The CyberBunker/Spamhaus denial-of-service attack appears to have subsided, and yesterday's suggestion that the attack was big and broad but limited in impact holds up. CyberBunker backs away from earlier boasting of responsibility and now denies involvement (although they still think Spamhaus had it coming). With the qualified exception of Moscow's Highload Labs, which thinks it sees involvement by a Russian cyber gang, no one's really buying the eleventh-hour disavowal.
The DNS amplification attacks exploited open DNS resolvers (Anonymous threatened but failed to do this in last year's fizzled SOPA protests). Analysts suggest source address validation as a partial answer to DNS amplification threats.
Dark Reading sensibly asks who's supplying CyberBunker and finds that it's difficult to say—possibly A2B or DataHouse (both unavailable for comment), who in turn may be supplied by Tata Communications and Intelliquent. Intelliquent was also incommunicado, but Tata says, in essence, that CyberBunker is their customer's customer, and that they try to enforce acceptable use policies, but it's tough.
And yesterday CyberBunker's site itself fell to a denial-of-service attack.
A BIND nameserver vulnerability opens the possibility of fresh DNS exploits. Spammers bypass reputation filters with Google Translate to redirect victims to malicious sites.
Fear of Chinese cyberespionage continues unabated, as US firms report high rates of intellectual property theft while doing business in China. A US House member notes with satisfaction Sprint's decision to avoid Huawei equipment—a sign new Congressional cyber-counterespionage measures already affect markets.
US Senators want the National Guard to develop cyber capabilities.