13 comments

  • gnabgib10 hours ago
    This seems to lack the full story, despite the headline.. Krebs&#x27; coverage is more in-depth (39 points) <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=46976825">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=46976825</a>
    • darig4 hours ago
      [dead]
    • walletdrainer4 hours ago
      [flagged]
      • notpushkin4 hours ago
        Could you elaborate a bit? It’s hard to take such a claim seriously without any evidence presented.
        • walletdrainer3 hours ago
          Every single person who has bought the phishing kit claims the seller is a scammer. Krebs’s article is based entirely on the sellers description of the (imaginary) product, rather than actual observation of the phishing kit in the wild.<p>See the exploit.in thread for example <a href="https:&#x2F;&#x2F;temp.sh&#x2F;XOWUP&#x2F;STARKILLER_V6.0.1___ULTIMATE_WEAPON__BYPASS_2FA_MFA__-_Software_-_Exploit.IN_Forum.pdf" rel="nofollow">https:&#x2F;&#x2F;temp.sh&#x2F;XOWUP&#x2F;STARKILLER_V6.0.1___ULTIMATE_WEAPON__B...</a><p>Krebs has access to these forums, he could’ve checked this story out in less than 3 minutes but did not.<p>Even if Krebs wasn’t a subject matter expert, it’s still inexcusable that he didn’t do the most basic work here. You don’t need to frequent underground runet forums to know that a journalist should be able to verify the stories he puts out.<p>I think it’s also particularly telling that he didn’t bother to source reasonable quality screenshots for the story, which he would have been able to do had he ever witnessed this phishing kit working.
          • Roark663 hours ago
            &gt;See the exploit.in thread for example <a href="https:&#x2F;&#x2F;temp.sh&#x2F;XOWUP&#x2F;STARKILLER_V6.0.1___ULTIMATE_WEAPON__B" rel="nofollow">https:&#x2F;&#x2F;temp.sh&#x2F;XOWUP&#x2F;STARKILLER_V6.0.1___ULTIMATE_WEAPON__B</a>...<p>&quot;Maximum download limit reached&quot; - it&#x27;s gone. Also, not present in the archive.org :-(
            • JasonADrury2 hours ago
              <a href="https:&#x2F;&#x2F;files.catbox.moe&#x2F;fod8rc.pdf" rel="nofollow">https:&#x2F;&#x2F;files.catbox.moe&#x2F;fod8rc.pdf</a><p><a href="https:&#x2F;&#x2F;web.archive.org&#x2F;web&#x2F;20260222094129&#x2F;https:&#x2F;&#x2F;files.catbox.moe&#x2F;fod8rc.pdf" rel="nofollow">https:&#x2F;&#x2F;web.archive.org&#x2F;web&#x2F;20260222094129&#x2F;https:&#x2F;&#x2F;files.cat...</a>
          • pests2 hours ago
            &gt; Krebs’s article is based entirely on the sellers description of the (imaginary) product, rather than actual observation<p>I noticed. While researching I had a feeling of &quot;is this just makeup on a pig?&quot;. Anyone can make pretty graphics or make claims. I tried reading a few selling points and I was weary.<p>One claimed to handle a MFA token handover and then somehow got access to the token and they could proxy it for you? The user types in the MFA token, they get the token. I cant figure out how they would bypass all browser protections to pass on the highly-secured token via a proxy. I&#x27;ve been online for 25 years, I understand on a deep level on the internet works and the web and what is happening in this situation, as I&#x27;m sure most here are.<p>Without a 0day, this just doesn&#x27;t make sense. But this is pretty technical, and unless you hang out here then the above sounds perfectly reasonable but to us sounds like bullshit.<p>&gt; he didn’t bother to source reasonable quality screenshots for the story<p>Also noted. Quickly found better quality versions myself with a quick search.
      • pests4 hours ago
        This is so odd. I tried to verify your claim and I give up. It might be but I really hate how information is becoming like this. There is other reporting out there on &quot;Starkiller&quot; (the phishing kit in kerbs most recent post) and I can find other articles on it, but sources seem to be circular. The source mentions Jinkusu forums, which do seem to be real, but any links I find aren&#x27;t loading for me and still no conclusive findings of Starkiller.
