NEW CARDING CHAT IN TELEGRAM

The Mystery of "LOVE": Hidden Messages in Cyberattacks?

Friend

Professional
Messages
2,641
Reputation
194
Reaction score
822
Points
113
GreyNoise Intelligence captures mysterious "noise storms" on the Internet.

Since January 2020, GreyNoise Intelligence has been tracking an unusual phenomenon in cyberspace — large-scale waves of fake traffic, dubbed "Noise Storms". The phenomenon baffles cybersecurity experts and creates new complex risks, requiring the attention of security professionals around the world.

Despite ongoing research, there is still no clear explanation for the origin of these mysterious "storms". Experts have theories ranging from covert communication channels and distributed denial-of-service (DDoS) attacks to misconfigured routers.

"Noise storms" are characterized by millions of fake IP addresses generating highly unusual network activity. Most of the traffic is directed to port 443 (HTTPS) and uses the ICMP protocol. Interestingly, UDP traffic is virtually non-existent, making it difficult to detect attacks with tools configured to detect UDP attacks.

While the latest data points to Brazil as the alleged source of the fake packages, experts believe that this is likely another layer of disguise. The analysis showed the connection of the autonomous system (ASN) associated with ICMP traffic to the content delivery network (CDN) serving major Chinese platforms such as QQ, WeChat and WePay. This connection raises further concerns about the possible involvement of more difficult players.

"Noise storms" demonstrate a high level of complexity and purposefulness:
  1. Intelligent TTL spoofing: Time To Live values are set between 120 and 200, simulating realistic network transitions.
  2. Operating system emulation: TCP traffic is adept at spoofing window sizes to simulate packets from different operating systems.
  3. Targeted approach: Recent storms have become more focused, attacking smaller segments of the internet with increased intensity.
  4. Selective targeting: While early storms affected a wide range of infrastructure, recent events have notably bypassed AWS, continuing to impact other major providers such as Cogent, Lumen, and Hurricane Electric.

A curious feature of recent "noise storms" is the inclusion of the ASCII string "LOVE" embedded in ICMP packets along with other byte-changing ones. This seemingly innocuous message only adds to the intrigue, leading experts to wonder if these "storms" are serving as a covert channel of communication.

GreyNoise Intelligence urges network operators and security researchers to remain vigilant and report any such sightings to help solve this ongoing internet mystery. The company has published packet captures (PCAPs) of two recent storm events on GitHub for community review.

GreyNoise Intelligence experts emphasize that "noise storms" are a reminder that threats can manifest themselves in unusual and bizarre ways. Security professionals are encouraged to:
  • Prioritize what's important: Use tools that weed out irrelevant noise and highlight the threats that are genuinely dangerous.
  • Optimize resources: Apply solutions that reduce false positives.
  • Be proactive: Anticipate and mitigate risks before they cause disruptions.
  • Use practical intelligence: Apply tools capable of detecting traffic anomalies in real time.
 

Friend

Professional
Messages
2,641
Reputation
194
Reaction score
822
Points
113
The Internet was covered by a mysterious noise storm, the word LOVE was found in the packages.
GreyNoise researchers report unexplained activity that has been observed since the beginning of 2020.

The company calls it noise waves and has not yet determined its origin and purpose.

Moreover, Noise Storms mainly consist of ICMP packets and TCP packets on port 443 (HTTPS) originating from millions of fake IP addresses from various sources such as QQ, WeChat, and WePay.

An interesting aspect is the presence of a built-in ASCII string "LOVE" in the generated ICMP packets, which adds additional assumptions as to their destination and makes the case more interesting.

Most of the fake traffic is created to look like it's coming from Brazil, but GreyNoise claims to have found some connections to some Chinese social platforms.

Noise Storms generate huge traffic to certain ISPs, such as Cogent, Lumen, and Hurricane Electric, but bypass others, primarily Amazon Web Services (AWS).

TTL values, which determine how long a packet stays on the network, are set between 120 and 200 to simulate realistic network hops.

In general, the shape and characteristics of these noise waves indicate a deliberate effort on the part of an informed actor, rather than a large-scale side effect of misconfiguration.

The company has different theories regarding what is happening, such as misconfigured routers, complex C2 servers, or attempts to carry out sophisticated DDoS attacks.

GreyNoise decided to disclose its observations to the public in the hope of helping the community unravel the phenomenon and find out the true causes of the noise storms by publishing intercepted PCAP packages for the two recent waves on GitHub.

a91f11955a.png


• Video:
 
Top