Operation Endgame 3.0 is here! This phase targets the notorious information and credential stealer #Rhadamanthys. It's another major international effort that’s seen 1,025 servers taken down and 20 domains seized. πŸ’ͺ πŸ‘ Excellent work by @npub1fg22...yfva and all partners involved β€” the takedown of Rhadamanthys marks a significant win for the global cybersecurity community. As with earlier phases of #OperationEndgame, Spamhaus is providing remediation support. Those affected will be contacted in due course with guidance on next steps. Operation Endgame website πŸ‘‰ Europol press release ‡️
Got a new IP or domain? You'll want to make sure it’s nice and warm before sending! πŸ“¨ Get the details on: - When an IP is considered β€œnew” ✨ - What it means to warm up your IP and domain, how to do it, and how it impacts your sending reputation - Why we strongly discourage using warm-up services πŸ™… Read the full FAQ here ➑️ #Email #Sender #WarmUp image
my-oh-MYNIC it's not been a great six months…since loosening restrictions for the πŸ‡²πŸ‡Ύ .my ccTLD in late 2024, new domain registrations have sky-rocketed - and so have listings… Between April and September πŸ‡²πŸ‡Ύ .my saw a +543% increase, ranking #3 in the Top 20 ccTLDs! 😱 Get the full story the latest Domain Report here πŸ‘‡ #ccTLD #DomainReputation image
Like all other internet abuse, bulletproof hosting does not just happen - it is enabled by facilitators such as network carriers, datacenter operators, IP brokers and domain registrars. Sometimes, malicious infrastructure agglomerates in the internet vicinity of such facilitators - why not join the show if your criminal competitors thrive there already?🧐 A particularly prolific example is πŸ‡©πŸ‡ͺaurologic GmbH (regular readers might recognize the name), as highlighted by Recorded Future in a report published on November 6 ‡️ #Cybercrime #BulletproofHosting #ThreatIntel #HostingProviders
If you keep a close eye on the DNS abuse landscape, you’ve probably noticed a rise in malicious activity and abuse reports linked to Traffic Distribution Systems (TDS) β€” infrastructure that’s fast becoming a go-to tool for phishing and other malicious campaigns. Earlier this year, our peers at Infoblox shared over 100,000 domains tied to Vextrio, a threat actor group notorious for its extensive TDS use. Needless to say, those domains are listed on the Spamhaus Domain Blocklist πŸ’ͺ ‡️ image
❗Here's the latest Spamhaus DROP listings, from the worst of the worst IP traffic: πŸ‘‰ SBL688496 - https://check.spamhaus.org/results?query=SBL688496 πŸ‘‰ SBL683400 - https://check.spamhaus.org/results?query=SBL688400 πŸ‘‰ SBL688345 - https://check.spamhaus.org/results?query=SBL688345 πŸ‘‰ SBL688338 - https://check.spamhaus.org/results?query=SBL688338 πŸ‘‰ SBL679050 - https://check.spamhaus.org/results?query=SBL679050 πŸ‘‰ SBL688313 - https://check.spamhaus.org/results?query=SBL688313 πŸ‘‰ SBL683028 - https://check.spamhaus.org/results?query=SBL683028 πŸ‘‰ SBL688302 - https://check.spamhaus.org/results?query=SBL688302 πŸ‘‰ SBL688281 - https://check.spamhaus.org/results?query=SBL688281 image
Go on… drop your spam in here. We dare you πŸ•·πŸ“¬ #CreepItClean image