This page has been archived and commenting is disabled.
Is This What The First World Cyber War Looks Like: Global Real Time Cyber Attack Map
After a series of cyber failures involving first UAL, then this website, then the NYSE which is still halted, then the WSJ, some have suggested that this could be a concerted cyber attack (perhaps by retaliatory China unhappy its stocks are plunging) focusing on the US. So we decided to look at a real-time cyber attack map courtesy of Norsecorp which provides real time visibility into global cyber attacks.
What clearly stands out is that for some reason Chinese DDOS attacks/hackers seem to be focusing on St. Louis this morning.
Whether this is related to the series of suspicious cyber failures today, is so far unclear, although if there is a connection at least there is a way to keep track of the first global cyberwar in real-time.
- 537016 reads
- Printer-friendly version
- Send to friend
- advertisements -



Maybe all that talk about US-China wars was not just talk
WW3 is VERY BAD for Humans.
The China mkt dump has come on subtle as a heart attack.
I like that one dude down in south India - he seems like a cool cat down there all by himself.
JPM, CITI and Goldman have NOT been dumping stock in Shanghai.
ZH is based in Zug Switzerland.
All open orders have been cancelled..., does that negate stop-loss orders?
The tubes are full.
DAMN! Spain is getting at it!
Thank dog Greece didn't matter.
ZH was down because its servers in Switzerland were swamped: http://zerohedge.com.ipaddress.com/
Far more important than WSJ cyber attack.
Is this that same fake Viking company/site of last year?
Occupy Furguson!
Would you like to play a game?
Found this on jsmineset. Perhaps it is related.
http://www.thelocal.de/20150707/german-missiles-taken-over-by-hackers
Fire ze missiles!!
https://www.youtube.com/watch?v=kCpjgl2baLs
Throw some EMP into the mix and let's see what materializes.
that live map is insane...is every day like that or is today some big attack day? My home interweb speed is very slow and glitchy today too. Wondering if it could be related to whatever the hell is going on.
Other than St. Louis being attacked non-stop from China, there's also what shows as an unknown military base off the west coast of Africa showing taking attacks from China and Kansas City, USA. Wonder what that base is???
Thats the trading floor of one of China's "dark pools" they are trying to buy the dip since their own market is shut down /s
missile command
Pew! Pew, pew! Pew, pew, pew! Pew, pew! Pew!
And this. Coincidence?
“Once is happenstance. Twice is coincidence. Three times is enemy action”There is a lot more than this malicious traffic going on in the world. This map is a joke.
obvisouly you never hold a private server under linux with fail2ban and whois about the ip on the .log ..... if you were so you would figure out that 90% of attack comes from china...
Is that the Federal Reserve St. Louis being attacked? Does the Fed run their PPT equity investment operations out of St. Louis? Might they be the target of the Chinese?
You know they had to be going after Scottrade. Stupid Chinese don't even know it's the E-trade baby who is heart and center of this ponzi scheme. Who'e ever heard of the Scottrade baby?
Well, this is a no-brainer...
http://www.archives.gov/st-louis/
Cyber-war looks like a fat slob jerking off to internet porn. It's not a pretty sight. Just saying.
Note that the #2 source of attacks as shown on the same graphic, is the United States. #2 in the world for hacking, intrusion, denial of service, and malware. Something to be proud of, good job NSA.
us navy flotilla ????
This has the smell of a flase flag all over it. The Chinese are good at this stuff and know how to cover their traces. This looks like more "Conditioning" of the Sheeple in preparation for Chinese sanctions etc. I hope the neocons discuss matters with The Fed before they start because there is the small matter of the $1.5 Trillion in Treasuries held in China's reserves.....at least for now.
They expect that 1.5T to go way down in value..
That’s why they have hedged by amassing a mountain of gold.
BTW, they have at least 100,000 military and civilian engineer hackers working on this.
And how could anybody not vote this post a 5?
It's like this each and every day.....China does love to do some Cybershizz....
St Louis is where Herbert Walker is from. Just sayin'.
funny that north korea never blames them, tho
My daughter-in-law works in cyber security. She used to work for the Fed in Chicago up until last month. She told me that they would have hundreds of thousands of attack each day, all day every day.
