[tor-relays] Re: Update: Tor relays source IPs spoofed to mass-scan port 22

Hello all,

those watchdogcyberdefense “specialists” have meanwhile publicly admitted their mistake (of course, hidden in a political wording to create a different impression):

https://watchdogcyberdefense.com/2024/11/is-this-attackers-ip-spoofed/

Quote: “This experience got us thinking about the need for a swift way to identify spoofed IPs involved in attacks that create substantial backscatter traffic”

···

On November 8, 2024 at 4:44 PM, tor-operator@urdn.com.ua wrote:

gus :

I’m writing to share that the origin of the spoofed packets has been

identified and successfully shut down today, thanks to the assistance

from Andrew Morris at GreyNoise and anonymous contributors.

Are you sure that it has been effectively shut down? We’re still

receiving spoofed packets with IP addresses of Tor relays set as source

after this message has been posted. We’ve also received more “reports”

from the same newbies after this message was posted.

Our traps even see packets with the IP addresses of Tor relays that are

in the same subnet.

So far we’ve been able to trace this to a certain peer, we’ll be

monitoring.


tor-relays mailing list – tor-relays@lists.torproject.org

To unsubscribe send an email to tor-relays-leave@lists.torproject.org


Sent with https://mailfence.com
Secure and private email