{"id":70191,"date":"2014-06-26T18:03:14","date_gmt":"2014-06-26T22:03:14","guid":{"rendered":"http:\/\/rbach.net\/blog\/index.php\/"},"modified":"2021-08-25T21:49:54","modified_gmt":"2021-08-26T01:49:54","slug":"whos-hacking-who","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/whos-hacking-who\/","title":{"rendered":"Who&#8217;s Hacking Who?"},"content":{"rendered":"<p><strong>Update &#8211;<\/strong> The hacking map function seems to have been shut down &#8211; I got an error message &#8220;<strong>All access to this object has been disabled.<\/strong>&#8221;<\/p>\n<p><a href=\"https:\/\/www.madmagazine.com\/books\/spy-vs-spy-casebook-of-craziness\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-107304\" title=\"Who's Hacking Who?\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/spyvsspy-1.jpg?resize=121%2C90&#038;ssl=1\" alt=\"Who's Hacking Who?\" width=\"121\" height=\"90\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/spyvsspy-1.jpg?w=150&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/spyvsspy-1.jpg?resize=75%2C56&amp;ssl=1 75w\" sizes=\"auto, (max-width: 121px) 100vw, 121px\" \/><\/a>A new animated <strong>map of the Internet<\/strong> created by the U.S.-based computer security firm <strong><a title=\"Norse\" href=\"https:\/\/www.csoonline.com\/article\/3028104\/norse-corp-disappears-shortly-ceo-is-asked-to-step-down.html\" target=\"_blank\" rel=\"nofollow noopener\">Norse<\/a><\/strong> helps <strong>cyber-defenders<\/strong> visualize where hackers are coming from and illustrate just how <strong>ubiquitous hacking<\/strong> is around the world according to a recent <a title=\"This Animated Map Shows Who's Hacking Who In Real Time\" href=\"http:\/\/www.businessinsider.com\/animated-map-shows-real-time-hacking-2014-6\" target=\"_blank\" rel=\"noopener noreferrer\">article<\/a> by <a title=\"Maya Kosoff\" href=\"http:\/\/www.businessinsider.com\/author\/maya-kosoff\" target=\"_blank\" rel=\"noopener noreferrer\">Maya Kosoff<\/a> from <em><a title=\"BusinessInsider\" href=\"http:\/\/www.businessinsider.com\" target=\"_blank\" rel=\"noopener noreferrer\">BusinessInsider<\/a>. <\/em><\/p>\n<p><a href=\"https:\/\/www.csoonline.com\/article\/3028104\/norse-corp-disappears-shortly-ceo-is-asked-to-step-down.html\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-107306\" title=\"Norse logo\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/norse_logo.png?resize=102%2C30&#038;ssl=1\" alt=\"Norse logo\" width=\"102\" height=\"30\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/norse_logo.png?resize=75%2C22&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/norse_logo.png?resize=150%2C45&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/norse_logo.png?w=167&amp;ssl=1 167w\" sizes=\"auto, (max-width: 102px) 100vw, 102px\" \/><\/a><a title=\"St. Louis\" href=\"http:\/\/maps.google.com\/maps?ll=38.6272222222,-90.1977777778&amp;spn=0.1,0.1&amp;q=38.6272222222,-90.1977777778 (St.%20Louis)&amp;t=h\" target=\"_blank\" rel=\"geolocation noopener noreferrer\">St. <\/a>Louis-based\u00a0Norse offers a product call <strong><a title=\"IPViking\" href=\"https:\/\/krebsonsecurity.com\/2021\/03\/redtorch-formed-from-ashes-of-norse-corp\/\" target=\"_blank\" rel=\"noopener noreferrer\">IPViking<\/a><\/strong> which displays a map and lists of the countries doing the most <strong>hacking<\/strong>, the countries getting hacked the most, and the <strong>types of attacks<\/strong> happening.\u00a0<em><a title=\"Quartz\" href=\"http:\/\/qz.com\/224618\/watch-the-global-hacking-war-in-real-time-with-a-weirdly-hypnotic-map\/\" target=\"_blank\" rel=\"noopener noreferrer\">Quartz<\/a><\/em> noted the animated map looks kind of like the vintage video game <a title=\"Missle Command\" href=\"http:\/\/en.wikipedia.org\/wiki\/Missile_Command\" target=\"_blank\" rel=\"noopener noreferrer\">Missile Command<\/a>.<\/p>\n<p>Norse, founded by a former intelligence expert with the U.S.\u2019s <a title=\"United States Department of Homeland Security\" href=\"http:\/\/www.dhs.gov\" target=\"_blank\" rel=\"homepage noopener noreferrer\">Department of Homeland Security<\/a> <a href=\"https:\/\/www.smithsonianmag.com\/smart-news\/nets-dark-side-watch-people-try-hack-each-other-live-180951823\/#LhRVF4mzZQ5IKEZO.99\" target=\"_blank\" rel=\"noopener noreferrer\">explained to<\/a> <a title=\"Smithsonian Magazine\" href=\"https:\/\/www.smithsonianmag.