The Misinterpretation of Internet Background Noise | A Subtle Threat to Critical Infrastructure


Internet background noise, often mistaken for targeted cyberattacks, is frequently the result of IoT malware indiscriminately scanning for vulnerable devices. This phenomenon creates a flood of apparent "hacking" attempts, but these are not sophisticated, state-sponsored attacks. Instead, they are the byproduct of infected IoT devices—billions of them—scanning the internet to expand botnets for purposes like selling DDoS services. While these scans rarely compromise systems directly, they serve as a distraction, masking more subtle and dangerous threats to critical infrastructure, particularly from actors like China.
The Nature of IoT Malware & Internet Noise
IoT malware infects devices like smart cameras, routers, and other connected gadgets, turning them into agents that scan the internet for other vulnerable devices. These scans originate from millions of IP addresses worldwide, creating the illusion of coordinated attacks. In reality, these devices are not "targeting" specific entities but are part of a chaotic, automated process to build botnets. These botnets are often used for distributed denial-of-service (DDoS) attacks, which can cause outages but are less likely to penetrate secure systems. The sheer volume of this activity generates what is known as internet background noise—a constant hum of low-level, indiscriminate hacking attempts.
This noise, while disruptive, is not the primary threat. Its real danger lies in its ability to distract security teams from more sophisticated, targeted attacks. For example, while defenders are busy filtering out billions of IoT-driven probes, state-sponsored actors can slip through using more subtle methods, such as exploiting trusted infrastructure or leveraging front ISPs to obscure their origins.
The Role of U.S. Hosting Providers
A significant portion of these attacks originates from U.S.-based hosting providers like Digital Ocean and Rackspace. These platforms, often used to host malicious infrastructure, are exploited by threat actors, including those with state sponsorship. In one instance, a Rackspace-hosted server in Texas was traced to a campaign compromising systems, with control servers linked to China via a front ISP operating out of a repurposed Los Angeles Post Office building, backhauling through China Telecom. This setup highlights the complexity of attributing attacks, as the infrastructure appears domestic while being controlled from abroad.
The problem is exacerbated by lax oversight. U.S. hosting providers and data center co-location facilities often require minimal Know Your Customer (KYC) checks—sometimes just a credit card swipe or a SWIFT transfer from dubious sources. This lack of scrutiny allows malicious actors to rent servers and launch attacks with little accountability, further muddying the waters of attribution and enabling the real threats to hide in plain sight.
A Strategic Distraction | The Buffalo Horns Tactic
The flood of IoT-driven scans serves a strategic purpose beyond building botnets: obfuscation. By overwhelming security systems with noise, threat actors create an environment where defenders are preoccupied with low-level threats, leaving them vulnerable to more sophisticated attacks. This tactic resembles the "buffalo horns" strategy devised by King Shaka of the Zulu Kingdom, where a visible frontal assault distracts the enemy while flanking forces deliver the decisive blow. In cybersecurity, the IoT noise is the frontal assault, while the real attack—targeted, stealthy, and often state-sponsored—comes from the flanks.
This strategy is particularly concerning when considering threats to U.S. critical infrastructure. While IoT scans are unlikely to directly compromise systems like power grids or financial networks, they divert attention from actors who exploit trusted infrastructure, use front companies, or leverage insider threats to infiltrate sensitive systems. China, for instance, is known for its subtle approach, avoiding overt attacks from Chinese IP addresses in favor of more covert methods that blend into the global internet ecosystem.
Addressing the Real Threat
To counter this, organizations must look beyond the noise. Key steps include:
Enhanced Attribution and Monitoring: Invest in tools and intelligence to trace attack origins beyond surface-level IP addresses, focusing on control servers and their backhaul connections.
Stricter Hosting Regulations: U.S. hosting providers and data centers must adopt robust KYC protocols to prevent malicious actors from renting infrastructure anonymously.
Prioritizing Threat Intelligence: Security teams should use threat intelligence to differentiate between indiscriminate IoT scans and targeted attacks, ensuring resources are allocated to the most pressing threats.
Securing IoT Devices: Manufacturers and consumers must prioritize IoT security, patching vulnerabilities to reduce the pool of exploitable devices fueling botnets.
Mitigating IoT Threats with Nepean Networks' Illuminate
Nepean Networks' Illuminate platform offers a robust solution to counter the obfuscation caused by IoT-driven background noise. By leveraging advanced traffic analytics, Illuminate provides real-time visualization of network attacks, enabling security teams to distinguish between indiscriminate IoT malware scans and targeted threat actor activities. Its intuitive dashboards map out traffic patterns, highlighting anomalies such as unusual spikes or connections to known malicious endpoints, which helps defenders focus on genuine threats rather than being overwhelmed by noise. This visualization is critical for identifying the subtle, flanking maneuvers of sophisticated attackers amidst the chaos of botnet-driven scans.
A key strength of Illuminate is its independent blocking mechanism, which neutralizes dodgy traffic without relying on third-party firewalls or endpoint protection solutions. Using advanced heuristics, Illuminate analyzes traffic behavior in real-time, identifying malicious patterns—such as those associated with IoT botnets or command-and-control communications—based on behavioral anomalies rather than static signatures. This approach allows Illuminate to block threats proactively, even those that evade traditional security tools. By operating independently, it reduces dependencies on external systems, ensuring faster response times and greater resilience against evolving threats, making it an essential tool for securing critical infrastructure.
Wrap
Internet background noise, driven by IoT malware, is often mistaken for a direct threat to critical infrastructure. In reality, it serves as a smokescreen, distracting from more sophisticated attacks by actors who exploit trusted systems and lax oversight. By understanding this noise for what it is—a distraction—defenders can focus on the real threats, ensuring that critical infrastructure remains secure against subtle, strategic assaults. Just as visiting a historic site like the old Los Angeles Post Office requires caution, navigating the internet demands a "digital condom"—a layer of protection against the deceptive chaos of background noise.
Subscribe to my newsletter
Read articles from Ronald Bartels directly inside your inbox. Subscribe to the newsletter, and don't miss out.
Written by

Ronald Bartels
Ronald Bartels
Driving SD-WAN Adoption in South Africa