• Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Home
  • About Darknet
  • Hacking Tools
  • Popular Posts
  • Darknet Archives
  • Contact Darknet
    • Advertise
    • Submit a Tool
Darknet – Hacking Tools, Hacker News & Cyber Security

Darknet - Hacking Tools, Hacker News & Cyber Security

Darknet is your best source for the latest hacking tools, hacker news, cyber security best practices, ethical hacking & pen-testing.

Cyber Storm II – US, UK & 3 Others Involved in Mock Cyberwar

March 12, 2008

Views: 4,756

[ad]

This is pretty interesting – US, UK, Canada, Australia and New Zealand are taking part in a fictitious cyberwar as an exercise to prepare and plan for sustained cyber attacks including some of which have actually caused power outages.

I personally think it’s a great idea, I must have missed Cyber Storm I as this is the first time I’ve heard about this program.

Participants of Cyber Storm II, which also include about 40 private-sector companies, will enact a scenario in which “persistent, fictitious adversaries” launch an extended attack using websites, email, phones, faxes and other communications systems. Other countries involved are Australia, New Zealand and Canada.

Cyber Storm II comes two weeks after the Pentagon released an assessment of China’s military might, warning the People’s Liberation Army was intent on expanding its capabilities for cyber warfare. It also comes amid intelligence reports that utilities in several countries have sustained cyber attacks that caused power outages.

It seems to be something like Business Continuity Planning for malicious attacks, it’s definitely a healthy exercise and it will teach a lot of people what it’s really like to be under pressure from a serious and persistent attack. That’s making a hefty assumption that those attacking really know what they are doing…I somehow doubt they can emulate a large scale DDoS attack from a huge Botnet.

Companies including Cisco, Juniper Networks, Dow Chemical, Air Products & Chemical and Wachovia are participating. Nine US states and at least 18 federal agencies are also involved. They represent the chemical, information technology, communications and transportation industries, which are considered critical parts of the infrastructure. The US Department of Homeland Security is hosting the event – no doubt with danishes and plenty of Starbucks coffee.

The exercises are designed to sharpen and assess participants’ ability to respond to a multi-day, coordinated attack and better understand the “cascading effects” such attacks can have.

There is some pretty heavy players involved like cisco and Juniper, so they should know what they are doing.

I do hope it leads to some knowledge, procedures and experience essential to defending against cyber terrorism.

Source: The Register

Related Posts:

  • Systemic Ransomware Events in 2025 - How Jaguar Land…
  • Initial Access Brokers (IAB) in 2025 - From Dark Web…
  • Kiev Power Outage Linked To Cyber Attacks
  • Autoswagger - Automated discovery and testing of…
  • XRayC2 - Weaponizing AWS X-Ray for Covert Command…
  • Deepfake-as-a-Service 2025 - How Voice Cloning and…
Share
Tweet
Share
Buffer
WhatsApp
Email

Filed Under: Countermeasures, Hacking News Tagged With: australia, cyber-crime, cyber-terrorism, cybercrime, UK, us



Reader Interactions

Comments

  1. James C says

    March 12, 2008 at 10:19 am

    You can’t have a Mock Cyber Attack. This hole thing is like me tell a client company “Ok, tell your tech boys I

  2. Ian Kemmish says

    March 12, 2008 at 12:22 pm

    I seem to remember seeing some coverage of Cyber Storm I in the traditional media. As I recall, some of the commercial targets decided that attack was the best form of defence, and made strenuous and partially successful efforts to take out the machines that were attacking them.

    The public sector people in charge were said to have scolded these companies for their initiative, claiming that it was “contrary to the spirit of the exercise”….

  3. zupakomputer says

    March 12, 2008 at 1:07 pm

    Mmm, isn’t there a stupid law in cyberspace that’s like the stupid laws in meatspace, whereby you aren’t allowed to attack, or spy on, someone else that is attacking you, without it being considered that you’re the aggressor rather than it being seen for what it is – removing a threat and / or identifying it.

    ‘contrary to the spirit of the exercise’ seems to be entrenched in that mindset – as if in reality any attacker is going to back-off, or be fighting you on some noble terms of yesteryear.

    That said, as with meatspace again, can we expect to see a malicious breacher that has a counter-attack dealt them, then try to sue whoever they were trying to attack for damages?!

