see what steps will be taken to address the problem of rampant misuse/abuse of network resources in the RIPE region.

You can read the article in full here ⬇
labs.ripe.net/author/marco_sch

#RIPE #NetworkAbuse #IPv6

The Spamhaus Projectspamhaus@infosec.exchange
2024-04-25

❗ Researchers at Spamhaus have identified an abuse problem for Internet Backbone and Colocation Provider, Hurricane Electric relating to AS394711, allocated to New Hampshire-based Limenet LLC.

Spamhaus currently assesses that Limenet is a bulletproof hosting operation; consequently, all prefixes announced by AS394711 are listed in DROP.

Hurricane Electric's trust and safety desk was notified of the incident by this SBL listing: 👉 check.spamhaus.org/listed/?sea

Notification emails have been sent to the Hurricane Electric trust and safety desk, and we’ve reached out to your Network Operations Director, as we see you are having challenges.

We’re here to help you - please reach out to us.

#Blocklistings #NetworkAbuse #GetInTouch

The Spamhaus Projectspamhaus@infosec.exchange
2024-02-05

In Q4 2023, five big-name networks accounted for almost 60% of ALL #botnet C&Cs in the top 20 networks hosting the most active botnet C&Cs.

#1 Tencent
#2 Alibaba-inc
#3 DigitalOcean
#4 OVHCloud
#5 Amazon

Please get in touch and speak to us about the challenges you are facing when dealing with abuse. We can help.

Read the latest botnet insights from Spamhaus Project in Spamhaus Technology’s Q4 Botnet Threat Update:

info.spamhaus.com/botnet-threa

#botnet #botnetCC #networkabuse

The Spamhaus Projectspamhaus@infosec.exchange
2024-01-17

❗Networks not responding to abuse reports is clearly a problem - escalating listings can lead to a serious abuse problem.....

However......it's even more problematic when networks claim the issue is resolved, when it isn't. From IT giants, to small and mid-sized ISPs - this happens!

🤦 For some it's blatant ignorance, for others it's poor internal communication (we hope!). Then there's the ISPs that put too much trust in "questionable" customers forwarding removal requests....

...not to mention the cost-driven downsizing of abuse desks to call-center level, limiting the number of skilled operators able to resolve issues.

Nevertheless, if our data shows twenty two SBL live records, the problem still exists. Submitting removal requests won't erase abuse, they'll just be rejected.

📢 Please double-check the problem is really fixed before requesting Spamhaus to remove the listing, especially for the Spamhaus Blocklist (SBL) 👇
spamhaus.org/sbl/

If you need help understanding the root cause of the issue, let us know - we can help!

#Blocklistings #NetworkAbuse #WeCanHelp

Baloo Uriza 🏳️‍🌈🇺🇸BalooUriza@meow.social
2019-07-27

Oh nice, I'm getting backscatter spam. Because it's 2019 and there's still sites out there that can't be arsed to implement domainKeys or SPF yet for some reason, and a spammer forged headers with my domain name in the From: header.

I'm calling you out, netcom-mail.de and telebecinternet.com.

#spam #NetworkAbuse #emailAdmin

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst