avatar image

Welcome, Guest. Please login or register.
Did you miss your activation email?

Login with username, password and session length
  • Wednesday November 30, 2022, 11:23 am
  • Proudly celebrating 15+ years online.
  • Donate now to become a lifetime supporting member of the site and get a non-expiring license key for all of our programs.
  • donate

Author Topic: Fast Flux Beating Security Industry  (Read 2895 times)


  • Supporting Member
  • Joined in 2007
  • **
  • Posts: 1,237
    • View Profile
    • Donate to Member
Fast Flux Beating Security Industry
« on: August 29, 2008, 04:24 PM »
Hackers are employing a new technique to keep their malicious sites one server ahead of law enforcement.

Screenshot - 30_08_2008 , 7_24_33 AM_thumb.png

In the continuing computer security arms race, a technique called fast flux is the bad guys' latest way of thwarting attempts to shut down phishing scams and other Web nasties.

Fast flux was first seen around two years ago, according to Derek Manky, security researcher with Fortinet Inc. in Vancouver. Around a year ago it became popular with operators of botnets - networks of computers belonging to unsuspecting users and infected with bots, allowing them to be controlled remotely and used for phishing and other scams.

Full Story



  • Charter Member
  • Joined in 2006
  • ***
  • Points: 1
  • Posts: 9,632
    • View Profile
    • Read more about this member.
    • Donate to Member
Re: Fast Flux Beating Security Industry
« Reply #1 on: September 01, 2008, 02:02 AM »
What is a fast flux?

The idea is to move the criminal sites around so fast that it's next to impossible to catch up with them.

In its simplest form, this means that the name server controlling the domain constantly changes its response to attempts to look up the Web page. Before anyone can identify the IP address of an offending site and take it offline, the URL will be pointing to a different IP address.