        • walletdrainer3 hours ago
          <a href="https:&#x2F;&#x2F;temp.sh&#x2F;XOWUP&#x2F;STARKILLER_V6.0.1___ULTIMATE_WEAPON__BYPASS_2FA_MFA__-_Software_-_Exploit.IN_Forum.pdf" rel="nofollow">https:&#x2F;&#x2F;temp.sh&#x2F;XOWUP&#x2F;STARKILLER_V6.0.1___ULTIMATE_WEAPON__B...</a><p>These forums are mostly private, but Krebs certainly has access to them. There can really be no excuse for how he handled this.<p>There are multiple posts by people in different places claiming to have bought this phishing kit, and then being delivered totally non-functional vibecoded garbage. The vibecoded garbage is not the advertised product though, as the author never managed to get the AI to finish his project.
          • pests2 hours ago
            I figured the forums were real, just was blocked for some reason so thanks.<p>I do not doubt this story for a second. Its crazy Kerb&#x27;s is basically freely advertising this blackhat slop.
        • flipped2 hours ago
          Krebs lack any sort of real credibility. He&#x27;s pushing out slop with a govern-mentalist propaganda. Tech journalists are the worst form to gather any actual information.
          • walletdrainer1 hour ago
            Krebs has some credibility in this space because he <i>used to</i> post well-informed takes on these topics, not stuff like this.<p>His record has never been flawless, but the guy actually put in the work to learn Russian to be able to read these forums. He just doesn’t anymore.
  • jjmarr9 hours ago
    From the main article, I2P has 55,000 computers, the botnet tried to add 700,000 infected routers to I2P to use it as a backup command-and-control system.<p><a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=46976825">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=46976825</a><p>This, predictably, broke I2P.
    • infogulch8 hours ago
      That&#x27;s an interesting stress test for I2P. They should try to fix that, the protocol should be resilient to such an event. Even if there are 10x more bad nodes than good nodes (assuming they were noncompliant I2P actors based on that thread) the good nodes should still be able to find each other and continue working. To be fair spam will always be a thorny problem in completely decentralized protocols.
      • embedding-shape2 hours ago
        &gt; Even if there are 10x more bad nodes than good nodes [...] the good nodes should still be able to find each other<p>What network, distributed or decentralized, can survive such an event? Most of the protocols break down once you hit some N% threshold of the network being bad nodes, asking it to survive 1000%+ bad nodes when others usually is something like &quot;When at least half the nodes are good&quot;. Are there existing decentralized&#x2F;distributed protocols that would survive a 1000% attack of bad nodes?
      • sandworm1018 hours ago
        No. They should not try to survive such attacks. The best defense to a temporary attack is often to pull the plug. Better than than potentially expose users. When there are 10x as many bad nodes as good, the base protection of any anonymity network is likely compromised. Shut down, survive, and return once the attacker has moved on.
        • conradev5 hours ago
          This is why Tor is centralized, so that they can take action like cutting out malicious nodes if needed. It’s decentralized in the sense that anyone can participate by default.
          • notpushkin4 hours ago
            &gt; so that they can take action like cutting out malicious nodes if needed<p>How does that work?
            • cyphar3 hours ago
              While anyone can run a Tor node and register it as available, the tags that Tor relays get assigned and the list of relays is controlled by 9 consensus servers[1] that are run by different members the Tor project (in different countries). They can thus easily block nodes.<p>[1]: <a href="https:&#x2F;&#x2F;consensus-health.torproject.org&#x2F;" rel="nofollow">https:&#x2F;&#x2F;consensus-health.torproject.org&#x2F;</a>
              • flipped2 hours ago
                It&#x27;s 10, not 9. And there are severe problems with having a total of 10 DA be the essential source of truth for whole network. It would be trivial to DDoS the DAs and bring down the Tor network or at the very least, disrupt it: <a href="https:&#x2F;&#x2F;arxiv.org&#x2F;abs&#x2F;2509.10755" rel="nofollow">https:&#x2F;&#x2F;arxiv.org&#x2F;abs&#x2F;2509.10755</a>.<p>It&#x27;s the only complaint I have of the current state of Tor. Anyone should be able to run directory authority, regardless if you trust the operator or not (same as normal relays).
                • nigger2381 hour ago
                  Anyone can. The DA code is open source and is used whenever you run a testnet. You can also run a DA on the mainnet - how do you think the 10 primary DAs exist? They&#x27;re not 10 computers owned by a single organization - they&#x27;re 10 mutually trusting individuals. However, most of the network won&#x27;t trust you.
