2 min read

Ghost Fleet Scan Surge Floods Sensors with Hong Kong‑Based Noise

Ghost Fleet Scan Surge Floods Sensors with Hong Kong‑Based Noise
7Secure
Collection Brief
Threat Intelligence
GREYNOISE.IO

Ghost Fleet Scan Surge Floods Sensors with Hong Kong‑Based Noise

Ghost Fleet Scan Surge Floods Sensors with Hong Kong‑Based Noise
Why it matters
A cleaner long-form article view for the 7Secure site, with the story content, source context, and category framing carried directly in the HTML.

GreyNoise’s latest telemetry shows a sudden spike in internet‑scanning activity dubbed the “Ghost Fleet” surge. Roughly 50 % of the new probes now originate from IP blocks registered in Hong Kong. Most of these scans never complete a TCP handshake, but the sheer volume—tens of thousands of half‑open connections per minute—overloads IDS/IPS sensors and inflates baseline traffic metrics.

For defenders, the flood creates two immediate problems: it drowns out legitimate alerts, generating noise that masks genuine threats, and it contaminates threat‑intelligence feeds with low‑confidence data. Teams should adjust their filtering rules, prioritize verified source reputations (e.g., leverage GreyNoise or similar enrichment), and consider rate‑limiting or black‑holing the identified Hong Kong prefixes until the activity subsides.

SOC & Automation