Dont get tricked into thinking these attack maps have any meaning. It is just a way to show technoweenies something shiny so they think you have a hamdle on this hackers problem. Most of the bad traffic is running through proxies (many based in the us) anyway, and the only thing you'd see on a map like this is a really big ddos.
According to the Norse map posted earlier, China is doing most of the cyber attacking, but the US is now attacking China on a much smaller scale. http://map.norsecorp.com/
Not necessarily. That sort of attack is likely to illicit a real response, while simply pushing down their economy, slowly, can't (necessarily) trigger the sort of response that would lead to open hostilities.
More interesting than whether or not we are actively engaged in pushing the Chinese economy down is whether or not this is in retaliation for today's "unrelated" events that grounded all of UAL's planes for several hours and knocked the NYSE off-line for a significant period of time, or whether those same events are in retaliation for our pushing the Chinese economy down.
From my vantage point, today's attacks don't sound Chinese. They sound Russian. The Chinese are typically the stealthier type, while Putin and his cronies are more likely to crash the front gate with a bottle of vodka in one hand and a Kalashnikov in the other, singing songs in praise of the motherland... as for a motive for the Russians, I think retaliation for the economic sanctions we've pushed through the UN is motive enough.
No. From another thread.... I decided to do a little digging. It appears Norse creates a honeypot to mimic specific network destinations to entice attacks. So, what we're seeing isn't an attack on a 'target' so much as Norse's honeypots being activated.
From their CTO: "We have a very large honeypot, where we have, at any given time, over 5m emulations towards the Internet. Meaning we emulate over 5m users, servers, infrastructures on the Internet. We mimic a bank. We put in place honeypots to mimic Microsoft Exchange servers, Linux systems, ATMs. We try to mimic as much as we can of the infrastructure online to make it look attractive to be attacked."
They also have administrative offices in St Louis and have admitted to having a lot of their honey pot location in the area in press releases.
It would appear I'm on the right track Still, quite odd that this 'security company' isn't able to identify the type of attack against their own honeypots. Or maybe just not willing to put that sort of info public?
Until recently, the whole "unknown" thing seems to be an uncommon occurrence from what I understand, but I'm new to Norse. If that is true, it fit's with the honeypot explanation.
that image is taken from a company called IP Viking that specializes in detecting attacks around the world and using the information gathered in that detection to provide threat analysis data to companies that are actively researching such things. So, in the image, you see a lot of little "bursts" over china, with "beams" from where the attack allegedly originated (e.g. the US).
There are like ten dozen things going on right now and this past year that suggest we're involved in a cyber war with china. How's the weather under that rock?
stealthboy ago
If you've ever looked at that activity map before, it's always that active. This is nothing new.
nokilli ago
Actually I was thinking it was the other way around, what with United Airlines and the NYSE.
deathcomesilent ago
This strikes me as corporate warfare. No governments necessarily involved.
umatbro ago
FIND THE COMPUTER ROOM!
OllieTabooger ago
You contributed to me having a good laugh. Thanks!
Immigrant ago
Norse is just fearmongering. You would never see an actual attack that way.
planetpiss ago
Dont get tricked into thinking these attack maps have any meaning. It is just a way to show technoweenies something shiny so they think you have a hamdle on this hackers problem. Most of the bad traffic is running through proxies (many based in the us) anyway, and the only thing you'd see on a map like this is a really big ddos.
jervybingly ago
According to the Norse map posted earlier, China is doing most of the cyber attacking, but the US is now attacking China on a much smaller scale. http://map.norsecorp.com/
sodaphish ago
Not necessarily. That sort of attack is likely to illicit a real response, while simply pushing down their economy, slowly, can't (necessarily) trigger the sort of response that would lead to open hostilities.
TheKinglyWe ago
Elicit because I'm classy like that
sodaphish ago
More interesting than whether or not we are actively engaged in pushing the Chinese economy down is whether or not this is in retaliation for today's "unrelated" events that grounded all of UAL's planes for several hours and knocked the NYSE off-line for a significant period of time, or whether those same events are in retaliation for our pushing the Chinese economy down.
From my vantage point, today's attacks don't sound Chinese. They sound Russian. The Chinese are typically the stealthier type, while Putin and his cronies are more likely to crash the front gate with a bottle of vodka in one hand and a Kalashnikov in the other, singing songs in praise of the motherland... as for a motive for the Russians, I think retaliation for the economic sanctions we've pushed through the UN is motive enough.
boltsand ago
Wait, like China is actually where zombies come from? Like in World War Z?
BeerBaron ago
No. From another thread.... I decided to do a little digging. It appears Norse creates a honeypot to mimic specific network destinations to entice attacks. So, what we're seeing isn't an attack on a 'target' so much as Norse's honeypots being activated.
From their CTO: "We have a very large honeypot, where we have, at any given time, over 5m emulations towards the Internet. Meaning we emulate over 5m users, servers, infrastructures on the Internet. We mimic a bank. We put in place honeypots to mimic Microsoft Exchange servers, Linux systems, ATMs. We try to mimic as much as we can of the infrastructure online to make it look attractive to be attacked."
They also have administrative offices in St Louis and have admitted to having a lot of their honey pot location in the area in press releases.
It would appear I'm on the right track Still, quite odd that this 'security company' isn't able to identify the type of attack against their own honeypots. Or maybe just not willing to put that sort of info public?
deathcomesilent ago
Until recently, the whole "unknown" thing seems to be an uncommon occurrence from what I understand, but I'm new to Norse. If that is true, it fit's with the honeypot explanation.
tentra ago
You're reading the map backwards. See here for the live feed: http://map.norsecorp.com
There's several attacks targeting St. Louis right now. I pay attention to these things, and this is abnormal activity.
gosso920 ago
When fired upon, return the fire.
Bu11DawgNC ago
Hitting China while they are in the middle of a 1929 style market crash. Things are going to be interesting over the next couple years.
Empire_of_the_mind ago
the 1929-style market crash IS the attack.
Goaticorn ago
The files are in the computer
Empire_of_the_mind ago
yes
leetdood ago
Why would you think that?
sodaphish ago
that image is taken from a company called IP Viking that specializes in detecting attacks around the world and using the information gathered in that detection to provide threat analysis data to companies that are actively researching such things. So, in the image, you see a lot of little "bursts" over china, with "beams" from where the attack allegedly originated (e.g. the US).
You can see the live map here.
n00bp47r01 ago
That map is crazy! Beams and circles everywhere! It's as beautiful as it is horrifying.
leetdood ago
Thanks!
Empire_of_the_mind ago
There are like ten dozen things going on right now and this past year that suggest we're involved in a cyber war with china. How's the weather under that rock?
leetdood ago
I was asking specifically about this image. But thanks for being condescending.
Empire_of_the_mind ago
this image is dumb, so sourcing from the image, the answer is no.
leetdood ago
That's what I thought, thank you.