                  • flipped23 minutes ago
                    Since you lack basic reading comprehension and cannot be bothered to read why DAs cannot be run, here&#x27;s the news for you: it&#x27;s hardcoded on every official tor client. No one&#x27;s talking about a testnet, you dumb fuck. Those 10 individuals are selected by Tor Project and their identities are public.
        • martin-t7 hours ago
          Why would an attacker move on if it can maintain a successful DoS attack forever?
          • xmcp1237 hours ago
            Because botnets are mostly there to make money nowadays. Or owned by state actors.<p>Either way, it’s opportunity cost.
          • flipped2 hours ago
            The mentioned botnet didn&#x27;t intentionally take down I2P. It&#x27;s run by bunch of kids who don&#x27;t know what they&#x27;re doing.
      • 01HNNWZ0MV43FF6 hours ago
        Finding good nodes is a thorny problem for human friendship, too!
        • kkfx3 hours ago
          That&#x27;s why the Web of Trust, or classic GNUPG key signing parties are a forgotten&#x2F;ignored must have. Anyone can change and go rouge of course, but it&#x27;s statistically less likely.
          • kbrkbr2 hours ago
            If I understand gp correctly, the web of trust comes after finding these human nodes, and will not help you in the process.
            • kkfx1 hour ago
              It doesn&#x27;t work for I2P due to its design, but for things like Nostr, it works well. Essentially, the goal is to build up a list of &quot;known&quot; reliable relays over time, while simultaneously blacklisting anyone who joins and proves to be unreliable relying on the statistic that collaborative individuals outnumber hostile ones in any sufficiently large cohort.<p>Of course, it&#x27;s far from being 100% effective, but it mitigates the issue significantly.
              • nigger2381 hour ago
                Hostile entities generally have a lot of money they can use to perform a Sybil attack.
                • kkfx35 minutes ago
                  Sure, but can&#x27;t break the trusted part of the network who can remain operational in that case, even if not really anonymous anymore.
        • seertaak1 hour ago
          Funny and excellent comment!
    • Dylan168074 hours ago
      I guess &quot;predictably&quot; is valid but what actually went wrong? After going through multiple sources I can&#x27;t tell if the botnet nodes were breaking the protocol on purpose, breaking the protocol on accident, or correct implementations that nevertheless overwhelmed something.
  • kace919 hours ago
    Man, I feel so out of depth with cybersecurity news.<p>Why does i2p (per the article) expect state sponsored attacks every February? Where are those forming from, what does the regularity achieve?<p>How come the operators of giant (I’m assuming illegal) botnets are available to voice their train of thought in discord?
    • WaitWaitWha8 hours ago
      &gt; Why does i2p (per the article) expect state sponsored attacks every February?<p>Because The Invisible Internet Project (I2P) allows government dissidents to communicate without the government oversight. Censorship-resistant, peer-to-peer communication<p>&gt; Where are those forming from, what does the regularity achieve?<p>At least PR China, Iran, Oman, Qatar, and Kuwait. censor communication between dissidents.<p>&gt; How come the operators of giant (I’m assuming illegal) botnets are available to voice their train of thought in discord?<p>How would you identify someone as &#x27;operators of giant botnets&#x27; before they identified themselves as &#x27;operators of giant botnets&#x27;?<p>please read <a href="https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;I2P" rel="nofollow">https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;I2P</a>
      • margalabargala6 hours ago
        Sure, but why February and not the other 11 months?
        • n2d44 hours ago
          Likely it&#x27;s just a coincidence — there were other Sybil attacks that are not in February too, so the chance that you&#x27;d get 3 in Feb isn&#x27;t all that low.
      • Zambyte7 hours ago
        This answer is missing the key &quot;regularity&quot; part of their questions, which I would love to know more about.
        • braingravy6 hours ago
          That’s a great question… Currently we’re in the main Chinese holiday period with the Lunar New Year&#x2F;Spring Festival&#x2F;Chinese New Year, so perhaps people traveling back home from foreign lands might use the service more during this time?
    • OgsyedIE9 hours ago
      Many state bodies involved in adversarial action have dedicated budgets for offensive cyber-warfare, credential thefts, supply chain compromises and disinformation. If they haven&#x27;t used all of their budget by the end of the budget period, they&#x27;ll be allocated a smaller budget for the next budget period.
