No Result
View All Result
Global Finances Daily
  • Alternative Investments
  • Crypto
  • Financial Markets
  • Investments
  • Lifestyle
  • Protection
  • Retirement
  • Savings
  • Work & Careers
No Result
View All Result
  • Alternative Investments
  • Crypto
  • Financial Markets
  • Investments
  • Lifestyle
  • Protection
  • Retirement
  • Savings
  • Work & Careers
  • Login
Global Finances Daily
No Result
View All Result
Home Protection

‘Very Noisy:’ For the Black Hat NOC, It’s All Malicious Traffic All the Time

May 13, 2023
in Protection
0
'Very Noisy:' For the Black Hat NOC, It's All Malicious Traffic All the Time


BLACK HAT ASIA – Singapore – When you’re in an environment where the overwhelming majority of network traffic is classified as posing a severe cybersecurity threat, deciding what to be concerned about becomes not a needle in a haystack situation, but a needle in a needlestack problem.

That’s the word this week at Black Hat Asia, where Neil Wyler, global lead of active threat assessments at IBM X-Force, and Bart Stump, senior systems engineer for NetWitness, took to the stage to give attendees a look inside the event’s enterprise-grade network operations center (NOC). The duo oversaw the NOC’s design and led the security team for the show, which ran from May 9-12. The multi-vendor network supported attendee Wi-Fi access; internal operations such as registration; the needs of business hall stands; and the communications requirements of technical trainings, briefings, keynotes, and vendor demonstrations.

“When we discuss the traffic, try to explain to others that at Black Hat it’s bad all the time — all or most of the traffic is malicious,” Wyler explained. “That sounds scary, but for this crowd that traffic is normal. There are people demoing attacks, there are red teams trainings going on, etc., and that means that we don’t really block anything. We let that traffic fly because we don’t want to take down a demo on stage or on the expo floor. Unless we see a direct attack on our infrastructure, say the registration system, we let it go.”

So, in order to ferret out the actual bad, bad traffic, the NOC relies on a number of dashboards that allow a real-time view of everything flowing through the network, with the ability to capture stats on everything from device profiles to which cloud apps attendees are connecting to. It also captures raw packet data so NOC analysts can go back and rebuild sessions in the event something seems abnormally suspicious, to look at “every single thing someone is doing with every packet, in a way we can’t using just logs,” Wyler noted.

One of the more unusual dashboards put in place for the event offered a heat map of where Wi-Fi, Bluetooth, and even peer-to-peer wireless connections were being used, offering a quick look at where people were congregating and where there might be cyber issues afoot.

“It’s an interesting perspective,” explained Stump. “The bottom left corner of the map is actually the show floor, and after the business hall opened up, that got more red. You can see when breaks are happening and when they put the beverages out because people migrate. And overall, it’s a quick visualization for us to see where potential issues might be coming from, where we should focus our attention.”

A heat map of where devices connected to the network.

In all, the NOC tracked 1,500 total unique devices connecting to the network across mobile phones, Internet of things (IoT) gear, and other endpoints, with DNS queries at their highest for the event since 2018. About three-quarters (72%) of that traffic was encrypted — a refreshingly high amount, the researchers noted. And interestingly, a domain called Hacking Clouds hosted the most user sessions — more even than the show’s general Wi-Fi network for attendees.

In terms of the apps being used, TikTok made an appearance in the Top 10 for the first time, the team observed. Other top apps included Office 365 (no surprise there), Teams, Gmail, Facebook, and WhatsApp.

Interesting NOC Happenings

A few interesting incidents emerged from the data during the event, the duo noted. In one case, an individual was generating so much malicious activity that all of the NOC systems alerted at once.

“One particular person was so noisy that every NOC vendor partner saw their activity at the same time,” Wyler said. “We’re talking SQL injection on public-facing websites, WordPress compromises, lots and lots of scanning for vulnerabilities and open ports. It was like they learned something this week and went, ‘Let me see if it works. I’ve heard about Log4j, let me see what’s out there.’ They took a training class and now they’re spreading their wings and flying.”

After the person moved from attacking restaurant chain websites to probing payment sites, it was clear the activity wasn’t demo-related, so the team pinpointed the person and sent the individual a cease-and-desist email.

“We figured out they were sitting in the hallway looking out at the Bay, just attacking company after company after company,” Wyler said. “We explained that it’s still illegal to do what they’re doing, so please discontinue attempting to execute vulnerabilities on public-facing websites. This is a violation of the Black Hat Code of Conduct and we will come find you if it doesn’t stop — love, the NOC. They got that and everything stopped.”

