[ Team Cymru Community Services ] [ Team Cymru Commercial Services ] [ Dragon Research Group ]
Infographic: The Security Skills Challenge - will it really take 20 years to fill the skills gap? wow, just...wow http://t.co/8TDgelnoEX | latest 4 Anonymous hackers plead by phone to misdemeanour conspiring to intentionally damage a protected computer http://t.co/EhHD8sSpuN | survey finds 78% of us think we're not of interest to #hackers. 78% of us are wrong, so terribly horribly wrong http://t.co/ebKxBU8Ykf | Romanian researcher finds Facebook's copious bndwidth leveraged for DDoS attack http://t.co/q2M0RJFWT4 | Exploit Monday – A few Interesting ones to be aware of http://t.co/g2OTFpsQoT | Counterfeit Legal Notices continue to spread malware http://t.co/M7qlAPeENE | Delaware’s Treasury Division Website Defaced http://t.co/cTMU5aoJ4w | Report: 23% of consumers save banking details on multiple mobile devices. No, no, no. http://t.co/PXoqbg9i1L | A Linux Trojan gets ported to Windows, cross pollination of the worst kind http://t.co/hXbyEP1HJQ | Massive 300Gbps DDoS attack on unnamed media firm possible due to Supermicro IPMI flaw http://t.co/1kxHqd4fXz | TorrentLocker #malware combines elements of CryptoLocker + CryptoWall in a new code based targetting Australians http://t.co/DsT6M83vQr | It's enough to give you heartburn...Health network reports 4.5 million patients had information hacked http://t.co/HOoriSaywV | More DEFCON poll results: most prized target are contractors creds, often via their home wifi http://t.co/slXw1cwBmt | Ask the black/gray hat re motives? 51% driven by thrill,19% by money and 86% think they'll never get caught http://t.co/S8Fq4I8xlc | Research finds most common passwords are : Password1, Hello123 and welcome1. Come on people: seriously? http://t.co/uKlHqHP7eS | Google adds Trojan protection to Safe Browsing: already 3M warnings /week http://t.co/Bjcv4V79Na | Hackers only responsible for half of year's data breaches, the rest were device loss or accidental public disclosure http://t.co/pcOLJsuVvy | super clever: researchers work out how to turn Android gyroscopes into microphone bugs, iPhones immune as low freq http://t.co/hyHY2cYKVQ | Apple differs from Microsoft and Google: says it will store Chinese customers data in Chinese datacenters http://t.co/TulHBuoTFw | The Logic of Purposely Using Poor English in Scam Emails: but is it a double bluff? Or a triple one? http://t.co/Ede478FF6Y | Adventures in Honeypots reveal phpMyAdmin scans hidden in 'net noise, via @lennyzeltser (clever chap he is) http://t.co/Rqe7TbdMRj | Funniest iPhone theft story. Ever. http://t.co/kOrPtVWwKw | Cyber Insurance sales up 30+%, great summary from the InfoSec Institute folks here http://t.co/57A9Tn9vSg | Adding insiult to injury: Blackberry Z10 Authentication Bypass Opens Remote Access, but patched network service API http://t.co/Jasu9pEbf1 | Windows users: patch your Adobe stuff today, there's an 0-day about http://t.co/L1NsVHk5n7 | Verisign Q2 DDoS trends: up 216%, peak of 300 Gbps grew 87% year-on-year. Watch out most:Cloud, Entertainment sectors http://t.co/Sx8ei7XZuT | There's a Russian #spyware #snake in at least 10 Ukrainian embassies in a very effective drive-by wateringhole attack http://t.co/NUk9df18xd | iOS Malware Hijacks Revenue from 22 Million Ads http://t.co/fkMZ9T10oE | What do you take with you when you leave your job? Why companies need a security 'exit' strategy for staff http://t.co/YFeQhfKQSW | one to watch: Tenn. Firm Sues Bank Over $327K Cyberheist http://t.co/MDuzXQ8ORz
Team Cymru - SOHO Pharming Update YouTube RSS Feed Twitter

Recent Data

[ Data Page 1 ] [ Data Page 2 ] [ Data Page 3 ] [ Data Page 4 ] [ Data Page 5 ]

Sampled Internet Traffic Rate (daily)

We receive sampled and generalized information about Internet traffic flow rates from many partners, and this chart reflects those rates over the past 30 days, aggregated daily. This is by no means the "full speed" of the Internet, but a way of seeing trends and patterns within the overall mix of traffic.

