False flag?
Palo Alto attacking itself to demonstrate it is the partner you want to counter the quantum naughtiness they just warned you about?
Wot, me paranoid?
Malicious traffic targeting Palo Alto Networks' GlobalProtect portals surged almost 40-fold in the space of 24 hours, hitting a 90-day high and putting defenders on alert for whatever comes next. According to GreyNoise, the sudden wave began on November 14, when it logged roughly 2.3 million sessions hammering the "global- …
Palo Alto attacking itself to demonstrate it is the partner you want to counter the quantum naughtiness they just warned you about?
Wot, me paranoid?
This post has been deleted by its author
Back in the day, whenever my neywork was attacked, I would inform the ISP responsible for the IP address.
If they did not address the issue, I then notified them that as I had already informed them of the problem, we would hold them personally liable for any costs arising out of damage to our systems caused by their network.
Surprisingly, most of them responded quickly, letting me know the issue was mostly hacked unpatched windows servers running in their farms and they were instigating new procedures to address the constant Microsoft patch requirements.
They also normally pointed out that they themselves had been targetted from further up the line and had notified those ISPs.
Whatever happened to the personnel since then?
I know that there followed a trend to hide contact details and abilities, and someone allowed it, rather than cutting them off the network until they resolved the detail.
Too many actual companies have gone the same route leaving no way to contact them other than writing to some third party in the middle of nowhere via snail mail.
Governments should be chasing things like that to address net fraud, rather than imposing "tracking" methods for normal users.