I think it's just a matter of time. Sort of like evolution. At some point something is going to work when you try enough combinations.
Where do people get the time to hack 24/7? Don't they have a life?
Making iPhones makes Jack a dull boy
mAkING IPonES Maykie Yack a droll yoy
makin foNE drone boi
Maybe they have developed HFH software for continuous hacking free of human intervention.
You really think this is all just random individuals? Wake up and get a grip!
..see my comment above
Happily, the Zil is EMP-proof.
The maroons trashed the oil price market to punish Russia and took out the entire US shale fracking industry as collateral damage.
The maroons trashed the Chinese stock exchange to punish China and took out the NYSE as collateral damage.
Had that song in my head all day today..."Hoydy Doody time."
No idea why.
Couldn't get into the Hedge again and again either.
darndest thing "unintended consequences."
Folks love what Specators can give them...I guess it's time to find out what happens when al that gets taken away.
All this debt for so little growth...
...but failed to launch them?
Nothing really of interest in STL, i left that smoldering pile of dung. All I know is that Edward Jones HQ is there, as is a big gov data center of unknown purpose. Boeing has some assembly plants there, but most of the corporate stuff all got moved out long ago...
St. Louis was the hub for Bell Telephone's trunk lines back in the day. Don't know STL is that important anymore. FWIW.
Weird.....can't make toll free calls from at&t today......Hmmmmm?
Scottrade anyone?
Scottrade anyone?
https://chinese.scottrade.com/zh_CN
Yeah i just FB'ed that STL is a pit and they should focus on KC at least KC has the KC Fed.
FUCK YOU MAN, i live in this shithole called kansas shitty.
There is a Fed reserve branch in STL also...
Yep, and as previously alluded to, the Edward Jones HQ. Don't forget Wells Fargo Advisors, Stifel Nicolaus, and Scottrade all call StL home. Lots of money rolls through those companies.
Yep, and as previously alluded to, the Edward Jones HQ. Don't forget Wells Fargo Advisors, Stifel Nicolaus, and Scottrade all call StL home. Lots of money rolls through those companies.
For some reason, it IS of interest to the Chinese.
Huge internet infrastructure backbone outside of St. Louis.
Could they be targeting Cybercon?
https://www.cybercon.com/data-center
I'd rather play a nice game of chess.
+1000 thanks for the laugh redpill
https://www.youtube.com/watch?v=KXzNo0vR_dU
Setting the precedent for when the "Russian cyber boojie men" attack the banks and, "OMG, all your money is gone!!!!".
I clicked on that site. The fan in my laptop started going full whizz. Just went back to normal a few seconds ago.
You have a HP laptop right? Mine did that all the time. Killed it and bought a Dell. I will never buy another HP product again.
This was on my work macbook - perhaps a swan song of planned obsolescence. We bought an HP PC for the family during the HP / Compaq merger. The CPU died after a year - no surprises there. Even the CRT monitor died. Inexcusable!
My HP laptop=pos. My xw6600 workstation=excellence.
Fuck the Swiss.
Too neutral.
They aren't neutral when it comes to EURCHF!
Looks like St. Louis fired a shotgun at the PRC.
Hit Mericans where it hurts, Budweiser.
Isn't Budweiser german owned?
InBev maybe?
DaddyO
Belgian, but close enough...
What...the US is not attacking anyone? Israel? And what about the NORKS? This can not be comprehensive.
We've reached the end of the internetz
You see, the deal with U.S. corps owning (directly or indirectly) most of the internet switching means that 'we' (the U.S.) can make it look like a cyber-attack from ANYWHERE ON EARTH. The attack looks like it's coming from China because that's what the government wants the MSM to repeat - over and over and over again.
Ever wonder why they don'f fake attacks from Russian IP addresses? Because Russians can promply pull all the logs and show that any such claims made by the U.S. is a lie - the traffic isn't really coming from Russia at all but just a bunch of spoofed addresses.
China can't (or won't) do this because of the technical nature of their firewall. It's technically possible and they do several days after the fact for interested parties, but by then the 'evil Chinese cyber-terrorists' narrative has played out once again. The only thing they can do right away is deny it, but the denials are quickly dismissed by MSM.
