• Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Home
  • About Darknet
  • Hacking Tools
  • Popular Posts
  • Darknet Archives
  • Contact Darknet
    • Advertise
    • Submit a Tool
Darknet – Hacking Tools, Hacker News & Cyber Security

Darknet - Hacking Tools, Hacker News & Cyber Security

Darknet is your best source for the latest hacking tools, hacker news, cyber security best practices, ethical hacking & pen-testing.

Cyber Storm II – US, UK & 3 Others Involved in Mock Cyberwar

March 12, 2008

Views: 4,740

[ad]

This is pretty interesting – US, UK, Canada, Australia and New Zealand are taking part in a fictitious cyberwar as an exercise to prepare and plan for sustained cyber attacks including some of which have actually caused power outages.

I personally think it’s a great idea, I must have missed Cyber Storm I as this is the first time I’ve heard about this program.

Participants of Cyber Storm II, which also include about 40 private-sector companies, will enact a scenario in which “persistent, fictitious adversaries” launch an extended attack using websites, email, phones, faxes and other communications systems. Other countries involved are Australia, New Zealand and Canada.

Cyber Storm II comes two weeks after the Pentagon released an assessment of China’s military might, warning the People’s Liberation Army was intent on expanding its capabilities for cyber warfare. It also comes amid intelligence reports that utilities in several countries have sustained cyber attacks that caused power outages.

It seems to be something like Business Continuity Planning for malicious attacks, it’s definitely a healthy exercise and it will teach a lot of people what it’s really like to be under pressure from a serious and persistent attack. That’s making a hefty assumption that those attacking really know what they are doing…I somehow doubt they can emulate a large scale DDoS attack from a huge Botnet.

Companies including Cisco, Juniper Networks, Dow Chemical, Air Products & Chemical and Wachovia are participating. Nine US states and at least 18 federal agencies are also involved. They represent the chemical, information technology, communications and transportation industries, which are considered critical parts of the infrastructure. The US Department of Homeland Security is hosting the event – no doubt with danishes and plenty of Starbucks coffee.

The exercises are designed to sharpen and assess participants’ ability to respond to a multi-day, coordinated attack and better understand the “cascading effects” such attacks can have.

There is some pretty heavy players involved like cisco and Juniper, so they should know what they are doing.

I do hope it leads to some knowledge, procedures and experience essential to defending against cyber terrorism.

Source: The Register

Share
Tweet
Share
Buffer
WhatsApp
Email
0 Shares

Filed Under: Countermeasures, Hacking News Tagged With: australia, cyber-crime, cyber-terrorism, cybercrime, UK, us



Reader Interactions

Comments

  1. James C says

    March 12, 2008 at 10:19 am

    You can’t have a Mock Cyber Attack. This hole thing is like me tell a client company “Ok, tell your tech boys I

  2. Ian Kemmish says

    March 12, 2008 at 12:22 pm

    I seem to remember seeing some coverage of Cyber Storm I in the traditional media. As I recall, some of the commercial targets decided that attack was the best form of defence, and made strenuous and partially successful efforts to take out the machines that were attacking them.

    The public sector people in charge were said to have scolded these companies for their initiative, claiming that it was “contrary to the spirit of the exercise”….

  3. zupakomputer says

    March 12, 2008 at 1:07 pm

    Mmm, isn’t there a stupid law in cyberspace that’s like the stupid laws in meatspace, whereby you aren’t allowed to attack, or spy on, someone else that is attacking you, without it being considered that you’re the aggressor rather than it being seen for what it is – removing a threat and / or identifying it.

    ‘contrary to the spirit of the exercise’ seems to be entrenched in that mindset – as if in reality any attacker is going to back-off, or be fighting you on some noble terms of yesteryear.

    That said, as with meatspace again, can we expect to see a malicious breacher that has a counter-attack dealt them, then try to sue whoever they were trying to attack for damages?!

    Remember I’m UK based, I know that it’s actually legal to protect yourself in some other countries. And people wonder why the UKs so full of delinquent a-holes.

