Christopher Conrad

26 posts

Christopher Conrad

Christopher Conrad

@CConrad_Sec

가입일 Nisan 2023
47 팔로잉20 팔로워
Christopher Conrad
Christopher Conrad@CConrad_Sec·
In the last 24 hours, Romania agreed to send Patriot missiles to Ukraine (apnews.com/article/romani…). Expect additional attacks on Romanian infrastructure by groups like NONAME057(16).
English
0
0
0
125
Christopher Conrad
Christopher Conrad@CConrad_Sec·
ASERT's continued monitoring of #DDoS #hacktivism and geopolitical tensions uncovered a significant wave of attacks on #Romania staring in early June and continuing this week. These assaults are widespread, targeting various industries and involving numerous adversaries.
English
4
2
3
679
Christopher Conrad
Christopher Conrad@CConrad_Sec·
.@NETSCOUT released their 12th DDoS Threat Intelligence Report! 📈 Dive into the latest insights and trends as they dissect the strategies and methodologies used by adversaries against service providers, enterprises, and end-users. netscout.link/6005btoZX
English
0
0
0
62
Christopher Conrad 리트윗함
Richard Hummel
Richard Hummel@MalwareAnalyzer·
In recent years, political changes in leadership are often accompanied with attacks in cyberspace by opposition or those that reject the viewpoints of elected leaders. This is even more true today with groups like #Killnet, #AnonymousSudan, and #NoName057 in the mix as they typically target countries perceived to be anti-muslim or that show support and solidarity in standing with #Ukraine.
Richard Hummel tweet media
English
1
6
11
1.2K
Christopher Conrad
Christopher Conrad@CConrad_Sec·
Dive into the world of NoName057(16), a prolific DDoS threat actor with geopolitical motives. Uncover their use of custom malware, DDoSia attack tool, and innovative gamified recruitment. @NETSCOUT @ASERTResearch bit.ly/3U7WqGL
Christopher Conrad tweet media
English
0
0
2
75
Christopher Conrad
Christopher Conrad@CConrad_Sec·
Bottom line: NETSCOUT data confirms a dangerous new phase in cyber crime is underway. Unprecedented growth in malicious botnets weaponizing the cloud against us.
English
0
0
0
43
Christopher Conrad
Christopher Conrad@CConrad_Sec·
Also new activity - scans increasing on ports 636, 993, 6002. Potential email server exploits next? What's the end game?
English
1
0
0
48
Christopher Conrad
Christopher Conrad@CConrad_Sec·
These devices are scanning the global internet. Key target ports: 80, 443, 3389, 5060, 6881, 8000, 8080, 8081, 808s, 8888 + more. Goal is expanding botnets to enable DDoS attacks, phishing & more down the line.
English
1
0
0
64
Christopher Conrad
Christopher Conrad@CConrad_Sec·
The biggest source is cheap/free cloud & hosting servers that attackers are turning into botnet launch pads. Trial/free/low cost accounts are providing anonymity & low cost.
English
1
0
1
47
Christopher Conrad
Christopher Conrad@CConrad_Sec·
Since then, daily scans have remained elevated. Previously, 20k high water marks are now in the region of 50-100K. Our analysis finds the activity is originating from just 5 key countries 🇺🇸🇻🇳🇨🇳🇹🇼🇷🇺
English
1
0
0
45
Christopher Conrad
Christopher Conrad@CConrad_Sec·
Then on Dec 29 all the flood gates opened. ~144K distinct devices scanned us in one day! Nearly 10X the normal traffic.
English
1
0
0
36
Christopher Conrad
Christopher Conrad@CConrad_Sec·
Scanning activity rose again Dec 28, with decreasing gaps in time between spikes.
English
1
0
0
38
Christopher Conrad
Christopher Conrad@CConrad_Sec·
Activity dropped briefly, returning to normal levels, before spiking again to ~43K on Dec 20 then declining again.
English
1
0
1
39
Christopher Conrad
Christopher Conrad@CConrad_Sec·
Normal distinct daily scan sources average ~10K, with ~20K high water marks. But starting Dec 8 we saw increases, hitting 35K.
English
1
0
0
43