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>Smithsonian Magazine<\/em><\/a> how the system works;<\/p>\n<p style=\"text-align: justify; padding-left: 30px;\"><em>attacks shown are based on a small subset of live flows against the Norse <strong>honeypot infrastructure<\/strong>, representing actual worldwide cyber attacks by bad actors.<\/em><\/p>\n<p><a href=\"https:\/\/www.csoonline.com\/article\/3028104\/norse-corp-disappears-shortly-ceo-is-asked-to-step-down.html\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-107309 size-full\" title=\"Who's Hacking Who?\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/norse_threat_-map.jpg?resize=480%2C200&#038;ssl=1\" alt=\"Who's Hacking Who?\" width=\"480\" height=\"200\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/norse_threat_-map.jpg?w=740&amp;ssl=1 740w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/norse_threat_-map.jpg?resize=75%2C31&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/norse_threat_-map.jpg?resize=150%2C62&amp;ssl=1 150w\" sizes=\"auto, (max-width: 480px) 100vw, 480px\" \/><\/a><\/p>\n<p><em>BI<\/em> continues that the map doesn&#8217;t show all the hacking going on in the world, it could be a <strong>representative snapshot<\/strong> of today&#8217;s hacking ecosystem. A snapshot of the stats shows some of the baseline back-and-forth hacking attempts. Today, over 5 hours,<\/p>\n<p>The top attack types:<\/p>\n<ol>\n<li><a title=\"SSH\" href=\"http:\/\/en.wikipedia.org\/wiki\/Secure_Shell\" target=\"_blank\" rel=\"noopener noreferrer\">SSH port 22 <\/a>&#8211; 6,308 attacks<\/li>\n<li><a title=\"SIP port 5060\" href=\"https:\/\/www.grc.com\/port_5060.htm\" target=\"_blank\" rel=\"noopener noreferrer\">SIP port 5060<\/a> &#8211; 2,380 attacks<\/li>\n<li><a title=\"microsoft-ds port 445\" href=\"https:\/\/www.grc.com\/port_445.htm\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft-DS port 445<\/a> &#8211; 2,317 attacks<\/li>\n<li>MS-SQL-S <a title=\"MS-SQL-S port 1433\" href=\"https:\/\/www.grc.com\/port_1433.htm\" target=\"_blank\" rel=\"noopener noreferrer\">port 1433<\/a> &#8211; 2,193 attacks<\/li>\n<li><a title=\"DNS port 53\" href=\"https:\/\/www.grc.com\/port_53.htm\" target=\"_blank\" rel=\"noopener noreferrer\">DNS port 53<\/a> &#8211; 2,182 attacks<\/li>\n<li><a title=\"HTTP-Alt port 8080\" href=\"https:\/\/www.grc.com\/port_8080.htm\" target=\"_blank\" rel=\"noopener noreferrer\">HTTP-Alt port 8080<\/a> &#8211; 2,007 attacks<\/li>\n<li><a title=\"SNMP port 161\" href=\"https:\/\/www.grc.com\/port_161.htm\" target=\"_blank\" rel=\"noopener noreferrer\">SNMP port 161<\/a> &#8211; 1,367 attacks<\/li>\n<li><a title=\"MS-term-services port 3389\" href=\"https:\/\/www.grc.com\/port_3389.htm\" target=\"_blank\" rel=\"noopener noreferrer\">MS-term-services port 3389<\/a> &#8211; 1,327 attacks<\/li>\n<\/ol>\n<h2 id=\"tablepress-32-name\" class=\"tablepress-table-name tablepress-table-name-id-32\">Internet Attacks<\/h2>\n\n<table id=\"tablepress-32\" class=\"tablepress tablepress-id-32\" aria-labelledby=\"tablepress-32-name\" aria-describedby=\"tablepress-32-description\">\n<thead>\n<tr class=\"row-1\">\n\t<th class=\"column-1\">Rank<\/th><th class=\"column-2\"># of Attacks sent<\/th><th class=\"column-3\">Attack Origins<\/th><th class=\"column-4\">Rank<\/th><th class=\"column-5\"># of Attacks received<\/th><th class=\"column-6\">Attack Target<\/th>\n<\/tr>\n<\/thead>\n<tbody class=\"row-striping row-hover\">\n<tr class=\"row-2\">\n\t<td class=\"column-1\">1<\/td><td class=\"column-2\">12,216<\/td><td class=\"column-3\">China<\/td><td class=\"column-4\">1<\/td><td class=\"column-5\">27,667<\/td><td class=\"column-6\">United States<\/td>\n<\/tr>\n<tr class=\"row-3\">\n\t<td class=\"column-1\">2<\/td><td class=\"column-2\">7,827<\/td><td class=\"column-3\">United States<br \/>\n<\/td><td class=\"column-4\">2<\/td><td class=\"column-5\">1,161<\/td><td class=\"column-6\">Thailand<\/td>\n<\/tr>\n<tr class=\"row-4\">\n\t<td class=\"column-1\">3<\/td><td class=\"column-2\">2,446<\/td><td class=\"column-3\">Mil\/Gov<\/td><td class=\"column-4\">3<\/td><td class=\"column-5\">1,077<\/td><td class=\"column-6\">Hong Kong<\/td>\n<\/tr>\n<tr class=\"row-5\">\n\t<td class=\"column-1\">4<\/td><td class=\"column-2\">2,161<\/td><td class=\"column-3\">Netherlands<\/td><td class=\"column-4\">4<\/td><td class=\"column-5\">682<\/td><td class=\"column-6\">Canada<\/td>\n<\/tr>\n<tr class=\"row-6\">\n\t<td