Alright, we know how these things work, so lets cut to the point.
While cruising through my email spam folder (as one does) I came across a bit of spam that stood out in front of the others, mainly by copying Apple Inc. completely. I had to see what it was. Luckily enough, upon opening the email I could clearly see that this was a phishing attempt to get my apple ID and possibly my card information, lets take a closer look shall we?
The email itself looks very dodgy and tbh I don’t use any Apple product what so ever, I hate them, so how could I be receiving emails about my Apple account being abused?
DDoS is one of the oldest and most used forms of “internet protesting” in the book, its used thousands of times a day all around the world. For those who do not know, DDoS stands for Distributed Denial of Service, otherwise meaning a shit tonne of attackers pelting a poor server with millions of packets until said server cannot cope any more and, well, denies service.
Normally if you would like to carry out a DDoS attack you would have to either build a botnet of thousands infected computers or devices, or use a pay-for-hire DDoS service which you can find in one Google search. This is great in all for the common criminal, but building a botnet takes time and skill and pay-for-hire services are costly and mostly useless.
What most people don’t know is that some of the largest attacks ever recorded in internet history were only most likely using a few, maybe 50 machines at most to attack with. This is made possible due to term “Amplification” or “DRDoS” (Distributed Reflection Denial of Service) in which the attackers turn a small request into a much larger one by using open internet resolvers that anyone can use.
Why hello everyone! How are you all on this fine Tuesday morning? I am writing today to express my anger towards a certain Chinese(?) criminal who does not seem to get the picture and repeatedly sends me emails that are attempting to steal my information, i.e. “Phishing”.