  4. Doey says

    March 12, 2008 at 5:06 pm

    Mmm, isn

  5. Reticent says

    March 12, 2008 at 8:17 pm

    I work for a company which is involved in some of these tests. They are hypothetical attack’s, i.e What would you do if X happened? DOS attacks, malware/virus outbreaks etc. Any reference to companies ‘counter-attacking’ or resulting power outages sound more ficticious than the cyberstorm tests themselves. There are no emulated attacks, unless you think a few plain text emails with some scenariors are :)

  6. eM3rC says

    March 12, 2008 at 11:08 pm

    Actually, you can have an attack and have some positive results. Take the military for example, they know there is going to be an attack yet it still helps the soldiers. I know know how many members here have heard of an event called DEFCON (if not check it out!) but basically it uses mock hacking events. Although stealth can be part of the hacking attack it is not the only part. Even if these countries know about the attacks there are several factors that you might not be thinking of. First, the techniques. They might know about it but they don’t know how the hackers plan to get in. There are hundreds of thousands of possible things that could be done so they would have to be watching everything at once, all the time. Next, the period set aside for the operation. They might be on standby or ordered to act as though they do not really know about an attack. To rule this out the amount of time set aside for the attack could be some were around a month so although they might be somewhat prepared, they wouldn’t know when the hackers would hit. Basically what I’m getting at is the drill is excellent and although the governments might be anticipating the attack, it would still be very helpful for the security teams.

  7. arley says

    March 12, 2008 at 11:33 pm

    Those are the very same nations of the UKUSA Community, or as you may know, founders/suporters of the ECHELON Spy system.

  8. zupakomputer says

    March 13, 2008 at 1:02 pm

    ECHELONs keyword detector would have found that reference to itself, probably while it was still in the process of being sent to this website.

    Well, at the very least, the computer security game means well paid work and you get to do videogames that are way more fun than most offerings these days. I probably won’t get a chance to do that either though – so I’m offering my services in advance of any further disappointments to the botnet people. Keeps you in a job, don’t it.

    Just to go off on a minor tangent here – I can see that there’s going to be apps for dealing with attacks in realtime, that are going to function very much like classic (ie – arcade) videogames – a bit like House of the Dead. If it’s not immediately apparent what is meant there – applications that identify things like infected packets, flag them, and allow for commands to be entered on how to deal with them, in a graphical representive environment.
    I’m not really meaning this’ll happen just for a laugh, although that itself is amusing, it’s more that when you’re dealing with realtime scenarios it’d be easier to be able to interact with the data if it’s shown graphically – quicker than using many command lines and having to lock / unlock windows, and typing.

  9. Pantagruel says

    March 13, 2008 at 7:22 pm

    @Reticent

    MMM too bad it turns out to be a ‘paper’ excercise. A scenario book can only be tested for it effectiveness against a controlled real world test.
    It’s much like a fire drill, the evac process is dull and tiresome. Learn your people how to extinguish a real fire (it’s fun burning 250 ml of gasoline) with a CO2 extinguisher and the drill will be remembered.

  10. James C says

    March 14, 2008 at 7:35 pm

    @Pantagruel
    Well put.

Primary Sidebar

Search Darknet

  • Email
  • Facebook
  • LinkedIn
  • RSS
  • Twitter

Advertise on Darknet

Latest Posts

Bantam - Advanced PHP Backdoor Management Tool For Post Exploitation

Bantam – Advanced PHP Backdoor Management Tool For Post Exploitation

Views: 286

Bantam is a lightweight post-exploitation utility written in C# that includes advanced payload … ...More about Bantam – Advanced PHP Backdoor Management Tool For Post Exploitation

AI-Powered Cybercrime in 2025 - The Dark Web’s New Arms Race

AI-Powered Cybercrime in 2025 – The Dark Web’s New Arms Race

Views: 493

In 2025, the dark web isn't just a marketplace for illicit goods—it's a development lab. … ...More about AI-Powered Cybercrime in 2025 – The Dark Web’s New Arms Race

Upload_Bypass - Bypass Upload Restrictions During Penetration Testing

Upload_Bypass – Bypass Upload Restrictions During Penetration Testing

Views: 490

Upload_Bypass is a command-line tool that automates discovering and exploiting weak file upload … ...More about Upload_Bypass – Bypass Upload Restrictions During Penetration Testing

