Versuchen GOLD - Frei

Cyberattacks On Cloud Honeypots

Enterprise IT World

|

April 2019

Contrary to popular belief, every device is worth hacking when the process is automated.

- Matt Boddy, Sophos

Cyberattacks On Cloud Honeypots

It doesn’t matter who or where you are, if you own a company big or small, or have technology in the home – every device can be monetized by an enterprising criminal. Brute force login attempts are likely occurring on any online device. Yet the speed and scale of the problem can boggle the mind. Criminals are relentless and often competitive with one another to find, take over, and monetize your smart devices.

The research you’ll find here, using honeypot devices across the internet, is a first step in attempting to quantify the issue. In cybersecurity terms, a honeypot is an open, vulnerable device, configured to deliberately lure a cybercriminal to attack. When the criminal starts to interact with the device, they are in fact triggering alarms to alert a business or individual to their presence and track their activity.

There are many types of honeypots, but in this paper we focus on two main distinctions: high and low interaction.

A low-interaction honeypot is a honeypot that, once found by the hacker, will not be of much use to them. In our case, the attacker is presented with a login prompt they have no way of getting past. This logs and stores any attempts to log in, providing information on the attacker’s IP address of origin (which can be attributed to a location), and the username and password used in the login attempt.

A high-interaction honeypot permits the attacker to go further in order to gather additional information about their intentions. In the context of this paper where high interaction honeypots are referenced, we allowed the attacker to log in to the honeypot with a designated set of usernames and passwords, and stored any command the attacker attempted to use.

Enterprise IT World

Diese Geschichte stammt aus der April 2019-Ausgabe von Enterprise IT World.

Abonnieren Sie Magzter GOLD, um auf Tausende kuratierter Premium-Geschichten und über 9.000 Zeitschriften und Zeitungen zuzugreifen.

Sie sind bereits Abonnent?

WEITERE GESCHICHTEN VON Enterprise IT World

Enterprise IT World

Enterprise IT World

SNS PRESENTS CIO500 DELHI EDITION CONCLUDES WITH RECORD PARTICIPATION

Full house audience engages in power-packed discussions on AI, innovation, cost control, and digital KPIs

time to read

1 mins

August 2025

Enterprise IT World

Enterprise IT World

Oklo and Vertiv Partner to Power the Future of Hyperscale Data Centers

In a groundbreaking move, Oklo, a pioneer in advanced nuclear technology, has partnered with Vertiv, a global leader in digital infrastructure, to co-develop next-generation power and cooling solutions for hyperscale and colocation data centers across the United States.

time to read

1 min

August 2025

Enterprise IT World

Enterprise IT World

Covasant Launches Enablr to Transform GCCs into Strategic Growth Engines

Covasant Technologies has launched Enablr\", a new Al-first business division designed to help global enterprises build and scale Global Capability Centers (GCCs) in India with speed, intelligence, and strategic clarity.

time to read

1 min

August 2025

Enterprise IT World

Enterprise IT World

Quick Heal Detects Android Cryptojacker Masquerading as Axis Bank App

Quick Heal Technologies has uncovered a stealthy Android cryptojacking campaign involving a fake banking app posing as Axis Bank.

time to read

1 min

August 2025

Enterprise IT World

Enterprise IT World

Freshworks and McLaren Racing Unite to Drive IT Excellence and On-Track Performance

Freshworks has announced a multiyear partnership with McLaren Racing, becoming an Official Partner of the McLaren Formula 1 Team.

time to read

1 min

August 2025

Enterprise IT World

Enterprise IT World

SECURING THE SANCTUM: A CYBERSECURITY GUIDE FOR INDIAN LAW FIRMS USING THE NIST FRAMEWORK

As custodians of sensitive legal data, Indian law firms face a mounting cybersecurity imperative. The NIST Cybersecurity Frame- work offers a strategic blueprint to protect client trust, professional integrity, and legal privilege.

time to read

7 mins

August 2025

Enterprise IT World

Enterprise IT World

Karnataka Hosts Global Collaboration Meet to Strengthen Tech Alliances Ahead of BTS 2025

In a strategic push to deepen international tech partnerships, the Government of Karnataka hosted the Global Collaboration Meet at Hotel Four Seasons, Bengaluru. Organized under the Global Innovation Alliance (GIA) initiative by the Department of Electronics, IT, Biotechnology, and Science & Technology, the event served as a prelude to the upcoming Bengaluru Tech Summit 2025 (BTS 2025).

time to read

1 min

August 2025

Enterprise IT World

Enterprise IT World

SECURING THE FUTURE: SRF LIMITED UNIFIES CYBERSECURITY ACROSS IT AND OT WITH TENABLE ONE

How SRF's SecureOT initiative is redefining industrial cybersecurity in India's manufacturing sector

time to read

2 mins

August 2025

Enterprise IT World

Enterprise IT World

SNS PRESENTS CI0500 & ACCELERATOR X AWARDS 2025 CONCLUDES SUCCESSFULLY IN BANGALORE

Technology leaders gather at Taj West End to celebrate innovation, leadership, and transformation

time to read

2 mins

August 2025

Enterprise IT World

Enterprise IT World

Sophos Opens Authorized Training Center in Mumbai with SATCOM Infotech

Sophos, a global leader in cybersecurity, has launched a new Authorized Training Center (ATC) in Mumbai, in partnership with SATCOM Infotech Pvt. Ltd. This initiative marks a significant step in Sophos' commitment to upskilling IT professionals and strengthening partner capabilities across India.

time to read

1 min

August 2025

Translate

Share

-
+

Change font size