Security Radars
(kopie)
(kopie)
Google Search for "Realtime Cyber Attack Maps"
Recent Attack Maps articles
https://www.internationalcybersecuritycentre.com/live-attack-maps-(16)
zie ook Maps [login]
Niet alleen antivirusproducenten als Kaspersky, maar ook netwerkbeveiligingsbedrijven als Arbor Networks en Norse Corp bieden online vrij toegankelijke 'threatmaps' aan die de cyberdreiging realtime visualiseren. Aan de hand van die websites kun je interessante conclusies trekken wat bijvoorbeeld de betrokken landen en de soort aanvallen betreft. Dat het ook leuk kan zijn, zie je bijvoorbeeld bij FireEye. Deze site toont de virtuele aanvallen als raketaanvallen. De producenten maken met deze kaarten reclame voor hun producten. Ze leveren de data voor de virtualisatie als bijproduct door de aanvallen op de infrastructuur van hun klanten te registreren. Bovendien gebruiken de fabrikanten speciale vallen – zogenaamde honeypots – om aanvallers te lokken
intel.malwaretech.com/botnet/wcrypt World Map WannaCry / WCrypt (18.5.2017)
Kapersky Cyberstat Tabel met getallen - actueel
Top 15 Live Cyber Attack Maps for Visualizing ... - Norse Corp
8 top cyber attack maps and how to use them | CSO Online AUG 21, 2017
While the maps themselves are mostly eye candy with limited context, there are some creative ways they can be used.
The common misconception with cyber attack maps is that the data is live, or real-time. It isn't. Most are just a subset of recorded attacks or a playback of sanitized packet captures.
Threatbutt Internet Hacking Attack Attribution Map met geluid / sound
map.norsecorp.com Discussing the data shown on their map, Norse says the attacks are "based on a small subset of live flows against the Norse honeypot infrastructure…"
cybermap.kaspersky.com The attacks shown on the Kaspersky map are taken from on-demand and on-access scans, as well as web and email detections. But it isn't clear just how real-time, the real-time presentation is.
Fortinet Threat Map looks similar to the one from Norse and appears to show a playback of recorded events.As the attacks are displayed, a rotating breakdown of various stats appears in the lower left part of the screen. Fortinet customers have the ability to have a map of their own
Threat Map kaart zet cyberaanvallen realtime op de kaart van Beveilingsspecialist Check Point Software Technologie een interactieve wereldkaart online gezet die visualiseert in real-time hoe en wanneer cyberaanvallen plaatsvinden. Ze wordt gevoed met gegevens uit de ThreatCloud-database, met ruim 250 miljoen geanalyseerde bot-adressen, meer dan 11 miljoen malware-varianten en webadressen van meer dan 5,5 miljoen geïnfecteerde websites. shows historical data that is reset each day at 12:00 a.m. PST. The map is more visual than the one from Norse, but still has the same basic construct. In addition to watching the playback, the top attackers and targets can be viewed historically, with monthly and weekly stats.
Naast een wereldkaart met aanvalslijnen laat de World Cyber Threat Map (Conficker Map) dagelijks statistieken zien, waaronder:
Top 10 landen waar aanvallen vandaan komen
Top 10 landen die doelwit zijn van aanvallen
Type aanval (bot-communicatie, toegang tot schadelijke bronnen, kwaadaardige file-transfers, spam)
Totaal aantal aanvallen per dag
Landspecifieke data over gemiddeld aantal infecties en meest voorkomende aanvalstypes per week en per maand
FireEye Cyber Threat Map lacks the detail presented by the others, and keeps things simple. It tracks historical data and splits it into industry segments and top country of origin for attackers. The data displayed is "based on a subset of real attack data, which is optimized for better visual presentation."
Digital Attack Map tracks DDoS attacks Arbor Networks. with data from Arbor's ATLAS threat intelligence system. The raw data is sourced from more than 300 ISP customers, and 130Tbps of global traffic. The map will visualize DDoS attacks and allow filtering by size and type.
