September 30th, 2024

Ping Storms at GreyNoise

David Schuetz explored "ping storms" and ICMP traffic data from GreyNoise, analyzing packets with "LOVE" to investigate covert communication, but found flaws and misidentifications suggesting academic project involvement.

Read original articleLink Icon
Ping Storms at GreyNoise

David Schuetz discusses his exploration of "ping storms" observed by GreyNoise, a cybersecurity company that monitors internet background noise. During a recent talk at BSidesNoVA, Andrew Morris from GreyNoise highlighted a significant increase in ICMP traffic and incomplete TCP handshakes, which they refer to as "ping storms." Schuetz became intrigued by the data and began analyzing a smaller dataset provided by Morris. He developed a tool using the Scapy library to parse the data, focusing on ICMP packets that contained the word "LOVE" in their payload. Schuetz speculated on the possibility of covert communication through these packets, likening it to historical espionage methods. However, he identified several flaws in this theory, including the impracticality of the method and the limited data capacity of the packets. His analysis led him to discover that some packets were misidentified by Wireshark as "HIPERCONTRACER" packets, which are used for monitoring packet travel time. This revelation suggested that the observed traffic might be part of an academic project rather than covert communication. Schuetz's investigation illustrates the complexities of analyzing network traffic and the potential for misinterpretation in cybersecurity research.

- GreyNoise monitors internet background noise, including ICMP traffic and TCP handshakes.

- Schuetz analyzed ICMP packets containing the word "LOVE" to explore potential covert communication.

- He identified flaws in the theory of covert communication through ping storms.

- Some packets were misidentified as "HIPERCONTRACER," indicating they may be part of an academic project.

- The analysis highlights the challenges of interpreting network traffic in cybersecurity.

Link Icon 4 comments
By @emilamlom - 7 months
Really interesting puzzle. The author also has an update on the other packet types: https://darthnull.org/noise-storm-update/
By @ThinkBeat - 7 months
I liked that article. It was interesting to see the paths he chose and the progress and partial results. I also learned about new ways to use certain tools.

It all reminds a lot of Dan Kaminskys classic presentations at DefCon where he found new and interesting places where that could fit and what you could do with it.

When I clicked on Graynoise corporate website to read their posts on it and it sounds pretty close to armageddon.

" Something is happening, we think you need to be really scared. The only thing that will help is to buy the services our startup provides you"

>These events have stumped cybersecurity experts and now pose new, complex risks, demanding attention from security professionals worldwide. These persistent mysteries add new layers of complexity to the cybersecurity landscape, prompting security leaders to reevaluate their defenses and ensure they are equipped with the right tools for an ironclad security posture.

> China China

>Prioritize What Matters: With an overwhelming number of alerts, it’s critical to employ tools that cut through irrelevant noise and prioritize actionable threats. Optimize Resource Efficiency: With security teams under immense pressure, solutions that reduce false positives can help optimize time and resources. Be Proactive: Reactivity is no longer sufficient. Noise Storms demonstrate that security is about anticipating and mitigating risks before they cause disruption. Use Actionable Intelligence: Sophisticated threats require real-time, actionable intelligence capable of detecting traffic anomalies like Noise Storms — and any black swan that may follow.

By @twisteriffic - 7 months
Smells like the kind of location triangulation that IPinfo.io has talked about engaging in.
By @arjvik - 7 months
Using noise scanners explicitly as a data exfiltration mechanism is actually a genius idea!