Shadowserver

Shadowserver Foundation is a nonprofit security organization[1] that gathers and analyzes data on malicious Internet activity (including malware, botnets, and computer fraud), sends daily network reports to subscribers, and works with law enforcement organizations around the world[2] in cybercrime investigations. Established in 2004[3] as a "volunteer watchdog group,"[4] it liaises with national governments, CSIRTs, network providers, academic institutions, financial institutions, Fortune 500 companies, and end users to improve Internet security, enhance product capability, advance research, and dismantle criminal infrastructure.

Shadowserver
Formation2004
Typenonprofit
26-2267933
Purposesecurity
Websitehttps://shadowserver.org

Funding

In early 2020, Cisco, which has been the primary funder for 15 years, announced they would be withdrawing their funding.[5][6] In late May 2020 it was announced that the Shadowserver Foundation had received funding from various sources to enable “the group to continue in a more sustainable way without becoming dependent on a single backer again.”[7]

Activities

Data collection

Shadowserver scans the IPv4 Internet 45 times per day. It harvests data on malware, spam, bots, and botnets[8] using large-scale sensor networks of honeypots and honeyclients[9] placed throughout the world. It uses sinkholes to collect data on bots and DDOS attacks. It also receives additional malware and sinkhole data from governments, industry partners, and law enforcement agencies that have established reciprocal data-sharing agreements with Shadowserver.

Data analysis

Shadowserver stores raw malware data permanently in its repository. As new data are collected, Shadowserver analyzes them using thousands of virtual sandboxes and hundreds of iron sandboxes. It regularly re-analyzes raw data previously collected. The results of these analyses are stored in the organization's analysis cluster.

Network reporting

Shadowserver sends free daily network reports to users who have subscribed to them. The reports contain all the data that Shadowserver has collected and analyzed about any suspicious activity it was able to detect within the specific networks or regions for which the subscriber is responsible. For example, a national government might receive data aggregated by geo-spatial coordinates defined by latitude and longitude, while an international network provider might receive data filtered by ASN.

Investigation support

Shadowserver liaises with security organizations, national governments, and CSIRTs to dismantle global cybercrime networks; for example, it worked with the FBI, Europol, and Interpol to take down the Avalanche network in 2016.[10] It also helps law enforcement partners to develop strategies against cyber security threats and to mitigate threats as they emerge, focusing on cases that involve criminal abuse of the Internet’s infrastructure.

gollark: Because the postgres image docker has doesn't support configuring multiple users on it easily...
gollark: I'm mostly okay with running mongoDB stuff (not that I actually have ended up having to) but avoid PHP.
gollark: Because of the fact that it makes wrangling the containers a bit nicer, I mostly have one DB per service.
gollark: Sounds very webscale.
gollark: Well, you can't really add that to pages you don't own.

References

  1. "The Shadowserver Foundation | Crunchbase". Crunchbase. Retrieved 2018-02-13.
  2. Halpern, Jake. "Bank of the Underworld". The Atlantic. Retrieved 2018-02-13.
  3. "Tackling the botnets at source". 2006-10-05. Retrieved 2018-02-13.
  4. "Cybercrime flourishes in online hacker forums - USATODAY.com". usatoday30.usatoday.com. Retrieved 2018-02-13.
  5. "The Web's Bot Containment Unit Needs Your Help — Krebs on Security". Retrieved 2020-03-16.
  6. "A Critical Internet Safeguard Is Running Out of Time". Wired. ISSN 1059-1028. Retrieved 2020-03-16.
  7. "Shadowserver, an Internet Guardian, Finds a Lifeline". Retrieved 2020-06-01.
  8. Krebs, Brian (2006-03-21). "Bringing Botnets Out of the Shadows". ISSN 0190-8286. Retrieved 2018-02-13.
  9. "Shadowserver Battles the Botnets". Darknet. 2006-06-29. Retrieved 2018-02-13.
  10. "'Avalanche' network dismantled in international cyber operation". Europol. Retrieved 2018-02-13.
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.