INTL 3:770/1 3:770/3   
   REPLYADDR invalid@invalid.invalid   
   REPLYTO 3:770/3.0 UUCP   
   MSGID: 5ebe6ca2   
   REPLY: a4a2214a   
   PID: SoupGate-Win32 v1.05   
   "68g.1499" <68g.1499@etr6.net> writes:   
   > Similar experiences here too and more like 15 years. They always   
   > seem to use a list of "common usernames" and another list of   
   > "common passwords". The 'smartest' one used some names from   
   > the company e-mail acct. In short, all script kiddies - bots -   
   > no pro/State-level stuff. Sorry to burst many egos, but really   
   > is YOUR server WORTH five CPU-seconds by N.Korea ???   
      
   One compromised host is worth relatively little, but nobody compromises   
   just one host.   
      
   - Even a small amount of CPU is worth putting a cryptocurrency miner on,   
    for someone who has automated the process of stealing access.   
      
   - Fleets of hacked computers are used in DDoS attacks.   
      
   - Individual hacked computer make good jumping off points to obscure the   
    true origin of attacks of any kind.   
      
   --   
   https://www.greenend.org.uk/rjk/   
      
   --- SoupGate-Win32 v1.05   
    * Origin: Agency HUB, Dunedin - New Zealand | Fido<>Usenet Gateway (3:770/3)   
   SEEN-BY: 10/0 1 15/0 90/1 103/705 105/81 106/201 128/260 129/305 135/225   
   SEEN-BY: 153/757 7715 218/0 1 601 700 840 870 930 220/70 221/1 6 226/17   
   SEEN-BY: 226/30 100 227/114 229/110 112 113 200 206 307 317 400 426   
   SEEN-BY: 229/428 470 550 616 664 700 240/1120 266/512 267/800 282/1038   
   SEEN-BY: 291/111 292/854 301/1 113 812 310/31 320/219 322/757 335/364   
   SEEN-BY: 341/66 342/200 396/45 460/58 633/280 712/848 770/1 3 100   
   SEEN-BY: 770/330 340 772/210 220 230 5020/400 1042 5058/104 5075/35   
   PATH: 770/3 1 218/840 221/6 301/1 218/700 229/426   
      
|