Originally posted by opethPA
Part of me doesn't automatically assume an attack either and nothing he said , without basic metrics, eliminates anything.
Yes, but there is enough information to start putting 2 and 2 together.
He had a large wifi presence move in just a short bit ago.
Someone hacked into his wifi connection because it was fully password protected.
And started sending data through it at around the same time the wifi presence appeared.
Another person that is probably not directly affected, and on another type of connection is also having the same slowdowns that started about the same
time the other stuff did.
Things that can be concluded by that.
He is not the only one that has had his wifi hacked.
There is probably enough people in the area hacked and hogging the bandwidth that it is clogging the local backbone.
That is what is causing non affected customers to see a slowdown.
The question is, what the heck could a person in a residential neighborhood be doing that would generate that much date flow?
The number of possible answers is very limited.
With the amount of data he is pulling, if he was strictly downloading movies, he would quickly run out of stuff to download, and the data consumption
would drop off.
So, you are left with a few basic answers that I already listed.
Running a clandestine server base.
Launching attacks on outside systems.
And one more that just came to mind.
Driving up view counts on specified pages, and other stuff to affect page, and video rankings for money. Views per dollar services that some places
Once you get access to the date coming through the system, then match it up with what is the most likely scenario.
There is one final possibility which would be the most unlikely. The people that own the computers that piggybacked on his network connection don’t
know about it. Someone hacked into their computer system, or a number of computer systems in his area, and are using those computers with their wifi
access to harness other network bandwidth in the area to launch mass attacks on outside systems. The appearance of a large presence he noted was the
hackers turning on all the idle wifi access cards in the computers throughout the neighborhood.
edit on 2-2-2013 by Mr Tranny because: (no