      • rollulus4 hours ago
        Cool theory but that should result in other attacks that peak in February too, can you give examples?
      • kace919 hours ago
        Oh ffs. Whenever I think my opinion on the state of the world can’t get any lower, things somehow manage to get dumber.
        • flipped2 hours ago
          State sponsored cyber attacks are news to you? It&#x27;s been a thing since more than 2 decades now.
          • kace9112 minutes ago
            Not the attacks themselves, I would expect that kind or sabotage that actively provokes negative outcomes in people’s lives to have a more respectful&#x2F;competent reasoning behind than “meh there’s a few leftovers and we had to do something”
          • nigger2381 hour ago
            doing a cyber attack to use up your budget is news
        • bryanrasmussen8 hours ago
          I mean this is a common pattern in many large organizations, governmental and non, if you didn&#x27;t use your budget it means we can save money, yayyyy! I hadn&#x27;t really considered it would apply to state-backed hacking but makes sense.
        • busko6 hours ago
          [dead]
  • shevy-java4 hours ago
    &gt; The I2P development team responded by shipping version 2.11.0 just six days after the attack began.<p>Not wanting to be overly critical, but any net-infrastructure project kind of has to keep bot-attacks in mind and other attack vectors, in the initial design stage already. Any state-actor (and other actors, though I would assume it is often a state financing the bot network behind-the-scene) can become potentially hostile.
  • charcircuit6 hours ago
    &gt;hostile nodes<p>&gt;they accidentally disrupted I2P while attempting to use the network as backup command-and-control infrastructure<p>So were they hostile or were they using it normally?
  • pmontra6 hours ago
    This seems to be a better post about what happened, from the same site <a href="https:&#x2F;&#x2F;www.sambent.com&#x2F;i2p-2-11-0-ships-post-quantum-crypto-after-botnet-siege&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.sambent.com&#x2F;i2p-2-11-0-ships-post-quantum-crypto...</a>
    • nneonneo5 hours ago
      Those are some weird-ass visualizations. I can only assume they were AI-generated.
    • KennyBlanken5 hours ago
      I&#x27;ll save everyone else a click: AI slop text coupled with the strangest, most pointless visualizations I&#x27;ve ever seen.
      • SV_BubbleTime3 hours ago
        Speak for yourself!<p>I didn’t really understand the link between Alice and Bob until I saw a green floaty dot go through a pile of spaghetti with the word compromise beneath it.
  • rollulus4 hours ago
    This article (with high slop vibes) and another article on their site (linked in the comments) seem to suggest that post quantum encryption mitigated the Sybil attack, without explanation. I fail to understand how the two are even related.
  • illusive40809 hours ago
    Why does Discord allow a server for a botnet owner?
    • chmod7758 hours ago
      There&#x27;s servers where they just hang out, but which themselves are legitimate. Cybersecurity related ones etc. You can ban them and they&#x27;ll just switch to another account within a minute. Occasionally discord or a server owner does, but everyone knows its pointless. There&#x27;s probably other servers that are mostly used by cybercriminals, maybe command-and-control backups, and security researchers may stumble upon these when taking some malware apart, join them, and end up getting in contact with the owner.<p>In general I don&#x27;t think law enforcement <i>wants</i> discord to take these down or ban them. These guys would have no problem to just make some IRC servers or whatever to hang out on instead, which would be much harder to surveil for law enforcement - compared to discord just forwarding them everything said by those accounts and on those servers.
    • ddtaylor9 hours ago
      Discord has a lot of terrible servers. This is one of the reasons they were not trusted when they came out and wanted to do identity verification. They already have a lot of information yet fail to do meaningful enforcement at scale.
      • Aurornis5 hours ago
        Only a couple years ago the outrage was that Discord was too eagerly banning servers and users.<p>I know several people whose Discord accounts were banned because they participated in a server that later had some talk of illegal activities in one of the channels. There are similar stories all over Reddit.