View all available monitoring graphs

IP Protocol Trends

Our global view of Internet traffic provides many useful insights, one of which is the relative prevalance of various IP protocols. This chart shows the most commonly seen IP protocols, and their relative popularity in sampled network traffic over the past 30 days. Note that the Y axis is scaled logarithmically, so even small differences on the chart reflect significant differences in usage levels.

View all available monitoring graphs

Top 10 TCP Ports (logarithmic scale)

This chart shows the top 10 TCP ports seen in sampled global Internet traffic in our most recent hourly data sample. This chart is on a logarithmic scale, so the difference between the top port (usually TCP/80) and the bottom port may be more significant than it appears to the naked eye.

View all available monitoring graphs

Daily DDoS Attacks

Our malicious activity monitoring includes insight into distributed denial of service (DDoS) attacks launched by various botnets around the globe. This chart indicates the number of attacks seen each day across a subset of our monitoring infrastructure, giving some insight into trends and patterns in miscreant activity.

View all available monitoring graphs

Internet Malicious Activity Maps

Internet Malicious Activity Hilbert Map The map to the left shows network locations of malicious activity on the Internet within the past 30 days, plotted using a Hilbert curve. Check out our Internet Malicious Activity Maps page for full details and a larger view of this and other maps.

Recent Releases

Our contribution to Operation Ghost Click

[17 NOV 2011] On 09 November 2011, US law enforcement released details of a major series of arrests as part of Operation Ghost Click. Team Cymru is proud to have been able to add details of victim computers that were part of this criminal infrastructure into one of our daily feeds of data that is provided at no cost to providers around the world. These lists of affected IP addresses enable network managers to identify and remediate computers infected by malware that are taking part in criminal activities.

This has a direct impact on people: it disrupts criminals and improves the lives of legitimate Internet users everywhere; we're honored to have been able to contribute to this effort. Our great thanks to all who contributed to this team effort.

Details of the case and our commentary can be found in this darkreading.com article. Images of the data we provided to our partners can be found via Twitter here and here.

Unexpected and unsubstantiated blog post

[25 OCT 2011] A recent blog post appeared to draw the unsubstantiated conclusion that more than 760 organizations were compromised with some of the same resources used to hit RSA earlier this year. Team Cymru was one of the organizations named in the posting.

We have no evidence of compromise related to incidents at RSA or anywhere else. The source of the report, and those who revealed and posted it, didn't take the time to contact us, or to share incident details with us. Thus we are unable to investigate further. We hope that those who gathered this data will responsibly disclose it to the potential victims.

Please note that without more details on the methodology used to determine the list of organizations, and a scientific review of the same, it's not safe to assume that an entry on the list means either "victim" or "false positive". We've seen no data or methodology description that would support either case.

New Underground Insight: A Criminal Perspective on Exploit Packs

[05 MAY 2011] The Team Cymru Business Intelligence Team is pleased to announce the release of their latest paper, entitled "A Criminal Perspective on Exploit Packs". This paper chronicles the genesis and historical eveolution of the Browser Exploit Pack (BEP). We discuss our research into the installation and usage of 40 different packs. Most notably, the paper discusses dishonor among coding thieves and the entrenched practice of "statistics shaving". Finally, we examine the monetization, code protection, and overall effectiveness of the various packs. For full details, check out the whitepaper, and don't forget to look at the rest of our whitepapers as well!

Team Cymru moving to Florida

[04 MAY 2011] Team Cymru today announced that they are relocating their headquarters staff from Chicago, Illinois, to Central Florida over the summer. The majority of our Chicago staff will move and are excited at the prospect of continuing to use our insight to improve lives, but from a significantly warmer location.

We do not forsee any disruption to our community or commercial feeds and services during this transition and we will continue to update our partners with news as appropriate. If you have any questions or concerns in the meantime, please e-mail outreach@cymru.com and we will be happy to discuss them with you!

View older news items in our news archives.

Friends of Team Cymru  
  CSIRT-MU DomainSponsor Dyn, Inc. F-Secure  
  FIRST GoDaddy.com Interoute Communications Oversee.net GOVCERT-LU  
  REN-ISAC Savvis Communications Support Intelligence Tata Communications Verizon Business INTECO CERT  

Team Cymru Community Services