Trend Micro's Botnet Connection Dashboard is a smaller, stripped down cyber attack map that tracks C&C (Command and Control) servers used by botnets (and their targets) across the globe. The age of the data shown isn't clear, but the historical data tracks back 14 days.
AKAMAII SECURITY VISUALIZATIONS Up-to-the-minute cybersecurity intelligence and insight into DDoS threats, The Akamai Intelligent Platform™ consists of more than 210,000 servers in more than 120 countries around the globe and regularly transmits between 15 – 30% of all Internet traffic. AKAMAII SECURITY VISUALIZATIONS Up-to-the-minute cybersecurity intelligence and insight into DDoS threats, The Akamai Intelligent Platform™ consists of more than 210,000 servers in more than 120 countries around the globe and regularly transmits between 15 – 30% of all Internet traffic.
AKAMAII SECURITY VISUALIZATIONS Up-to-the-minute cybersecurity intelligence and insight into DDoS threats, The Akamai Intelligent Platform™ consists of more than 210,000 servers in more than 120 countries around the globe and regularly transmits between 15 – 30% of all Internet traffic.
Norse world map attacks new Every second, Norse collects and analyzes live threat intelligence from darknets in hundreds of locations in over 40 countries. The attacks shown are based on a small subset of live flows against the Norse honeypot infrastructure, representing actual worldwide cyber attacks by bad actors. At a glance, one can see which countries are aggressors or targets at the moment, using which type of attacks (services-ports).
Team-Cymru INTERNET MALICIOUS ACTIVITY MAPS
Interactive Cyber Attack Map
Deutsche Telekom Sicherheitstacho.eu
Google Ideas + Arbor Networks Digital Attack Map
Honey Project HoneyMap
Norse Corporation Norse – IPViking Live - live hacker attacks
FireEye Cyber Threat Map
Global Phishing Activity (24 hours)
CTF365 the map is a great place to start
Shodan ICS Radar (interactive) The Shodan search engine has started to crawl the Internet for protocols that provide raw, direct access to industrial control systems (ICS). This visualization shows the location of these industrial control systems on the Internet as well as other related data.
AV-TEST provides an informative and customer-friendly illustration of trends, forecasts and long-term developments based on a comprehensive inventory of recently collected data and data gathered on a long-term basis
Red Socks heatmap realtime
intel.malwaretech.com o.a. live stats Petya (wcrypt). Wannacry...
DDOS top daily attack map worldwide REAL TIME MAP
interactive world map of DDoS attacks, map Google has just revealed the details on tree new technologies, uProxy, Digital Attack Map and Project Shield, to secure the web and to fight censorship.
Deutsche Telekom - http://www.sicherheitstacho.eu/ Overview of current cyber attacks (logged by 180 Sensors ) De data wordt verzameld door 180 sensoren van Deutsche Telekom die werken als lokaas-systemen (honeypots) op verschillende plekken in de wereld. Volgens deze detectie door DT komen aanvallen vooral uit Rusland, Taiwan en Duitsland.
Honeynet HoneyMap map.honeynet.org/ map hacking locations in realtime. Probably the most impressive: the HoneyMap shows a real-time visualization of attacks detected by the Honeynet Project‘s sensors deployed around the world. The Map shows “automated scans and attacks originating from infected end-user computers or hijacked server systems”. This also means that an “attack” on the HoneyMap is not necessarily conducted by a single malicious person but rather by a computer worm or other forms of malicious programs. Please Notice that, as the creators of the Project declare, many red dots means there are many machines which are attacking our honeypots but this does not necessarily imply that those countries are “very active in the cyberwar”
trendmicro.com/us/security-intelligence/current-threat-activity/global-botnet-map/index.html map
Intel Security/ McAfee - Threat Landscape Dashboard. Assessing today's threats and the relationships between them. Top-1o van Threats, Exploit Kits, Campaigns, Ransomware, Vulnerabilities
SecurityWizardry Computer Network Defense Operational Picture
MsiSac Cyber Operations Center Deskboard
Commtouch online Security Center. commtouch grafisch Commtouch online Security Center Malware, SPAM, Web, Outbreak, Zombie
Talos (Cisco)
Update 02.02.2024