        • zamadatix1 hour ago
          If a Walmart has ~100 people in it and wants to get rid of 4 shoplifters but really sucks at selecting them well then the likely result is 4 normal people are very upset while all of the shoplifters are still there.<p>In the same scenario, even if Walmart is right about who they ejected 75% of the time then they still have ~1 shoplifter remaining and ~1 very upset person.<p>Even in an ideal world where Walmart is right about ejection 100% of the time it doesn&#x27;t mean they start receiving 0 new shoplifters either, it just means the number of people wrongly made upset is 0.<p>Discord&#x27;s problem (on both ends) lies in lack of depth in investigating bans. It takes resources to review when someone shouldn&#x27;t be banned and it takes resources to make sure you ban everybody. Putting too low of resources into banning just means that both sides of the scale manage to get tipped in the wring direction at the same time.
        • nigger2381 hour ago
          Two things can be true at once. They can ban normal things too much and ban bad things too little.
    • samus5 hours ago
      Why wouldn&#x27;t they? There are Discord servers about anything you can imagine and also what you can&#x27;t or don&#x27;t want to image. As long as they don&#x27;t start disrupting their infra Discord couldn&#x27;t care less.<p>Also, how would you even go about classifying them as botnet operators?
    • xmcp1237 hours ago
      Ever tried to ban a botnet owner from a service they want to use?<p>It’s basically impossible. They have money, IPs, identities, anything you could possibly want to evade.
      • bee_rider6 hours ago
        It would be pretty funny if the age verification stuff blocked some of these folks.
        • Aurornis5 hours ago
          Discord age verification is only for content filters, adult-themed servers, and a few other features.<p>They aren’t requiring age verification for everyone to join servers and chat. The headlines and panic really got away from the actual story.
      • Cider99867 hours ago
        They are rich in regard to the tools needed to abuse services haha.
      • charcircuit6 hours ago
        If you just look at the messages in those kinds of discords. It&#x27;s blatant. They aren&#x27;t even trying to hide it.
    • Ekaros1 hour ago
      A MAU is a MAU... They likely use relatively little computing capability while making numbers look really good...
    • bawolff7 hours ago
      I imagine because banning these things is both whack-a-mole and like finding a needle in a hay stack.
    • fragmede9 hours ago
      botnet owners don&#x27;t typically come forwards and say they are trying to run a botnet, so there may be some difficulty in detecting them there.
    • fragmede9 hours ago
      botnet owners dying typically come forwards and say they are trying to run a botnet, so there may be some difficulty there.
  • hoppp7 hours ago
    Isn&#x27;t I2P java? The botnet uses java? I thought python or C is preferred for that kinda stuff
    • rippeltippel5 hours ago
      Communication between bots use network protocols, it doesn&#x27;t matter in which language those protocols are implemented.
    • mhitza7 hours ago
      The official router implementation is Java. i2pd is an alternative written in C++.<p>Once established communication can transparently be processed through a socks proxy, or integration with SAM or similar <a href="https:&#x2F;&#x2F;i2p.net&#x2F;en&#x2F;docs&#x2F;api&#x2F;samv3&#x2F;" rel="nofollow">https:&#x2F;&#x2F;i2p.net&#x2F;en&#x2F;docs&#x2F;api&#x2F;samv3&#x2F;</a>
    • monero-xmr7 hours ago
      Computers are so fast it doesn’t matter
      • flipped2 hours ago
        &quot;Since the abstraction layers have quadrupled, let&#x27;s not just care about the actual performance anymore!&quot;
  • Cider99867 hours ago
    The video seems to be a bit more in-depth.
  • Roark663 hours ago
    Is there a shittier summary anywhere, please? Or did the author reached the peak of enshittification?<p>Honestly, did the bot implementation have bugs or was it a proper implementation that crashed the network due to sheer numbers?<p>Also, how does changing the encryption standard affect anything if the bots tried to integrate correctly with the network?<p>Is the problem &quot;fixed&quot; or is it not? Elsewhere I found large number if botnet devs got pissed off with this botnet operator and 600k nodes went offline. Might this have much more to do with the situation getting better than simply changing encryption?<p>Also, was there any suggestion a quantum breaking attack was attempted? No. So why put the emphasis on &quot;post quantum&quot; in this article?<p>Bad. Very bad.
    • nigger2381 hour ago
      Sam Bent has turned full influencer
  • richardfey8 hours ago
    I wonder how cjdns would have handled this
  • cookiengineer6 hours ago
    This was one of the worst writeups I ever read. Even a LinkedIn Premium post would have had more technical details, lol