class=\"column-1\">5<\/td><td class=\"column-2\">1,899<\/td><td class=\"column-3\">France<\/td><td class=\"column-4\">5<\/td><td class=\"column-5\">655 <\/td><td class=\"column-6\">Portugal<\/td>\n<\/tr>\n<tr class=\"row-7\">\n\t<td class=\"column-1\">6<\/td><td class=\"column-2\">1,351<\/td><td class=\"column-3\">Russia<\/td><td class=\"column-4\">6<\/td><td class=\"column-5\">650<\/td><td class=\"column-6\">Australia<\/td>\n<\/tr>\n<tr class=\"row-8\">\n\t<td class=\"column-1\">7<\/td><td class=\"column-2\">1,331<\/td><td class=\"column-3\">Canada<\/td><td class=\"column-4\">7<\/td><td class=\"column-5\">600<\/td><td class=\"column-6\">Singapore<\/td>\n<\/tr>\n<tr class=\"row-9\">\n\t<td class=\"column-1\">8<\/td><td class=\"column-2\">717<\/td><td class=\"column-3\">Hong Kong<\/td><td class=\"column-4\">8<\/td><td class=\"column-5\">469<\/td><td class=\"column-6\">Netherlands<\/td>\n<\/tr>\n<tr class=\"row-10\">\n\t<td class=\"column-1\">9<\/td><td class=\"column-2\">627<\/td><td class=\"column-3\">Thailand<\/td><td class=\"column-4\">9<\/td><td class=\"column-5\">458<\/td><td class=\"column-6\">France<\/td>\n<\/tr>\n<tr class=\"row-11\">\n\t<td class=\"column-1\">10<\/td><td class=\"column-2\">495<\/td><td class=\"column-3\">Bulgaria<\/td><td class=\"column-4\">10<\/td><td class=\"column-5\">411<\/td><td class=\"column-6\">Bulgaria<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<span id=\"tablepress-32-description\" class=\"tablepress-table-description tablepress-table-description-id-32\">Internet Attacks as logged by Norse IPViking on 6-25-14 approx. 11:00 to 16:00 <\/span>\n<!-- #tablepress-32 from cache -->\n<p><strong><em>rb-<\/em><\/strong><\/p>\n<p><em>I have posted a couple of good maps on <a title=\"DDoS Attack Map\" href=\"http:\/\/wp.me\/p2wgaW-4TP\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a> <a title=\"The Internet as a Subway Map\" href=\"http:\/\/wp.me\/p2wgaW-SC\" target=\"_blank\" rel=\"noopener noreferrer\">before.<\/a> This map relays a lot of good info while being mesmerizing also. The amount of malicious traffic flying at U.S. sites is staggering. The attacker&#8217;s emphasis is on basic network services, SSH, SIP, AD, SQL, DNS, HTTP, SNMP. Attacks on the basic services we rely on reinforce the urgency for U.S. network users to get their basics in order. The U.S. and China are locked in an escalating war about online spying that threatens to devastate business for companies in both countries.<\/em><\/p>\n<p><em>N<span class=\"itemprop=&quot;articleBody\">ow for the really scary part. This IPViking map only reveals the tip of the hack-attack iceberg. It only shows penetration attempts against Norse&#8217;s network of <a title=\"Honey Pot\" href=\"http:\/\/en.wikipedia.org\/wiki\/Honeypot_%28computing%29\" target=\"_blank\" rel=\"noopener noreferrer\">&#8220;honeypot&#8221; traps<\/a>. The real number of hack attempts lighting up interwebs at any given moment is far, far greater than this cool piece of big data mining can ever possibly show.<\/span><\/em><\/p>\n<h6>Related articles<\/h6>\n<ul>\n<li>A secure cloud can keep an enterprise safe from attack (cloudentr.com)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Norse #IPViking offers map of who is hacking, who is being hacked and with what in a browser window that looks like Missile Command from back in the day<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[2292,2167,2170,2172,1901,2162,2887,1796,1324,77,1915,2163,2161,2171,4,2166,2169,2168,2165],"class_list":["post-70191","post","type-post","status-publish","format-standard","hentry","category-security","tag-2292","tag-active-directory","tag-attack","tag-dection","tag-dns","tag-hacking","tag-honeypot","tag-http","tag-innovation","tag-internet","tag-ip","tag-ipviking","tag-map","tag-norse","tag-security","tag-sip","tag-snmp","tag-sql","tag-ssh"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/70191","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=70191"}],"version-history":[{"count":7,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/70191\/revisions"}],"predecessor-version":[{"id":120299,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/70191\/revisions\/120299"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=70191"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=70191"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=70191"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}