Early warning system Live Attack Parser – t3n reports 

Table of Contents

German web servers are being targeted by Russian hackers.

The Platform t3n reports, about the early warning system Live Attack Parser and how it can protect against attacks.

“Start an attack on the German network infrastructure!”, this call from pro-Russian cyber activists was shared publicly on May 4th. Several state police websites were named as targets. A few days later, access to the websites was temporarily no longer possible. In addition, websites of the Bundestag, the Ministry of the Interior and the Federal Police.

The Ukraine war has been on the Internet for a long time, with incidents like this occurring all over Europe. Pro-Russian groups like Killnet. According to the Office for the Protection of the Constitution, this group developed as a reaction to the “Ukrainian Cyber ​​Army” and covered companies and authorities with targeted attacks Denial of service attacks (DoS).

In order to act effectively, they coordinate in public Telegram groups, chat channels or internet forums. Revealed the whole thing Tim Schughart CEO of the cybersecurity company ProSec. He advises several European governments on internet security issues and dealt with Killnet for the first time a few months ago at the request of government authorities. The attacks were unexpected for those affected because the authorities lacked staff and time. This gave rise to the idea behind an early warning system.

You want to see the consequences of a successful hacker attack
Spare your IT system?
Test your IT now and use the ProSec tool for free!
To the live attack parser

Live Attack Parser pre-detects Killnet DDoS attacks

Tim wrote it with his team Live attack parser, a tool that constantly queries and monitors the known communication channels and forums. Using a simple web interface, the groups' attack plans are filtered out and the web addresses of the intended targets are displayed at the same time. This gives potential targets the opportunity to prepare for attacks as the actions are initiated. On average, it takes three to five days until the actual attack occurs. “It’s not just one person who does that. “There are really several thousand people who have to organize themselves,” says Tim. “The amount of time they need to organize is easily enough to protect themselves.”

Western intelligence services are already using the tool to send authorities and operators of critical infrastructure advance warnings of attacks. The next level was to make the tool publicly accessible. This means that all website operators now have the opportunity to prepare for impending attacks, because Killnet and others no longer only attack government targets and structures.

Sometimes companies even find themselves in the crosshairs of both sides. Tim cites a medium-sized pharmaceutical company as an example. Because the company supplies medicines to Russia and Ukraine, sympathizers from both warring parties decided to attack its servers.

Increase the security of your IT system?
You will receive detailed advice from us!
Contact us now

Makers hope for support from the community

In the interview, Tim and Immanuel make it clear several times that they do not want to make any profit with the Live Attack Parser. Alternatively, the tool is intended to serve as a free resource for companies to defend themselves from attacks from Killnet and similar groups. The creators also hope for support from the community. According to Tim, the community could reveal sources in order to be able to identify even more potential attack targets in advance. Additional functions could then also be integrated more easily. An alarm function for website operators would be conceivable.


Both cybersecurity experts also want more attention to be paid to early detection. This was already a problem before the Ukraine war, says Immanuel, but now there is a completely different level of attacks. “We have to start bringing the topic into society and into the discussion, that’s what it’s all about for us.”

OTHER CONTRIBUTIONS

Table of Contents