10 Feb
2012
10 Feb
'12
11:53 a.m.
On Sun, 5 Feb 2012 18:36:13 -0500 Ray Gasnick III <rgasnick@milestechnologies.com> wrote:
Only solution thus far was to dump the victim IP address in our block into the BGP Black hole community with one of our 2 providers and completely stop advertising to the other.
Drew mentioned udp.pl and I also it could have been this script running on some compromised Unix-based host(s) as well. If the traffic did not appear to be widely distributed, that is, not spoofed, then this is even more likely. If that was the case, filtering based on the sender address(es) may help better mitigate the attack without taking the target entirely offline for everyone else. John