Here's the thing: China would never launch a state-sponsored cyber-attack from their own IP addresses - it's unnecessary and STUPID. A junior high-school kid can use a server half-way across the country. Why the fuck would the Chinese use internal ones? And with China's Great Firewall and internet monitoring, there is no way any private party inside China is going to use Chinese servers for an attack. Think: labor camp and organ harvesting.
I can't believe the MSM still thinks everyone can be so easily fooled by the 'Chinese' cyber-attack stories when it makes absolutely no sense from a technical standpoint. The first thing you need to immediately ask yourself when you hear about such B.S. is:
A fellow I know that works for a state internet security agency told me that most cyber attacks emnate from within the U.S. THey just always blame whoever happens to be on the Washington most disliked list at the time. And of course, no real hacker would use his own IP address/location for an attack, DUH!
big 's' in 'State' or little 's'?
Yes its funny the Americans are not fighting back according to the pretty picture. So much for the NSA.
I work in tech, I can tell you that some small municipalities have completely blocked all traffic from outside the US with the exception of some Western European countries simply because they are attacked NON-STOP from China and to a lesser degree Eastern Europe / Russia and the middle east. We just simply block their countries full ip range.
so basically a voluntary north korea
I work in tech too and this could easily be overcome via VPN and a pipe which is not blocking IP traffic. Blocking IP ranges is censorship even if it's in the name of security.
It doesn't stop the attacks from happening. It only censors voices outside the US.
Apparently you make no distinction between what a country does to its citizens and how a private company configures its firewalls.
as it should be at a minimum.
I work in tech, and if it aint got to do with business, wtf business do you have going there. A smart network designer doesnt give his users unfettered access, its just asking for trouble.
You obviously don't work in a building with gummint workers.
A lot of government offices (ie, certain spooky TLAs in particular) are air-gapped off the internet. You can't get email.
Yes, air-gapped, and really, REALLY secure. Just like our local police who cannot receive a picture in an email attachment for "security" reasons.
Quite a few years ago, when I had to send such a picture, I was told that it would not be possible, but that I could snail-mail a USB stick with the picture. So I did. Being a curious ICT security professional I also added a small autorun executable that would try to access a web page I controlled, and then display a pop-up saying "Your PC has been hacked. Please call $PHONE". The web page would send me an SMS when it was accessed. (I only dared do this because I was a respected ICT security professional with a clean record. And because I had good relations with the IT security people at our national police, who I had previously helped with another serious security issue. And even then, I did not do it before consulting with an expert lawyer in the field who adviced me pro bono, returning a favour).
Two days later I got my SMS; the web page had been accessed. And a few minutes later I got a call from an angry and annoyed police officer who wanted to send me to jail for hacking his PC. I kept my cool, and explained to him this was just a test of security, and that the USB stick was evidence that would tell the court it was no real attempt at hacking him. Then I told him how to disable autorun, and he asked me how he could trust my advice at changing settings on his PC. I told him this was a good attitude for IT security; that he should not trust some random person on the phone, but that the problem was real, and he should get my advice confirmed by his internal IT support. That cooled him down a bit, although he still maintained he would get jail time for me.
I could, if I had been malicious, taken complete control over his PC. Because browsing on the net was allowed, I could have remote-controlled it. A keylogger could have told me passwords he used to access other internal police systems, so I could have accessed them myself via his PC without him knowing.
I hope that my reporting this issue to our national police IT security helped getting the problem fixed, although it took almost a year until I was informed that autorun had been disabled on all PCs.
There is a lesson to be learned here: Air-gapping and other security measures do not always enhance security. Instead they can create a false sense of security, and introduce problems that have to be worked around. And the work-arounds create new security problems that can be exploited.
