Article Details

Original Article Text

Click to Toggle View

Mysterious "LOVE" packet storms flood the internet since 2020. Internet intelligence firm GreyNoise reports that it has been tracking large waves of "Noise Storms" containing spoofed internet traffic since January 2020. However, despite extensive analysis, it has not concluded its origin and purpose. These Noise Storms are suspected to be covert communications, DDoS attack coordination signals, clandestine command and control (C2) channels of malware operations, or the result of a misconfiguration. A curious aspect is the presence of a "LOVE" ASCII string in the generated ICMP packets, which adds further speculation as to their purpose and makes the case more intriguing. GreyNoise published this information hoping the cybersecurity researchers community can help solve the mystery and uncover what's causing these strange noise storms. Characteristics of the noise storms GreyNoise observes large waves of spoofed internet traffic coming from millions of spoofed IP addresses from various sources such as QQ, WeChat, and WePay. The "storms" create massive traffic directed to specific internet service providers like Cogent, Lumen, and Hurricane Electric but avoid others, most notably Amazon Web Services (AWS). The traffic mainly focuses on TCP connections, particularly targeting port 443, but there's also an abundance of ICMP packets, lately including an embedded ASCII string "LOVE" within them, as shown below. The TCP traffic also adjusts parameters such as window sizes to emulate different operating systems, keeping the activity stealthy and difficult to pinpoint. The Time to Live (TTL) values, which dictate how long a packet stays on the network before it's discarded, are set between 120 and 200 to resemble realistic network hops. All in all, the form and characteristics of these "noise storms" indicate a deliberate effort by a knowledgeable actor rather than a large-scale side effect of a misconfiguration. GreyNoise calls for help This strange traffic mimics legitimate data streams, and while it's not known if it's malicious, its true purpose remains a mystery. GreyNoise published packet captures (PCAPs) for two recent noise storm events on GitHub, inviting cybersecurity researchers to join in the investigation and contribute their insights or independent discoveries that will help solve this mystery.  "Noise Storms are a reminder that threats can manifest in unusual and bizarre ways, highlighting the need for adaptive strategies and tools that go beyond traditional security measures," underlines GreyNoise. You can learn more about these Noise Storms in GreyNoise's recent Storm Watch video, shown below.

Daily Brief Summary

MISCELLANEOUS // Mysterious "LOVE" Noise Storms Challenge Cybersecurity Researchers

GreyNoise, an internet intelligence firm, has been observing substantial waves of spoofed internet traffic, dubbed "Noise Storms," since January 2020.

This traffic features spoofed IP addresses and is characterized by large volumes of TCP connections targeting port 443 and ICMP packets containing an ASCII "LOVE" string.

The origin and motive behind these noise storms remain unknown, with speculation about their role in covert communications, DDoS coordination, or malware C2 channels.

Specific ISPs like Cogent, Lumen, and Hurricane Electric are heavily targeted by these attacks, while major services like AWS are notably avoided.

The packet characteristics (e.g., TTL values and TCP window sizes) suggest a sophisticated actor with a deep understanding of network behaviors.

The ICMP packets with the "LOVE" ASCII strings add an intriguing layer to the mystery, prompting further analysis.

GreyNoise has shared packet captures of the noise storms on GitHub to encourage collaboration among cybersecurity experts in unpacking these anomalies.

The firm emphasizes the importance of adaptive security strategies to address unconventional threat manifestations like these noise storms.