
Internet Storm Center Tracks Hack Attacks 55
An Anonymous Coward writes: "It looks like Incidents.org has a new offspring, the Internet Storm Center. The internet storm center uses data from DShield.org to track hack attacks all over the world.
Some of the interesting trivia: While usually, China has a bad reputation for the volume of attack coming from it, the US outpaces China by a lot. Actually, China only comes in at #6. So much for the great security boost the US gets from using genuine Microsoft software."
Re:Is this thing on? (Score:1)
Widespread port 80 scans are still dominating all other activity. These scans appear to be caused by remaining Nimda/Code Red activity.
These damn things are still running around generating that much traffic?
Re:Is this thing on? (Score:1)
Nimda/Code Red generated traffic !! (Score:1)
It looks as if the owners of the computers in question have not noticed that there systems are still compromised. Or if they have noticed, they are in no real position to do anything about. I consider the former to the the most likely situation.
How about the "front page" flag not set? (Score:2)
Maybe the editors did not set the "front page" flag.
There is no surprise (Score:2, Flamebait)
In a way, there is no surprise in the report.
While the urban legend of "China is the #1 devil" has been circulating in the Net, we all know where most of the hackers - especially those who wear black hats - live.
This is not to say that there is no "Chinese devils", of course, there are. But in terms of skill, numbers and resources, the Chinese can't even come close to those from the States.
But individually, if you really want to know who has the most experience - Those from Russia (or the block formerly known as USSR) are the most experienced.
I've personal experience with Russian hackers. I'm a sysadmin, and I pride myself on making my Linux machines secured, but no matter how "secure" I made my machine, those Ruskies always find ways to hack into them.
Oh, I've traced hacking attempts too, there're a lot from China, the States, Israel, Europe, Africa, Asia and Russia, it's almost always the Ruskies who got through the layers and layers of "security features" I've set.
Even "honeypot" can't stop the Ruskies.
The one thing I've learnt from these experience is that I ain't gonna do funny things to the Ruskies. I only have my respect for them, even when they are blackhatters.
Re:There is no surprise (Score:2, Informative)
Interent Weather Report (Score:1, Troll)
I think the most useful aspect with for this could be a combination of the hack attack report and the internet weather report to see whether a server is simply suffering from technical issues or is being DOS'ed.
It's missing something. (Score:1)
Re:It's missing something. (Score:2, Funny)
incorrect (Score:2, Informative)
US 222907
DE 68478
TH 65644
EU 65612
GB 53130
KR 42523
CN 42291
As far as I can tell, it's coming it at number 7.
Re:incorrect (Score:1)
Either that or China just conquered South Korea and claimed their country code.
On a different note, I'm surprised that Thailand beat China.
I wonder how accurate this is. They seem to be just doing a reverse lookup on IPs, many of which are probably faked.
Re:incorrect (Score:1, Informative)
The only thing that surprises me is that Romania isn't in the top 5. I'm sitting on a cable modem and I've been running Snort for the hell of it for about 6 months. I get more hack/crack/exploit attempts from Romanian hosts (.ro) than from any other TLD, including all the probes from
Germany's placement doesn't surprise me at all, though. If I had a dollar for every t-online.de user who tried to crack my FTP, I'd be richer than Bill Gates. I'm not sure what it is about Germans and FTP probes, but that's all they try to access on my box, and they try it more than anyone else. If I could host beer.ftp.my.in-addr.arpa I surely would, but I can't. Sorry, Germany!
Re:incorrect (Score:3, Funny)
Re:incorrect (Score:1)
EU does not exist (Score:2)
I wonder, how this list was calculated. Anyone?
Re:EU does not exist (Score:1)
Re:incorrect (Score:1)
According to this survey ofglobal [www.nua.ie] and asian [www.nua.ie] internet-connected systems the US/Can have 181M systems online vs 33M in china.
do the math: Current stats from the ISS say the ratio of systems is about the same as the reatio of attack traffic.
Attack traffic: CN=42291 / US 222907 = .1897
Connected sys's: cn=33M / us=181M = .1823
From following incidents.org [incidents.org] and my own experience I'd say that .cn has a rep more becuase when you deal with an attack from asia in general the problems of contacting the admins to notify / etc are much more difficult.
My own experiences have been mixed, Contacting site owners in asia has been more spotty than for US/EC sites, and in the event of something serious its a lot more expensive to pick up the 'phone and call china to discuss a problem.
arin.net, ripe.net, apnic.net all work well for tracking down system owners, but the contact problems across continents remain.
Question (Score:2)
It is possible that they are smarter than that, advertisers have it figured out.