I've been doing network administration for as long as the profession existed. In old days of WinNT servers all I did for days on end was write counter-attack templates for web servers. Back then servers and traffic were expensive so hackers were constantly scouting for corporate servers they could hijack to use as content repositories. There were no good firewalls. Every defense measure had Swiss cheese sized holes. I'd sit at my desk and wait for "weird". As soon as an attack took place (which was every 10 minutes or so in late 90's), I'd observe the pattern - ports, packets and other peculiarities, write a .vsb filter, add it to software firewall and wait for the next one. I learned so much in those days. I borrowed a lot of code from hackers themselves and written productivity tools - utilities that would distribute legit software updates and patches across corporate LAN's. I still borrow virus code religiously. And you want to know why? Because viruses contain some of the most brilliant streamlined and non-copyrighted code! Non-copyrighted! No hacker in the right mind would trademark his creation. That means, as far as I'm concerned, that the code is in public domain.
Julia, you say the "old days," but wasn't the recent State Department hack of passport and visa information because they were still running Windows Server 2003? It's essentially an updated version of Server ME, which is a tweaked version of NT.
And now, after all is said and done, they've announced their switch to Linux, so in a roundabout way, they've learned the lesson you did over a decade ago about the beneficial nature of open source code ;)
That's how all big businesses operate - they don't upgrade until SHTF. I've seen telecommunication servers from late 80's being used to this day. Old IBM's with passive cooling. Modern machines all have fans in them and actively cooled power supplies. Without modular replacement such devices will rarely last beyond 5 years.
Because of corporate upgrade habits I was able to make a small fortune once. I typically keep machines that I retire in a storage locker and I had this one ancient motherboard. One day a colleague calls me up in the middle of the night because his firm's email server went down. The mainframe motherboard fried and the friend was well aware that I had one exactly like that stashed away. They needed it by sunrise. Using such opportunity to upgrade equipment wasn't even considered. Their bosses were yelling at them to get the systems running before the morning shift. They've given me a blank cheque for the board and I used to finance an entire equipment lab that I wanted to set up for myself. All because of an old piece of gear that on e-bay would only fetch a couple hundred bucks.
There are countless "ancient" machines still in control of vital aspects of our lives. I've read somewhere that NASA still used floppies to program the space shuttle before they retired it.
CalPERS uses some outdated language for their accounting that only 2 people in the US know how to program.
The list goes on...
Packet sniffers are hardly an "attack," but okay. And as a commenter noted above, if any of these attacks were State-sponsored, they wouldn't be routed through their own country's IP addresses. Good that your company blocks them, of course, but only one in a thousand of these script kiddies are actually a security threat.
...and is this the same NORSE Cyber Security that's getting massive DHS grants for Jeh Johnson's new "NCIC" program?
http://darkmatters.norsecorp.com/2015/04/29/dhs-to-spend-600-million-on-...
http://darkmatters.norsecorp.com/2015/04/22/dhs-secretarys-remarks-on-se...
The Hedge is becoming an interesting mix of Truth and utter propaganda. Hope y'all out there are clever enough to sort out the corn bits from the cowpie.
By the way, not long ago a company network that I service here in WA started having difficulty accessing the internet. Anything to do with web content slowed down noticeably. I checked the entire internal infrastructure and found no signs of intrusion which I suspected. Then just out of curiosity I did a traceroute. It turned out that most of the traffic, for no apparent reason, was being routed through Israel. The company does no business with them, uses no Israeli equipment or software. Something like this could only be done at the ISP level. Why Israel, who was intercepting it and why, I couldn't find out.
I told the firm to switch their provider and they did. Now things are back to normal.
Did any sysadmin here have similar experiences?
I worked with an Israeli data storage manufacturer once. Their gear required constant communication with the home base for licensing and statistics exchange. But that process was fully transparent. I knew what kind of data was going out and what was coming in. This time it was nothing like that. Different firm. Local presence only. No funny business.
Fucking nuts. I remember hearing somewhere that DyneCorp's voting data was funnelled through Israel before coming back to America to be "counted," but I'm not sure if that's actually true or not. I think it was an excerpt from the HBO documentary, "Hacking Democracy."
Regardless, I'm glad most sysadmins in America are good, privacy-minded people at heart. You guys and gals are a powerful bunch; I just hope that if this whole "Internet of Things" nonsense companies like CISCO are pushing goes as awry as it could, there would be people on the inside who would do the "right thing."
"...Did any sysadmin here have similar experiences?..."