Shell3r - Powerful Shellcode Obfuscator for Offensive Security

Shell3r – Powerful Shellcode Obfuscator for Offensive Security

Views: 690

If antivirus and EDR vendors are getting smarter, so are the tools that red teamers and penetration … ...More about Shell3r – Powerful Shellcode Obfuscator for Offensive Security

Understanding the Deep Web, Dark Web, and Darknet (2025 Guide)

Understanding the Deep Web, Dark Web, and Darknet (2025 Guide)

Views: 8,474

Introduction: How Much of the Internet Can You See? You're only scratching the surface when you … ...More about Understanding the Deep Web, Dark Web, and Darknet (2025 Guide)

DataSurgeon is an open-source Linux-based data extraction and transformation tool designed for forensic investigations and recovery scenarios.

DataSurgeon – Fast, Flexible Data Extraction and Transformation Tool for Linux

Views: 469

DataSurgeon is an open-source Linux-based data extraction and transformation tool designed for … ...More about DataSurgeon – Fast, Flexible Data Extraction and Transformation Tool for Linux

Topics

  • Advertorial (28)
  • Apple (46)
  • Countermeasures (227)
  • Cryptography (82)
  • Database Hacking (89)
  • Events/Cons (7)
  • Exploits/Vulnerabilities (431)
  • Forensics (65)
  • GenAI (3)
  • Hacker Culture (8)
  • Hacking News (229)
  • Hacking Tools (684)
  • Hardware Hacking (82)
  • Legal Issues (179)
  • Linux Hacking (73)
  • Malware (238)
  • Networking Hacking Tools (352)
  • Password Cracking Tools (104)
  • Phishing (41)
  • Privacy (219)
  • Secure Coding (118)
  • Security Software (233)
  • Site News (51)
    • Authors (6)
  • Social Engineering (37)
  • Spammers & Scammers (76)
  • Stupid E-mails (6)
  • Telecomms Hacking (6)
  • UNIX Hacking (6)
  • Virology (6)
  • Web Hacking (384)
  • Windows Hacking (169)
  • Wireless Hacking (45)

Security Blogs

  • Dancho Danchev
  • F-Secure Weblog
  • Google Online Security
  • Graham Cluley
  • Internet Storm Center
  • Krebs on Security
  • Schneier on Security
  • TaoSecurity
  • Troy Hunt

Security Links

  • Exploits Database
  • Linux Security
  • Register – Security
  • SANS
  • Sec Lists
  • US CERT

Footer

Most Viewed Posts

  • Brutus Password Cracker – Download brutus-aet2.zip AET2 (2,291,657)
  • Darknet – Hacking Tools, Hacker News & Cyber Security (2,173,069)
  • Top 15 Security Utilities & Download Hacking Tools (2,096,614)
  • 10 Best Security Live CD Distros (Pen-Test, Forensics & Recovery) (1,199,675)
  • Password List Download Best Word List – Most Common Passwords (933,462)
  • wwwhack 1.9 – wwwhack19.zip Web Hacking Software Free Download (776,130)
  • Hack Tools/Exploits (673,286)
  • Wep0ff – Wireless WEP Key Cracker Tool (530,143)

Search

Recent Posts

  • Bantam – Advanced PHP Backdoor Management Tool For Post Exploitation May 9, 2025
  • AI-Powered Cybercrime in 2025 – The Dark Web’s New Arms Race May 7, 2025
  • Upload_Bypass – Bypass Upload Restrictions During Penetration Testing May 5, 2025
  • Shell3r – Powerful Shellcode Obfuscator for Offensive Security May 2, 2025
  • Understanding the Deep Web, Dark Web, and Darknet (2025 Guide) April 30, 2025
  • DataSurgeon – Fast, Flexible Data Extraction and Transformation Tool for Linux April 28, 2025

Tags

apple botnets computer-security darknet Database Hacking ddos dos exploits fuzzing google hacking-networks hacking-websites hacking-windows hacking tool Information-Security information gathering Legal Issues malware microsoft network-security Network Hacking Password Cracking pen-testing penetration-testing Phishing Privacy Python scammers Security Security Software spam spammers sql-injection trojan trojans virus viruses vulnerabilities web-application-security web-security windows windows-security Windows Hacking worms XSS

Copyright © 1999–2025 Darknet All Rights Reserved · Privacy Policy