Cyberattacks On Cloud Honeypots
Enterprise IT World
|April 2019
Contrary to popular belief, every device is worth hacking when the process is automated.
It doesn’t matter who or where you are, if you own a company big or small, or have technology in the home – every device can be monetized by an enterprising criminal. Brute force login attempts are likely occurring on any online device. Yet the speed and scale of the problem can boggle the mind. Criminals are relentless and often competitive with one another to find, take over, and monetize your smart devices.
The research you’ll find here, using honeypot devices across the internet, is a first step in attempting to quantify the issue. In cybersecurity terms, a honeypot is an open, vulnerable device, configured to deliberately lure a cybercriminal to attack. When the criminal starts to interact with the device, they are in fact triggering alarms to alert a business or individual to their presence and track their activity.
There are many types of honeypots, but in this paper we focus on two main distinctions: high and low interaction.
A low-interaction honeypot is a honeypot that, once found by the hacker, will not be of much use to them. In our case, the attacker is presented with a login prompt they have no way of getting past. This logs and stores any attempts to log in, providing information on the attacker’s IP address of origin (which can be attributed to a location), and the username and password used in the login attempt.
A high-interaction honeypot permits the attacker to go further in order to gather additional information about their intentions. In the context of this paper where high interaction honeypots are referenced, we allowed the attacker to log in to the honeypot with a designated set of usernames and passwords, and stored any command the attacker attempted to use.
Diese Geschichte stammt aus der April 2019-Ausgabe von Enterprise IT World.
Abonnieren Sie Magzter GOLD, um auf Tausende kuratierter Premium-Geschichten und über 9.000 Zeitschriften und Zeitungen zuzugreifen.
Sie sind bereits Abonnent? Anmelden
WEITERE GESCHICHTEN VON Enterprise IT World
Enterprise IT World
SecurityScorecard Exposes Global ASUS Router Hijack "WrtHug" With Suspected China Links
SecurityScorecard's STRIKE threat intelligence team, working with ASUS, has uncovered Operation WrtHug- a sophisticated global espionage campaign hijacking thousands of ASUS home and SOHO routers to create covert relay nodes across Asia, the US, and Europe.
1 min
November 2025
Enterprise IT World
Armis Raises $435 Million Pre-IPO Funding, Valued at $6.1 Billion
Armis, the global leader in cyber exposure management, has secured US$435 million in pre-IPO funding, boosting its valuation to US$6.1 billion.
1 min
November 2025
Enterprise IT World
Paytm Bets on AI in Travel with Launch of 'Paytm Checkin'
Paytm (One 97 Communications Limited), India's leading digital payments and financial services company, has unveiled Paytm Checkin, an Al-powered travel app designed to transform trip planning and booking through conversational intelligence and personalization.
1 min
November 2025
Enterprise IT World
FROM AGENTIC AI TO INCLUSIVE GROWTH: IFTA UNVEILS FINTECH TRENDS 2026 AHEAD OF 10TH ANNUAL INDIA FINTECH FORUM
The 10th edition of the India FinTech Forum (IFTA) spotlights Agentic AI, embedded finance, democratization of wealth, cyber resilience, and fintech for Bharat as the key trends shaping India's financial future. The event, to be held on December 10, 2025, in Mumbai, will also honour disruptive fintech startups transforming the BFSI landscape.
4 mins
November 2025
Enterprise IT World
INDIA'S DPDP ACT: A NEW ERA FOR DATA PRIVACY AND DIGITAL TRUST
The Digital Personal Data Protection Act, 2025 sets a clear framework for consent, accountability, and governance-reshaping how businesses handle personal data in an Al-driven economy.
3 mins
November 2025
Enterprise IT World
TIRED OF SPAM CALLS? HOW THE DPDP RULES, 2025 PUT YOU BACK IN CONTROL. THE DAILY NUISANCE WE ALL KNOW
The Digital Personal Data Protection Act, 2025 sets a clear framework for consent, accountability, and governance-reshaping how businesses handle personal data in an Al-driven economy.
4 mins
November 2025
Enterprise IT World
CyberArk Launches Free TLS Certificate Scan Tools to Help Businesses Prevent Outages and Rising Labor Costs
CyberArk has unveiled two free tools -the TLS Certificate Renewal Impact Calculator and TLS Certificate Discovery Scan to help organizations prepare for a seismic shift in certificate management.
1 min
November 2025
Enterprise IT World
Consistent Infosystems to Showcase Advanced Surveillance Technologies at IFSEC India 2025
Consistent Infosystems, one of India's fastest-growing IT hardware and security technology brands, is gearing up for a strong presence at IFSEC India 2025, scheduled from 11-13 December at Pragati Maidan, New Delhi.
1 min
November 2025
Enterprise IT World
Lenovo India Surges to USD 1.2 Billion Quarterly Revenue, Fueled by Al and Digita Infrastructure Demand
Lenovo India has delivered a landmark performance in Q2 FY25/26, posting USD 1.2 billion in revenue-an impressive 23% year-on-year growth-marking one of its strongest quarters to date.
1 min
November 2025
Enterprise IT World
CyberArk's New TLS Tools Signal a Turning Point in Automation and Risk Management
As TLS certificate lifespans shrink dramatically-from 398 days today to just 47 days by 2029-automation is no longer optional; it's mission-critical for business continuity.
1 min
November 2025
Translate
Change font size

