Share This article
The real-time map, maintained by the Norse security company, shows who’s hacking who and what attack vectors are being used. The data is sourced from a network of “honeypot” servers maintained by Norse, rather than real-world data from the Pentagon, Google, or other high-profile hacking targets. In hacking a honeypot is essentially a juicy-looking target that acts as a trap — either to gather important data about the would-be assailants, or to draw them away from the real target. The Norse website has some info about its “honeynet,” but it’s understandably quite sparse on actual technical details.
If you watch the map for a little while, it’s clear that most attacks originate in either China or the US, and that the US is by far the largest target for hack attacks. You can also see that the type of hack used, indicated by the target port, is rather varied. Microsoft-DS (port 445) is still one of the top targets (it’s the port used for Windows file sharing), but DNS (port 53), SSH (22), and HTTP (80) are all very popular too. You’ll probably see CrazzyNet and Black Ice, too — two common Windows backdoor programs often used by script kiddies and criminals, rather than actual cyberwar fighters.
Norse real-time hacking map, showing a coordinated attack from China towards the US
Because this data comes from Norse’s network of honeypots, rather than real targets, it’s hard to say whether real attacks — on the Pentagon, on US universities, on big Silicon Valley companies — follow the same patterns. If Norse knows what it’s doing, it should be possible to make a honeypot server appear to be a US Department of Defense or Google server, though. But without more details from Norse, it’s hard to say.
I suspect there’s quite a big variation on what exactly constitutes an “attack,” but still, it’s clear that hacking and cyberwarfare are topics that governments, corporations, and institutions need to pay attention to. The Obama administration, at least, has announced that it won’t sit on its hands while China steps up its attacks — but it’s a fine line between shoring up defenses, and triggering a full-on cyberwar that could cripple both countries.
REAL TIME Cyber Hack<--- Click here
0 comments:
Post a Comment
Click to see the code!
To insert emoticon you must added at least one space before the code.