The conundrum that is the modern use of NAT at a carrier grade level

The modern use of NAT poses a problem for both users and reputation vendors alike.
Carrier Grade NAT is just NAT on a much larger scale.
Not only does Mister X not have that IP, he has just one port on one IP for the duration of that connection and not a moment after.
Starting with the dialup era and progressively getting worse with each generation, the internet clown infestation has always been a problem.
Ever since they started letting clowns on the internet, they have engaged in their hobby of sending mail to anyone and everyone.
With the advent of outbound port 25 blocking, clowns were effectively silenced in those areas of the world.
It is utterly unclear who is talking when all you can see is a bus that appears to be full of clowns.
The Clown Grade version has a pool of public IP addresses and significantly more households behind that.
Instead of one clown showing up to entertain your child on their birthday, the entire clown academy arrives.
In the distant past, when dialup was the problem, a spammer could dial in, start spamming and then disconnect when he had finished.
Should he get blocked during his spam run, he could simply disconnect, reconnect with a new IP and return to business as usual.
This is what spammers on certain large cloud providers do today - for exactly the same reasons.
Get blocked, get a new IP, continue merrily spamming.
These days with CGNAT, the spammer doesn't just have one IP at a time, he has the whole pool to spam from, funnelled through a single IP that is shared with a lot of innocent victims of their ISP's policy.
Every connection the spammer makes comes from a different IP in the pool and before you know it, everything is listed.
The most effective way to stop CGNATs being spam cannons and avoid getting them listed is to filter outbound connections to port 25 from their CGNAT pools.
Modern users do not need port 25 open; they should all be using SMTP Authentication with port 587 or 465.
Port 25 is only needed by mail servers and access to it should be restricted by default.
Limiting access to port 25 prevents all the infected devices behind the NAT from being able to successfully distribute their spam and malware-laden emails, and with the exponential rise in residential proxy networks, this becomes ever more important.
Closing port 25 will not fix their residential proxy problems, but it will definitely reduce support costs, reduce the spam load in the world and also reduce the spread of malware.


This Cyber News was published on www.spamhaus.org. Publication date: Mon, 08 Jan 2024 16:13:16 +0000


Cyber News related to The conundrum that is the modern use of NAT at a carrier grade level

