[asterisk-users] Amazon EC2 SIP floods - you can help

Rob Townley rob.townley at gmail.com
Sun Apr 18 13:16:41 CDT 2010


On Sun, Apr 18, 2010 at 12:25 PM, Randy R <randulo2008 at gmail.com> wrote:
> On Sun, Apr 18, 2010 at 7:17 PM, Fred Posner <fred at teamforrest.com> wrote:
>> There's also a link to it from the VoIP Tech Chat article.
>
> And we are also linking to Fred's original story which says it all about Amazon:
>
> http://www.voiptechchat.com/voip/457/amazon-ec2-sip-brute-force-attacks-on-rise/
>
> It has been suggested that posters on Twitter use hashtags. I'm not
> big on them myself, but #EC2, #SIP and #amazon might be appropriate.
>
> /r
>
> --
> _____________________________________________________________________
> -- Bandwidth and Colocation Provided by http://www.api-digital.com --
> New to Asterisk? Join us for a live introductory webinar every Thurs:
>               http://www.asterisk.org/hello
>
> asterisk-users mailing list
> To UNSUBSCRIBE or update options visit:
>   http://lists.digium.com/mailman/listinfo/asterisk-users
>

Just a thought or my worst nightmare.  i wonder if it isn't a hyperkit
/ hyperrootkit.  A malicious variant of BluePill on a Virtual Machine
that can spread through all other VM's on a machine because it becomes
the hypervisor.  Since a SAN is often used to move images from one
machine to another, an infected vm fired up on a different machine
could spread quickly.



More information about the asterisk-users mailing list