    Remember I’m UK based, I know that it’s actually legal to protect yourself in some other countries. And people wonder why the UKs so full of delinquent a-holes.

  4. Doey says

    March 12, 2008 at 5:06 pm

    Mmm, isn

  5. Reticent says

    March 12, 2008 at 8:17 pm

    I work for a company which is involved in some of these tests. They are hypothetical attack’s, i.e What would you do if X happened? DOS attacks, malware/virus outbreaks etc. Any reference to companies ‘counter-attacking’ or resulting power outages sound more ficticious than the cyberstorm tests themselves. There are no emulated attacks, unless you think a few plain text emails with some scenariors are :)

  6. eM3rC says

    March 12, 2008 at 11:08 pm

    Actually, you can have an attack and have some positive results. Take the military for example, they know there is going to be an attack yet it still helps the soldiers. I know know how many members here have heard of an event called DEFCON (if not check it out!) but basically it uses mock hacking events. Although stealth can be part of the hacking attack it is not the only part. Even if these countries know about the attacks there are several factors that you might not be thinking of. First, the techniques. They might know about it but they don’t know how the hackers plan to get in. There are hundreds of thousands of possible things that could be done so they would have to be watching everything at once, all the time. Next, the period set aside for the operation. They might be on standby or ordered to act as though they do not really know about an attack. To rule this out the amount of time set aside for the attack could be some were around a month so although they might be somewhat prepared, they wouldn’t know when the hackers would hit. Basically what I’m getting at is the drill is excellent and although the governments might be anticipating the attack, it would still be very helpful for the security teams.

  7. arley says

    March 12, 2008 at 11:33 pm

    Those are the very same nations of the UKUSA Community, or as you may know, founders/suporters of the ECHELON Spy system.

  8. zupakomputer says

    March 13, 2008 at 1:02 pm

    ECHELONs keyword detector would have found that reference to itself, probably while it was still in the process of being sent to this website.

    Well, at the very least, the computer security game means well paid work and you get to do videogames that are way more fun than most offerings these days. I probably won’t get a chance to do that either though – so I’m offering my services in advance of any further disappointments to the botnet people. Keeps you in a job, don’t it.

    Just to go off on a minor tangent here – I can see that there’s going to be apps for dealing with attacks in realtime, that are going to function very much like classic (ie – arcade) videogames – a bit like House of the Dead. If it’s not immediately apparent what is meant there – applications that identify things like infected packets, flag them, and allow for commands to be entered on how to deal with them, in a graphical representive environment.
    I’m not really meaning this’ll happen just for a laugh, although that itself is amusing, it’s more that when you’re dealing with realtime scenarios it’d be easier to be able to interact with the data if it’s shown graphically – quicker than using many command lines and having to lock / unlock windows, and typing.

  9. Pantagruel says

    March 13, 2008 at 7:22 pm

    @Reticent

    MMM too bad it turns out to be a ‘paper’ excercise. A scenario book can only be tested for it effectiveness against a controlled real world test.
    It’s much like a fire drill, the evac process is dull and tiresome. Learn your people how to extinguish a real fire (it’s fun burning 250 ml of gasoline) with a CO2 extinguisher and the drill will be remembered.

  10. James C says

    March 14, 2008 at 7:35 pm

    @Pantagruel
    Well put.

Primary Sidebar

Search Darknet

  • Email
  • Facebook
  • LinkedIn
  • RSS
  • Twitter

Advertise on Darknet

Latest Posts

Systemic Ransomware Events in 2025 - How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like

Systemic Ransomware Events in 2025 – How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like

Views: 2,302

Jaguar Land Rover’s prolonged cyber outage in 2025 turned what would once have been a “single … ...More about Systemic Ransomware Events in 2025 – How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like

SmbCrawler - SMB Share Discovery and Secret-Hunting

SmbCrawler – SMB Share Discovery and Secret-Hunting

Views: 2,145

SmbCrawler is a credentialed SMB spider that takes domain credentials and a list of hosts, then … ...More about SmbCrawler – SMB Share Discovery and Secret-Hunting

Heisenberg Dependency Health Check - GitHub Action for Supply Chain Risk

Heisenberg Dependency Health Check – GitHub Action for Supply Chain Risk

Views: 1,413

Heisenberg Dependency Health Check is a GitHub Action that inspects only the new or modified … ...More about Heisenberg Dependency Health Check – GitHub Action for Supply Chain Risk

