Subscribe to RSS News Feed
About Spamhaus  |  Press Office  |  FAQs   
Spamhaus News Category: cybercrime
Spamhaus News Quotes

Permission to quote from or reproduce Spamhaus News articles is granted automatically providing you state the source as Spamhaus and link to the news record.


all categories
bulk domain registration
bulletproof hosting
dns firewall
domain hijacking
port 25 blocking
return codes

RSS News Feed
Spamhaus Botnet Threat Report 2019 2020-01-28 UTC
In the 2019 Botnet Threat Report we look back at key trends from 2019 and highlight the operators who are struggling with the number of botnet C&Cs associated with their particular operations.... (>)

Estimating Emotet’s size and reach 2019-12-12 UTC
Since Emotet's resurgence, Spamhaus Malware Labs has been closely monitoring and studying Emotet’s activity. Here’s what we’ve uncovered...... (>)

Spamhaus Botnet Threat Update: Q3-2019 2019-10-11 UTC
You would be right to assume that malware authors and botnet operators in the Northern Hemisphere took a break over the summer months. Unfortunately, that assumption would be incorrect.... (>)

Spamhaus Botnet Threat Update: Q2-2019 2019-07-15 UTC
In this quarter, Botnet command & control (C&C) traffic remains significantly above the monthly averages of 2018, although it would appear that in June some botnet operators have taken a vacation.... (>)

Spamhaus Botnet Threat Update: Q1-2019 2019-04-25 UTC
Welcome to the first quarterly update of 2019 In the first three months of this year, Spamhaus Malware Labs have observed significant changes in the malware that’s associated with botnet Command & Control (C&C) servers, most notably a preference for cybercriminals to utilize crimeware kits...... (>)

How to Halt the Hijackers 2019-03-06 UTC
If you’ve read Network hijacking - the low down, you’ll be fully versed in the varied ways cybercriminals can hijack your network. In this article, we’ll be explaining how to protect against this happening to you, along with a high-level overview as to what you can do if your Internet Protocol (IP) addresses are hijacked.... (>)

Network hijacking - the low down 2019-01-08 UTC
Network hijacking involves the announcing or re-routing of Internet protocol (IP) addresses without authorization from the owner of those addresses. When hijacking is done intentionally, it is usually for some type of nefarious or illegal purpose. The consequences can be far reaching for organizations whose networks are hijacked. There are numerous ways cyber-criminals can ‘hijack’ your network, here’s the lowdown.... (>)

A Domain-Specific Lesson from the Marriott Incident 2018-12-12 UTC
The headlines have come thick and fast over the past few weeks in relation to the ‘Marriott Hack’. We all know the story: 500 million guest reservations from its Starwood database have been stolen. There are numerous lessons to be learned in regards to responding to this kind of incident, one of which is the importance of 'domain usage' when sending out emails.... (>)

Fighting abuse at the edge 2018-04-09 UTC
Take a look at org charts, international standards, conferences and forums…you will observe there are two tribes; one for the ‘network’ the other for ‘applications’. It’s a distinction that’s embedded in Information Technology with the Network Layer ‘below’ all applications with a dedicated team dealing with connectivity, routers, upstreams and peering, all quite independently from the nature of the data that is flowing. Another team deals with ‘applications’; email, web services, etc., that do their job without having to consider the underlying aspects related to networking.... (>)

Network Hijacking on the Rise 2016-09-26 UTC
As we discussed in a previous article, allocations of IP addresses (IPv4 addresses) are getting hard to come by, especially for spammers. Because the IP addresses they use quickly get a bad reputation as sources of spam, spammers constantly need fresh IPs that are... (>)

Verizon Routing Millions of IP Addresses for Cybercrime Gangs 2016-02-01 UTC
Over the past few years, spammers have sought out large ranges of IP addresses. By spreading out their sending patterns across a wide range of IP addresses, they can attempt to defeat spam filters and get spam and malware emails delivered where they are not wanted. However, IPv4 addresses are getting scarce and hard to come by. In fact, as of... (>)

Second arrest in response to DDoS attack on Spamhaus 2014-07-07 UTC
The Spamhaus Project again offers congratulations and thanks to the law enforcement community in the matter of the massive Distributed Denial of Service (DDoS) attack perpetrated against our systems in March 2013 by a Russian-based anti-Spamhaus group calling themselves 'Stophaus', consisting of several individuals with grievances against... (>)

ICANN SSAC on DDoS, DNS and BCP 38 2014-02-26 UTC
ICANN's Security and Stability Advisory Committee (SSAC) document Advisory on DDoS Attacks Leveraging DNS Infrastructure, published this week, provides a much-needed touchstone for the Internet in its current state. DDoS attacks, such as the one... (>)

An arrest in response to March DDoS attacks on Spamhaus 2013-04-26 UTC
The Spamhaus Project offers congratulations and its sincere thanks to the Dutch Public Prosecution Service (OM), the Dutch National High Tech Crime Unit (NHTCU) of the Dutch Police Services Agency... (>)

Answers about recent DDoS attack on Spamhaus 2013-03-28 UTC
At this time The Spamhaus Project is getting more press enquiries than we can personally respond to. Below is a list with the most frequently asked questions, along with our answers. If you are in need of any additional information please do not hesitate to contact us but we cannot guarantee a quick response. Our staff are almost all investigators and engineers who focus on dealing with spam... (>)

© 1998-2020 The Spamhaus Project SLU. All rights reserved.
Legal  |  Privacy