[asterisk-users] Amazon EC2 SIP floods - you can help
Rob Townley
rob.townley at gmail.com
Sun Apr 18 13:16:41 CDT 2010
On Sun, Apr 18, 2010 at 12:25 PM, Randy R <randulo2008 at gmail.com> wrote:
> On Sun, Apr 18, 2010 at 7:17 PM, Fred Posner <fred at teamforrest.com> wrote:
>> There's also a link to it from the VoIP Tech Chat article.
>
> And we are also linking to Fred's original story which says it all about Amazon:
>
> http://www.voiptechchat.com/voip/457/amazon-ec2-sip-brute-force-attacks-on-rise/
>
> It has been suggested that posters on Twitter use hashtags. I'm not
> big on them myself, but #EC2, #SIP and #amazon might be appropriate.
>
> /r
>
> --
> _____________________________________________________________________
> -- Bandwidth and Colocation Provided by http://www.api-digital.com --
> New to Asterisk? Join us for a live introductory webinar every Thurs:
> http://www.asterisk.org/hello
>
> asterisk-users mailing list
> To UNSUBSCRIBE or update options visit:
> http://lists.digium.com/mailman/listinfo/asterisk-users
>
Just a thought or my worst nightmare. i wonder if it isn't a hyperkit
/ hyperrootkit. A malicious variant of BluePill on a Virtual Machine
that can spread through all other VM's on a machine because it becomes
the hypervisor. Since a SAN is often used to move images from one
machine to another, an infected vm fired up on a different machine
could spread quickly.
More information about the asterisk-users
mailing list