What's new

This Site Shows Who Is Hacking Whom Right Now — And The US Is Getting Hammered

daring dude

FULL MEMBER
Joined
Jul 22, 2013
Messages
836
Reaction score
0
Country
Pakistan
Location
Australia
U.S.-based computer security firm Norse has released a real-time animated map that illustrates ongoing cyberattacks around the world. Without a doubt, the U.S. is getting constantly hammered by hackers.

In just 45 minutes, the U.S. was the victim of 5,840 cyberattacks.


screen%20shot%202014-06-26%20at%2012.11.49%20pm.png

Screenshot/map.ipviking.com

A view of the cyberattacks carried out against the U.S. within a 45-minute span.



Within that span of time, the U.S. suffered from 27 times more cyberattacks than Thailand, the second most targeted country. Thailand was the target of only 220 cyber attacks during these 45 minutes.


The Norse map does not represent all hacking attempts in the world. Instead, according to Smithsonian Magazine, the map relies on a Norse honeypot network — a network purposefully designed to detect hacking — to provide a representative snapshot of global hacking attempts.

In actuality, there are orders of magnitude more hacking attempts on any given day than recorded by Norse. For instance, there are an estimated 20 million attacks per day against locations within Utah. There are 10 million daily hacking attempts against the Pentagon alone.

China is responsible for the vast majority of these attacks. Within the 45-minute span, China accounted for 2,513 attacks. The U.S. accounted for the second highest number of attacks, with 1,550 attacks originating within America. However, a number of American attacks targeted computers elsewhere in the United States.

It is likely that these intra-U.S. attacks are the result of "zombie computers" — computers that have been compromised by a hacker and carry out attacks at the hacker's discretion.

Chinese cyberattacks are highly damaging to both the U.S. economy and national security. China is currently developing a new plane that is modeled after stolen plans for the U.S.' F-35 fifth-generation plane.



Read more: Norse Hacking Map Shows US Getting Hammered - Business Insider

Previously issued on the Topic...

CHART: The Dizzying Complexity Of Cyber Warfare


In January of 2013, the Pentagon's Defense Science Board released an alarming report about the military's vulnerability to an advanced cyber attack. "The cyber threat is serious," the report states in its opening pages, "and [the] United States cannot be confident that our critical Information Technology systems will work under attack from a sophisticated and well-resourced opponent."

The report is about the technological leading edge of threats against U.S. national security — so it's appropriate that it includes a graphic of dizzying complexity, where pie charts, bar graphs, and line graphs vie for attention within a six-chambered thematic grid:


screen%20shot%202014-06-02%20at%2011.58.58%20am.png

Undersecretary of Defense for Acquisition, Technology and Logistics

This graphic appears in a subsection that discusses the possible stress-testing of the Department of Defense's systems against a possible cyber blitz. The authors' goal is to eventually measure the "average time it takes to detect a successful attack that breaches the network perimeter defenses, and the amount of time it takes to recover a system that is lost as a result of a cyber attack." The chart — or chart of charts — is a "notional dashboard of system performance metrics," or a guide for even figuring out how to judge the Defense Department's ability to cope with a sophisticated cyber attack.

A lot apparently goes into such an assessment, including manpower and cost considerations, intelligence gathering, and advanced modeling of how a cyber-confrontation would likely play out. The graphic gives a sense of just how many moving parts defensive cyber-war has to it — even if these complexities make for one of the more bewildering graphics we've come across in a military document.



Read more: This Dizzying Chart Shows - Business Insider
 
Very interesting....!

How did Norsehoney pot network detect whose attacking who and put it on graphics mode in map form?
 
Back
Top Bottom