Re:Question (Score:1)
Re:Question (Score:1)
Re:Question (Score:1)
Moderated Lead-Message Posting: -1: Flamebait (Score:4, Interesting)
As I can remember, this is *not* the first time that a lead topic posting could be considered as "Flamebait" - but obviously, the
Re:Moderated Lead-Message Posting: -1: Flamebait (Score:1)
Now, which OS is the favorite for automated distributed denial of service attacks on the Internet? Which OS is responsible for nearly all viruses and worms on the Internet?
Truth is, Windows was never ready to be connected to a public network. The public proved this. So, there absolutely is a correlation between the number of Windows computers and the amount of cracking on the Internet.
What about other operating systems? Well, UNIX, for example, has already had its public Internet shake-down. A good example would be the story in "Cuckoo's Egg" by Clifford Stoll. As a result, UNIX is the subject of a relatively small amount of current cracking activities.
Re:Moderated Lead-Message Posting: -1: Flamebait (Score:2)
Since when is the ammount of hacking attacks / attempts directly equivalent to the number of Windows boxen?
Well, we could argue about that, but we don't have to because you are misreading the lead topic.
The Microsoft comment in the lead topic is relevant to Microsoft's claims that pirated versions of Windows are a security risk because you can't trust the pirates not to backdoor it. Since China has an extremely active software pirating industry, if Microsoft's claim was true then China would be a higher source of hack attempts.
The weren't saying Windows leads to hacking attempts. They were saying that data fails to support Microsofts assertion that piracy is a security problem, not just a Microsoft sales problem.
Re:Moderated Lead-Message Posting: -1: Flamebait (Score:1)
Widespread port 80 scans are still dominating all other activity. These scans appear to be caused by remaining Nimda/Code Red activity.(...)
In this particular case, most probes come from windows-only worms. The lead topics in Slashdot HAVE bias in Windows-related matters, but this time they are right.
Survey: We Only See the Tip of the Iceberg (Score:3, Informative)
The Computer Security Institute [gocsi.com] announced in its Computer Crime and Security Survey [gocsi.com] that 90% of respondents had security breaches in the last year. ONLY 34% reported ANY of the breaches to law enforcement for fear of bad publicity.
Bottom line: We barely see the tip of the iceberg when it comes to computer security breaches.Microsoft blah blah blah (Score:2)
Re:Microsoft blah blah blah (Score:1)
misleading details (Score:3, Interesting)
For example, digging through the site I found 2 IPs that I'm responsible for on the list of sources for these. One is our primary DNS server, the other our mail server. The report about the DNS server is probably due to a stateful firewall that blocked some of the return packets from a lookup. The report about the mail server is probably due to its trying to do an auth lookup for incoming mail. Neither one is an attack, but either one could have been an attack for all that the receiving end can tell.
And in case anyone is curious, yes I did just spend 30 minutes double checking those machines after reading this. Me, paranoid?
Re:misleading details (Score:1)
Let us assume all the submitters of the data used to create these statistics have the best of intentions and are inserting "real" data. I doubt many of these submitters actually take the time and do enough analysis to ensure "false positives" aren't being imported into the database. For instance, I would bet data collected from snort [snort.org] is one of the most common types of logs submitted. I have used snort enough to know that its portscan preprocessor produces a lot of "false positives". In the end you have a bunch of statistics derived from "dirty" data that are barely worth the bandwidth required to view them.
Bammkkkk
False positives (Score:2)
Even if all the submitters have the best of intentions, many have neither the skills nor the willingness to eliminate false positives.
The data is dirty but far from useless. If there is a problem, there is a high chance of it showing up somehow. The thing is to not get panicked if something shows up.
If it shows a problem, it may be something like a virus that looks like it came from you, when it really came from someone who had your address. If you see a lot of them, then probably better investigate. The main value is that if there is a problem, this dirty data has a high chance of having some useful information.
Weather Prediction (Score:1)
Script to block top 10 attacker ips... (Score:2)
It uses wget and cut and it's made for kernel 2.4(w/iptables):
wget http://feeds.dshield.org/top10-2.txt && cat top10-2.txt| cut -f1 >ips && for i in `cat ips`;do iptables -A INPUT -s $i -j DROP;iptables -A FORWARD -s $i -j DROP;done
Hope it's useful to anyone...
Re:Script to block top 10 attacker ips... (Score:3, Funny)
Re:Script to block top 10 attacker ips... (Score:1)
Re:Script to block top 10 attacker ips... (Score:1)
'block list':
http://www.dshield.org/block_list_info.html
by geography? (Score:2)
kevin
Wanton Windows Bashing: Is it Necessary? (Score:2)
How can the same website (