Not a sysadmin, but I assure you (in that anonymous internet kind of way) that this happens with disturbing frequency. Israel isn't the only snoop, just the most eager one right now. The NSA had a couple of (what seemed to some of us) pretty obvious regional routing hijacks early this year for a few hours at a time. Likely just a 'test' for when they need to isolate friendly/hostile territory inside the U.S. for the good of the nation.
"...It turned out that most of the traffic, for no apparent reason, was being routed through Israel. The company does no business with them, uses no Israeli equipment or software. Something like this could only be done at the ISP level. Why Israel, who was intercepting it and why, I couldn't find out..."
Your ISP (maybe) and it's IX (for sure) use some Israeli hardware/software. As for "why..." well, the last time I was involved with this kind of issue was a few years back with a U.S. financial firm. The overnight data feeds (all U.S. domestic) were having an issue - mostly to do with issues at IIX. No, none of them should have been routed through Israel. Hmm. If you're in a smaller firm and use someone like Comcast, then your traffic can be forked, inspected and copied at will. It's done all the time to make sure your not sharing their IP crap. They seem to love Israeli snooping gear and companies for some reason.
Some people suggest it was for various U.S. spook agencies to subvert U.S. domestic spying laws and outsource - warehousing siphoned data overseas in another friendly, yet equally repressive psychopathic regime's data center. It's not our spook's data, it's our allies and we all spy on each other and then share so... it's OK, I guess (in the legal weaselease kind of way). Personal tinfoil hat observation: I know I could make a crapload of money in the market knowing what certain U.S. companies were up to by tapping their internet traffic for a few hours.
Sometimes I suspect that the ISP's follow me around solely for taking interest in ZH.
I'd be less paranoid if I haven't read Kevin Mitnick's autobiography. Now, where did I put that tinfoil hat.
Ever since Glimmerglass 'partnered' with Bynet a decade ago, everything at Layer 1 can be considered compromised.
Bynet: proud contributor to the deaths of 2,500+ Palestinian civilians;
Glimmerglass: spying on optical communications for the world's most brutal dictators for high-speed, automated repression and kill-list development.
Doesn't seem like the US has showed up for battle, not many counterattacks going the other way. C'mon Elon, Sergei, time to suit up for your country!
Bullish!
Probably a contractor, a "Shadowrunner" decking for China.....
Time to call in a Neuromancer.
null sweat, chummer
do you mean singapore ?
Yes!
do you mean singapore ?
No!
do you mean singapore ?
Maybe!
If it is, who knows who will end up winning the war, but this battle is leaning toward the US.
Avoid sharing your desperate wet dream websites . BS .
Is it possible that china flooded the nyse with sell orders and the nyse shit a brick!!!!
Come join us for free at www.gunsgrubandgold.com
No worries.
It's all "priced in" Beeches;)
What could go wrong?
Good for cockroach domination, though.
It'll be good for drones. Think of all the new drone births.
the chinese govt came right out and accused (either western or US) entities of shorting their exchange for devious purposes, so this could be retaliation.
WWIII is bad for humans, but great for bizinizz, so bizniz wins!
WW3 is the war against the banksters and bankster families so it is good for humans and bad for George Soros, Rockefellers, Rothschilds Kerry's, Bush's Cheney's Bandar's and degenerate pedophile royalty everywhere. That is why one of the articles today talked about the Chinese blaming Soros. The oligarchs are the enemies against nations and other oligarchs whose base of power resides in certain nations. What I assume will begin happening is that national defense operations will begin assassinating foreign oligarchs. That is the phase of the game we are at now. Physical wars reached their limits in WWII, State sponsored financial terrorism reached its limits from 2008 on and now that FRAUD has reached its limits in that real world wealth has to be created to fund future financial terrorism we are about to see oligarchs using state sponsored assassination of foreign oligarchs and their families as a means to conquer the world.
Time to sit back and watch the show.
so is www
Bad for humans? Sounds like it ain't too crash hot for machines either.
But who will make our iPhones?!?
NOT OUR KIDS! THAT’S FOR SURE!!
Those screws are so tinny that you can only use Azian 6 year old hands... not American sausage finger 6 year old hands...
AND IPHONES WOULD COST 5 BUCKS MORE IF THEY WHERE MADE IN AMERICA!!
THAT WOULD’TURN THEM FROM EXPENSIVE TO TOOOOOO EXPENSIVE!!!
