Real-Time Cyber-Attack Map 36
First time accepted submitter anavictoriasaavedra writes "In October, two German computer security researchers created a map that allows you to see a picture of online cyber-attacks as they happen. The map isn't out of a techno-thriller, tracking the location of some hacker in a basement trying to steal government secrets. Instead, it's built around a worldwide project designed to study online intruders. The data comes from honeypots. When the bots go after a honeypot, however, they're really hacking into a virtual machine inside a secure computer. The attack is broadcast on the map—and the researchers behind the project have a picture of how a virus works that they can use to prevent similar attacks or prepare new defenses."
who will get the most use out of this? (Score:5, Insightful)
seems to be the way of the world
-I'm just sayin'
HUR DUR (Score:1)
outlaw maps!
Re: (Score:3)
Re: (Score:2)
Okay that's fine, but why do all the hackers seem to live in Aachen (DE)?
If you read it again, it's from X location TO Aachen, Germany. Likely they have a honeypot there.
Re: (Score:2)
From the FAQ (Click the ? in top left):
"What is going on in Aachen?!
Most of the time, you will see attacks targeted against Aachen. This is because our honeypot at RWTH Aachen University is very active and captures attacks against hundreds of target IP addresses. This does not mean that Aachen is attacked more often than the rest of the world!"
Re:who will get the most use out of this? (Score:4, Insightful)
The honeypot only seems to recognize worms that are already recognized by AV software. All the bot makers would have to do is test it against AV software themselves, either directly or through a scanning-upload site (or even just by checksum, as the map does). It just gives researchers more of an idea of where and with what people are infected (looks like mostly variants of Conficker from the spot checks I did). Bot makers already have all the resources this gives to test their malware against. Might serve as an e-peen boost for them to see how common their malware is, but I doubt it will serve much beyond that.
Re: (Score:2)
The honeypot only seems to recognize worms that are already recognized by AV software.
no, the honeypot display only the worms that are already known.
All the bot makers would have to do is test it against AV software themselves,
Yes, this is what bot makers do. The stupid ones use Virustotal for this testing. The smart ones have their own private test cloud.
If this map exist or not does not change the bot maker's testing process.
Re: (Score:1)
Re: (Score:2)
Re: (Score:1, Funny)
Re: (Score:3)
Enough previous trolling to get a terrible karma rating (dropping initial scores to -1), plus a 50:50 moderation split between Troll and Insightful, apparently.
Re: (Score:1)
-1 Insightful? How does that work?
Read "insight fool".
Maybe a few bugs (Score:3, Interesting)
Re: (Score:2)
The answer about mapping inaccuracies from their blog post:
Why are there so many attacks and yet so few different attackers (red dots)?
This is just an issue of precision in geo location lookups. We identify the red dots by their GPS location and many IP addresses map to the same GPS location, even if the corresponding machines are actually not really close to each other. So one single red dot can represent many different attackers.
As a sidenote, IP geolocation is not 100% accurate, either. In the past we ha
Mapping inaccuracies (Score:2)
Re: (Score:2)
hehehe. that's hysterical. wish I had mod points.
Re: (Score:2)
Re: (Score:2)
I wish my boss could authorise hireing a hitman + planetckets so he could take them out. Or at last have him shoot the machines running the bots.
* and many many thousand malware-mails that are eaten by amavis on the mailserver before they reach their destination
where can i sign with them? (Score:1)
Re: (Score:3)
If you are already a member of the Honeynet Project, you can just publish your captures to hpfeeds and they will automatically show up on this map. If you are not a member, you can run your own copy of this map on your own server. Code is on GitHub (LGPL license).
Re: (Score:1)
Posting IPs of Security Researcher Virtual Machine (Score:2)