Other incidents involved VPN issues, including one that was transmitting the user’s location information in clear text. The team captured the data, plugged it into Google Maps and generated a view of exactly where the person had been during the day.

Location.jpg
A VPN leak allowed the team to create a map of the user’s location.

Yet another issue involved an endpoint detection and response (EDR) vendor that was sending all of the usage data it was collecting on the endpoints of its users in clear text back to its servers; one antivirus vendor was found sending unencrypted SMTP emails containing pricing quotes and other information in an unencrypted fashion, along with login credentials — allowing easy harvesting.

“An attacker could have pulled down quotes, changed quotes, gathered internal work information and customer information, definitely not good,” said Stump. “It could be used to craft phishes or to manipulate pricing.”

In all cases, the team worked with the problematic entities to resolve the issues. The NOC, quite simply, is on the case, according to Stump.

“People often say that at Black Hat, you shouldn’t even get on the network because it’s dangerous,” said Stump. “But our goal is actually to leave attendees more secure than when they arrived. And that’s why we do things like letting people know they’re sending passwords in clear text, or when we see cryptomining activity, we’ll alert them. We’re committed to that.”

Editorial Team

Editorial Team

Related Posts

The LG UltraGear 39GX90SA-W Gaming Monitor Is $850 Off Right Now
Protection

The LG UltraGear 39GX90SA-W Gaming Monitor Is $850 Off Right Now

May 16, 2026
You Can Now Pre-Order XReal's R1 Gaming AR Glasses (With the ROG Control Deck)
Protection

You Can Now Pre-Order XReal’s R1 Gaming AR Glasses (With the ROG Control Deck)

May 15, 2026
10 Hacks Every Microsoft Teams User Should Know
Protection

10 Hacks Every Microsoft Teams User Should Know

May 15, 2026
I Tried These Four Fitness Watches to See Which Was Best for Hyrox Training
Protection

I Tried These Four Fitness Watches to See Which Was Best for Hyrox Training

May 15, 2026
Chatbots May Be Giving Out Your Phone Number
Protection

Chatbots May Be Giving Out Your Phone Number

May 15, 2026
Here Are the Best Early Memorial Day Sales so Far
Protection

Here Are the Best Early Memorial Day Sales so Far

May 15, 2026
Load More
Next Post
G7 finance ministers warn of ‘uncertainty’ on global economy

G7 finance ministers warn of ‘uncertainty’ on global economy

Popular News

  • Nucleus: Adviser-as-platform noise a dangerous distraction

    Nucleus: Adviser-as-platform noise a dangerous distraction

    0 shares
    Share 0 Tweet 0
  • Microsoft’s New ‘Recall’ Feature Is Equal Parts Cool and Dangerous

    0 shares
    Share 0 Tweet 0
  • The 10 best banks for college students in 2025

    0 shares
    Share 0 Tweet 0
  • These 7 Transoceanic Cruises Revive the Splendor of the Oceanliner Era

    0 shares
    Share 0 Tweet 0
  • Can Your Business Afford to Offer Free Shipping?

    0 shares
    Share 0 Tweet 0

Latest News

Cointelegraph

THORChain Opens Refund Portal After $10M Hack

May 16, 2026
0

THORChain has confirmed a $10 million exploit and launched a recovery portal, giving affected users a self-custodial path to revoke...

Next crypto to hit $1: The best crypto to buy now in May - 10

6 High-conviction picks every investor should know before june 2026

May 16, 2026
0

Disclosure: This article does not represent investment advice. The content and materials featured on this page are for educational purposes...

Internship Manager - HigherEdJobs

Internship Manager – HigherEdJobs

May 16, 2026
0

Advertising Summary: Shape the future of business talent at VCU. As Internship Manager, you'll connect students' academic experiences with real-world...

Samsung Elec, South Korea union to resume pay talks on Monday, union says

Samsung Elec, South Korea union to resume pay talks on Monday, union says

May 16, 2026
0

Samsung Elec, South Korea union to resume pay talks on Monday, union says

Global Finances Daily

Welcome to Global Finances Daily, your go-to source for all things finance. Our mission is to provide our readers with valuable information and insights to help them achieve their financial goals and secure their financial future.

Subscribe

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Use
  • Editorial Process

© 2025 All Rights Reserved - Global Finances Daily.

No Result
View All Result
  • Alternative Investments
  • Crypto
  • Financial Markets
  • Investments
  • Lifestyle
  • Protection
  • Retirement
  • Savings
  • Work & Careers

© 2025 All Rights Reserved - Global Finances Daily.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.