Like that line from movie Crazy People - "Sony. Because Caucasians are just too damned tall."
About 1:50 in...
http://youtu.be/2fIIqFpZdy0
Buy Volvos.
They're boxy but they're good.
Love my Volvo XC70, except for the $2300 throttle body we put in earlier this summer, and just now another $2400 for air conditioning issues. On top of the $900 worth of tires I just put on her. Sigh. But I can't get myself to just buy a damn Subaru.
My 2000 Subie is about to tick 300K miles. Just spent a whole $400 on tires. Putting in a new center diff on Monday ($1500)...my fault for not staying on top of the tire wear. The thing still pulls up the "Grapevine" in 5th gear.
Gonna hate giving it up, when we are all living in vans down by the river.
Volvo; the car you should be driving, when you really shouldn't be driving.
Too bad for the people that the ones doing the attacks are doing it at the behest of their employers at HF.
BALLROOM BLITZ !!
https://www.youtube.com/watch?v=VzpWJx3I2DY
How prophetic:
In all circumstances take up the shield of faith, with which you can extinguish all the flaming darts of the evil one
Ephesians 6:16
Shield of faith? Faith in what? Server security? Sysadmins? Linux?
The only thing faith shields you from is reality.
What was the interpretation of this passage before electricity?
Obviously it cant have been correct, because this piece of writing from ~60AD by some guy imprisoned by the ancient Romans is clearly a phophetic message to the future offering advice about defending against cyber attacks.
Major apologies, dudes!
We just now got in our new Trovicor Monitoring Center at my place of employment and I accidentally pressed the wrong button!
https://www.wikileaks.org/spyfiles/docs/TROVICOR-2012-PariExpo-en.pdf
Turns out the attack focused upon
FERGUSON!!!
Norsecorp says no...st louis is their head quarters and they said no.......
Maybe if the NSA can stop monitoring everyone's favorite porn sites (and their own) they can respond to these attacks? Or or they only a political monitoring agency?
'you' are the NSA's favorite porn site:
https://www.youtube.com/watch?v=OMOGaugKpzs
Our great computers
Fill the hollowed halls
https://www.youtube.com/watch?v=RtdKhwhAcd4
No they just need more funding, everything will change for the better if they only get more funding.
Whatever foreign intelligence the NSA gathers, you must always be cognizant of the fact that the NSA has been and almost certainly is being used for domestic law enforcement purposes. It is known that they'll pass information along to the DEA's Special Operations Division, who will then tip off local LEOs who will find a reason to stop the person, then the "parallel" reconstruction of the evidence happens. A US Attorney in Florida had to drop a major drug case when it was found out that the NSA was where the "tip" had come from.
http://www.reuters.com/article/2013/08/05/us-dea-sod-idUSBRE97409R20130805
So does the NSA do any actual foreign intelligence gathering? Probably. But I'll leave it to you to figure out what the totality of the NSA's scope is and leave you with just two words: Mission Creep.
The NSA data is for commercial espionage and retrospective political blackmail
IMO, you're thinking too small. Think "Full Spectrum Dominance."
.
It's entirely possible that the NSA is behind these attacks.
On Juwry 8th 2015 Skrynet became self arare
I haven't logged on in six months, but had too to give this an upvote. Laughed out loud in the office. Thanks.
Still waiting for America to nuke Russia first.
Coffee...out..the...nose...pain...pain....
I'm glad to hear it was only Skynet. I'd just deployed and activated a new, customized version of IPFire at home and within an hour all these worldwide problems started occurring. I was aftaid that the damn thing had escaped into the outer world and had decided to wreak havoc. (A 'feature' I'd tried adding to not merely repel unwanted penetration attempts, but to go after them, sort of.) I swear I will never again 'test' new software on a production system.
"I will never again 'test' new software on a production system."
Now what fun is that?
cardinals manager disclosed large FXI short position?
it's not St. Louis, it's Ferguson, Mo.
"Hands up, dont Short"
I live just outside of St Louis, havent noticed any internet problems at all today. I wonder what institution they ate attacking? cough st louis fed cough cough...
Or Cybercon? https://www.cybercon.com/data-center