Dark Web Search Engines in 2025 - Enterprise Monitoring, APIs and IOC Hunting

Dark Web Search Engines in 2025 – Enterprise Monitoring, APIs and IOC Hunting

Views: 3,329

Dark web search engines have become essential for enterprise security teams that need early … ...More about Dark Web Search Engines in 2025 – Enterprise Monitoring, APIs and IOC Hunting

mcp-scan - Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers

mcp-scan – Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers

Views: 1,245

mcp-scan is a security tool from Invariant Labs that can run as a static scanner or as a dynamic … ...More about mcp-scan – Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers

Initial Access Brokers (IAB) in 2025 - From Dark Web Listings to Supply Chain Ransomware Events

Initial Access Brokers (IAB) in 2025 – From Dark Web Listings to Supply Chain Ransomware Events

Views: 1,122

Initial Access Brokers (IABs) have moved from niche forum actors to central wholesalers in the … ...More about Initial Access Brokers (IAB) in 2025 – From Dark Web Listings to Supply Chain Ransomware Events

Topics

  • Advertorial (28)
  • Apple (46)
  • Cloud Security (8)
  • Countermeasures (232)
  • Cryptography (85)
  • Dark Web (6)
  • Database Hacking (89)
  • Events/Cons (7)
  • Exploits/Vulnerabilities (433)
  • Forensics (64)
  • GenAI (13)
  • Hacker Culture (10)
  • Hacking News (237)
  • Hacking Tools (709)
  • Hardware Hacking (82)
  • Legal Issues (179)
  • Linux Hacking (74)
  • Malware (241)
  • Networking Hacking Tools (352)
  • Password Cracking Tools (107)
  • Phishing (41)
  • Privacy (219)
  • Secure Coding (119)
  • Security Software (235)
  • Site News (51)
    • Authors (6)
  • Social Engineering (37)
  • Spammers & Scammers (76)
  • Stupid E-mails (6)
  • Telecomms Hacking (6)
  • UNIX Hacking (6)
  • Virology (6)
  • Web Hacking (384)
  • Windows Hacking (171)
  • Wireless Hacking (45)

Security Blogs

  • Dancho Danchev
  • F-Secure Weblog
  • Google Online Security
  • Graham Cluley
  • Internet Storm Center
  • Krebs on Security
  • Schneier on Security
  • TaoSecurity
  • Troy Hunt

Security Links

  • Exploits Database
  • Linux Security
  • Register – Security
  • SANS
  • Sec Lists
  • US CERT

Footer

Most Viewed Posts

  • Brutus Password Cracker Hacker – Download brutus-aet2.zip AET2 (2,434,387)
  • Darknet – Hacking Tools, Hacker News & Cyber Security (2,174,103)
  • Top 15 Security Utilities & Download Hacking Tools (2,097,565)
  • 10 Best Security Live CD Distros (Pen-Test, Forensics & Recovery) (1,200,364)
  • Password List Download Best Word List – Most Common Passwords (934,682)
  • wwwhack 1.9 – wwwhack19.zip Web Hacking Software Free Download (777,407)
  • Hack Tools/Exploits (674,321)
  • Wep0ff – Wireless WEP Key Cracker Tool (531,448)

Search

Recent Posts

  • Systemic Ransomware Events in 2025 – How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like November 26, 2025
  • SmbCrawler – SMB Share Discovery and Secret-Hunting November 24, 2025
  • Heisenberg Dependency Health Check – GitHub Action for Supply Chain Risk November 21, 2025
  • Dark Web Search Engines in 2025 – Enterprise Monitoring, APIs and IOC Hunting November 19, 2025
  • mcp-scan – Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers November 17, 2025
  • Initial Access Brokers (IAB) in 2025 – From Dark Web Listings to Supply Chain Ransomware Events November 12, 2025

Tags

apple botnets computer-security darknet Database Hacking ddos dos exploits fuzzing google hacking-networks hacking-websites hacking-windows hacking tool Information-Security information gathering Legal Issues malware microsoft network-security Network Hacking Password Cracking pen-testing penetration-testing Phishing Privacy Python scammers Security Security Software spam spammers sql-injection trojan trojans virus viruses vulnerabilities web-application-security web-security windows windows-security Windows Hacking worms XSS

Copyright © 1999–2026 Darknet All Rights Reserved · Privacy Policy