Love cloud

Internet intelligence firm GreyNoise reports that it has been tracking large waves of "Noise Storms" containing spoofed internet traffic since January 2020. However, despite extensive analysis, it has not concluded its origin and purpose.
These Noise Storms are suspected to be covert communications, DDoS attack coordination signals, clandestine command and control (C2) channels of malware operations, or the result of a misconfiguration.
  • A curious aspect is the presence of a "LOVE" ASCII string in the generated ICMP packets, which adds further speculation as to their purpose and makes the case more intriguing.
GreyNoise published this information hoping the cybersecurity researchers community can help solve the mystery and uncover what's causing these strange noise storms.

Characteristics of the noise storms
GreyNoise observes large waves of spoofed internet traffic coming from millions of spoofed IP addresses from various sources such as QQ, WeChat, and WePay.
  • The "storms" create massive traffic directed to specific internet service providers like Cogent, Lumen, and Hurricane Electric but avoid others, most notably Amazon Web Services (AWS).
The traffic mainly focuses on TCP connections, particularly targeting port 443, but there's also an abundance of ICMP packets, lately including an embedded ASCII string "LOVE" within them, as shown below.
ICMP packets containing the "Love" string

ICMP packets containing the "Love" string
Source: BleepingComputer
The TCP traffic also adjusts parameters such as window sizes to emulate different operating systems, keeping the activity stealthy and difficult to pinpoint.
The Time to Live (TTL) values, which dictate how long a packet stays on the network before it's discarded, are set between 120 and 200 to resemble realistic network hops.
All in all, the form and characteristics of these "noise storms" indicate a deliberate effort by a knowledgeable actor rather than a large-scale side effect of a misconfiguration.
GreyNoise calls for help
This strange traffic mimics legitimate data streams, and while it's not known if it's malicious, its true purpose remains a mystery.
GreyNoise published packet captures (PCAPs) for two recent noise storm events on GitHub, inviting cybersecurity researchers to join in the investigation and contribute their insights or independent discoveries that will help solve this mystery. 
"Noise Storms are a reminder that threats can manifest in unusual and bizarre ways, highlighting the need for adaptive strategies and tools that go beyond traditional security measures," underlines GreyNoise.

You can learn more about these Noise Storms in GreyNoise's recent Storm Watch video, shown below.



Mysterious “Noise Storms” Have Been Hitting the Internet Since 2020
September 19, 2024 By Alex LekanderLeave a Comment

Since January 2020, GreyNoise Intelligence has been tracking a puzzling phenomenon known as “Noise Storms”—massive waves of spoofed internet traffic that continue to perplex cybersecurity experts.

These events, characterized by millions of spoofed IP addresses, are evolving in complexity, posing new challenges to defenders across the globe. Despite ongoing research, the true purpose and origin of these attacks remain shrouded in mystery, with possible connections to covert communication networks, Distributed Denial of Service (DDoS) attacks, or misconfigured routers.

Evolving tactics and potential theories

Noise Storms are primarily composed of TCP traffic targeting port 443 (HTTPS) and ICMP packets, but they notably lack UDP traffic, a common vector in similar attacks. These events exhibit signs of high-level coordination and technical proficiency:

  • TTL Spoofing: Time to Live (TTL) values are manipulated to mimic legitimate internet hops, typically ranging between 120 and 200.
  • OS Emulation: TCP packets are crafted to spoof window sizes, mimicking traffic from various operating systems.
  • Selective Targeting: Recent storms have become more focused, hitting smaller segments of the internet with greater intensity. Notably, they avoid Amazon Web Services (AWS) while impacting providers like Cogent, Lumen, and Hurricane Electric.

While these storms initially seemed like large-scale, indiscriminate attacks, the targeting has grown more refined, suggesting a highly organized actor. This sophistication is coupled with a key discovery: spoofed traffic appears to originate from Brazil, yet further analysis points to obfuscation, potentially masking deeper ties to Chinese platforms such as QQ, WeChat, and WePay. This international connection adds a layer of geopolitical complexity to the case.

The enigmatic “LOVE” message

One of the most perplexing features of the latest Noise Storms is the discovery of the ASCII string “LOVE” embedded within ICMP packets. This seemingly innocent message has confounded researchers, sparking speculation that the storms might be a covert communication channel. The appearance of such a specific, intentional string raises questions about whether these events serve as signals or commands exchanged between entities, hidden in the noise of internet traffic.

GreyNoise’s analysis revealed that the Autonomous System Number (ASN) tied to the ICMP traffic is linked to a Content Delivery Network (CDN) servicing prominent Chinese platforms. This connection has led experts to theorize that the attacks could be attempts to obfuscate the true origin of the traffic. While Brazil is the reported origin, the sophistication and selective targeting imply a more calculated operation, potentially involving state actors or large, organized entities.

This connection with major Chinese platforms raises concerns about the true intentions behind these attacks. Whether it is simply misdirection or part of a broader, coordinated campaign remains to be seen.

GreyNoise has been at the forefront of studying these mysterious Noise Storms for over four years, diligently capturing data and sharing findings with the wider security community. The organization has made packet captures (PCAPs) of the two recent storm events available on GitHub, inviting researchers to help unravel this ongoing enigma. These captures contain samples of the TCP and ICMP traffic observed in recent months, providing a valuable resource for further investigation.


About Alex Lekander

Alex is the founder and Editor-in-Chief of CyberInsider.com. His background and expertise includes digital privacy, security, and tech journalism. When he’s not working behind a screen, Alex is probably tinkering with a boat or enjoying the outdoors.

Related Articles:

This cybersecurity study bundle blends theory with hands-on training

Study for GSEC, CISSP, and more certifications with this $56 bundle deal

How to reduce cyber risk during employee onboarding

Want to be a certified ethical hacker? These courses help you get started

4 Top Security Automation Use Cases: A Detailed Guide