GreyNoise tells security analysts what not to worry about.
We collect, analyze and label data on IPs that saturate security tools with noise. This unique perspective helps analysts confidently ignore irrelevant or harmless activity, creating more time to uncover and investigate true threats.
Have also been observing the same thing for past several months, albeit on much smaller scale, but exactly what has been described, especially the traffic (or spoofed traffic) from Brazil, Chile, etc. - tons of SYN flood like attacks and port 443 - enough to temporarily cripple some smaller VPS servers. Past several months have seen it ramp up and down, and the past few days, it's increased in intensity again and with more specificity. I had some odd connections in that it appeared that some of these peak waves have also corresponded to bursts of criminal credit card fraud gangs and email bombs looking to cover their tracks and or overwhelm services - coincidence? Really glad to hear some professionals having eyes on this and discussing it. Fascinating! Happy to share the IP's I have collected and firewalled to drop traffic.
What's the big deal? It's somebody with a botnet. Obviously somebody is either testing the capability of the botnet, or it is used as a cover for another attack. Then creating a needle in a haystack scenario.
Re: Vulnerabilities I am not a huge fan of VMware I prefer Proxmox but you should have broken out issues by what things they developed vs. what they bundle from other sources. I.e. SSH or Node2js, etc. Those things are not in their control. And how quickly they react is important.
People behind WEF now planning a major financial crash (like 2008) , global cyber attack & power outage worldwide during this Easter 29-31 March known as “3 days of darkness”. MI6 & CIA are also behind this. This is to take away our rights. Share this quick to avert it esp if u know ppl in cyber security. Their last attack was successfully thwarted thanks to global community. Thank you for the efforts. 🙏
Thanks Andrew - great to hear what you and the team have been up to (and thank you to your on-call team from us too!) And I'm going for a water top-up as we speak... ;-)