The conundrum that is the modern use of NAT at a carrier grade level - The modern use of NAT poses a problem for both users and reputation vendors alike. Carrier Grade NAT is just NAT on a much larger scale. Not only does Mister X not have that IP, he has just one port on one IP for the duration of that connection and ...
1 year ago Spamhaus.org Silence
CVE-2023-22409 - An Unchecked Input for Loop Condition vulnerability in a NAT library of Juniper Networks Junos OS allows a local authenticated attacker with low privileges to cause a Denial of Service (DoS). When an inconsistent "deterministic NAT" ...
2 years ago
CVE-2025-21681 - In the Linux kernel, the following vulnerability has been resolved: openvswitch: fix lockup on tx to unregistering netdev with carrier Commit in a fixes tag attempted to fix the issue in the following sequence of calls: do_output -> ovs_vport_send -> ...
2 months ago Tenable.com
CVE-2021-41506 - Xiaongmai AHB7008T-MH-V2, AHB7804R-ELS, AHB7804R-MH-V2, AHB7808R-MS-V2, AHB7808R-MS, AHB7808T-MS-V2, AHB7804R-LMS, HI3518_50H10L_S39 V4.02.R11.7601.Nat.Onvif.20170420, V4.02.R11.Nat.Onvif.20160422, V4.02.R11.7601.Nat.Onvif.20170424, ...
1 year ago
WTH is Modern SOC, Part 1 - Back in 2016 when I was a Gartner analyst, I was obsessed with the same question. As I said in my now-dead Gartner blog, a lot of security operation centers looked like they were built on a blueprint of a classic paper written by somebody from ...
1 year ago Securityboulevard.com
Elevate Your Security: Meet Modern Attacks With Advanced CSPM - Recent surges in cloud attacks and breaches have given attention to how teams should efficiently protect and run applications in the cloud. This is especially true as misconfigurations top the list of security threats in cloud environments and are ...
1 year ago Securityboulevard.com
Shining a Light on Modern Cyber Battlefield Attacks - It's safe to say that the sophistication of today's criminals is far outpacing the evolution of the defenses they are attacking. A great example of this mismatch is the explosion of malware executing modern battlefield attacks. These attacks first ...
1 year ago Cybersecurity-insiders.com
IT consultant in Germany fined for exposing shoddy security The Register - A security researcher in Germany has been fined €3,000 for finding and reporting an e-commerce database vulnerability that was exposing almost 700,000 customer records. Back in June 2021, according to our pals at Heise, an contractor identified ...
1 year ago Theregister.com
Review: Engineering-grade OT security: A manager's guide - Rew Ginter is a widely-read author on industrial security and a trusted advisor for industrial enterprises. He holds a BSc. in Applied Mathematics and an MSc. in Computer Science from the University of Calgary. He developed control system software ...
1 year ago Helpnetsecurity.com
Google Gerrit Unauthorized Access to Code Tickets Supply Chain Attack - Research Advisory | Tenable® - Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Enjoy full access to a modern, cloud-based vulnerability management platform that enables you ...
1 month ago Tenable.com
Google Cloud Platform (GCP) Privilege Escalation Vulnerability in GCP Cloud Run - Research Advisory | Tenable® - Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Enjoy full access to a modern, cloud-based vulnerability management platform that enables you ...
1 month ago Tenable.com
Granola API Endpoint Information Disclosure - Research Advisory | Tenable® - Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Enjoy full access to a modern, cloud-based vulnerability management platform that enables you ...
2 weeks ago Tenable.com
Multiple Vulnerabilities in Sante PACS Server - Research Advisory | Tenable® - Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Enjoy full access to a modern, cloud-based vulnerability management platform that enables you ...
2 weeks ago Tenable.com
Camaleon CMS Privilege Escalation - Research Advisory | Tenable® - Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Enjoy full access to a modern, cloud-based vulnerability management platform that enables you ...
2 weeks ago Tenable.com
OpenAI SearchGPT Results Tampering with Prompt Injection - Research Advisory | Tenable® - Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Enjoy full access to a modern, cloud-based vulnerability management platform that enables you ...
1 week ago Tenable.com
The Cyber Risk Nightmare and Financial Risk Disaster of Using Personal Messaging Apps in The Workplace - This practice, which is unfortunately still widespread in an environment of relentless cyberattacks, is fraught with major cyber and financial risk. Unsecure messaging apps are a gateway for cybercriminals to access, expose and exploit an ...
1 year ago Cyberdefensemagazine.com
9 Best DDoS Protection Service Providers for 2024 - eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. One of the most powerful defenses an organization can employ against distributed ...
1 year ago Esecurityplanet.com
CVE-2017-12231 - A vulnerability in the implementation of Network Address Translation (NAT) functionality in Cisco IOS 12.4 through 15.6 could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The ...
5 years ago
CVE-2024-27415 - In the Linux kernel, the following vulnerability has been resolved: ...
10 months ago
​​Microsoft named as a Leader in three IDC MarketScapes for Modern Endpoint Security 2024 - With these security concerns top of mind, there is no surprise that in the last five years, the Modern Endpoint Security market has nearly tripled in size to defend against emerging, sophisticated, and persistent threats. Microsoft Defender for ...
1 year ago Techcommunity.microsoft.com
CVE-2019-9744 - An issue was discovered on PHOENIX CONTACT FL NAT SMCS 8TX, FL NAT SMN 8TX, FL NAT SMN 8TX-M, and FL NAT SMN 8TX-M-DMG devices. There is unauthorized access to the WEB-UI by attackers arriving from the same source IP address as an authenticated user, ...
5 years ago
CVE-2017-17746 - Weak access control methods on the TP-Link TL-SG108E 1.0.0 allow any user on a NAT network with an authenticated administrator to access the device without entering user credentials. The authentication record is stored on the device; thus if an ...
5 years ago
The Role of IoT in Modern Education - From smart classrooms equipped with IoT devices to personalized learning platforms, IoT has paved the way for a more immersive and tailored educational experience. Overall, the integration of IoT in education holds great promise in transforming the ...
1 year ago Securityzap.com
Five business use cases for evaluating Azure Virtual WAN security solutions - To help organizations who are evaluating security solutions to protect their Virtual WAN deployments, this article considers five business use cases and explains how Check Point enhances and complements Azure security with its best-of-breed, ...
10 months ago Blog.checkpoint.com
Forcepoint Federal Rebrands As Everfox to Reflect New Era of Defense-Grade Cybersecurity - PRESS RELEASE. HERNDON, Va.-(BUSINESS WIRE)- Forcepoint Federal announced today that it has rebranded as Everfox to reflect its next chapter as a trailblazer in developing and delivering defense-grade cybersecurity technology. Under the new name and ...
1 year ago Darkreading.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)