Honware: IoT honeypot for detecting zero-day exploits

Two researchers have created a solution that could help security researchers and IoT manufacturers with detecting zero-day exploits targeting internet-connected devices more speedily than ever before. It’s called honware, and it’s a virtual… Continue reading Honware: IoT honeypot for detecting zero-day exploits

Researchers set up a mock factory network — and watched the criminals rush in

The 2017 WannaCry-fueled shutdown of a car facility and other high-profile infections make ransomware too big to ignore for the manufacturing sector. But while factory operators reckon with their security weaknesses, they sometimes lack information on how and why their networks attract the interest of digital thieves. In search of those answers, researchers at cybersecurity company Trend Micro ran a simulated factory network for seven months that invited all sorts of digital miscreants into the fray. Different attackers used the mock network, or honeypot, to mine cryptocurrency and infected it with two strains of a ransomware known as CrySIS. “These are career ransomware actors that are doing these things,” Trend Micro senior threat researcher Stephen Hilt told CyberScoop, reflecting on how professionalized and sector-agnostic ransomware attacks have become. In both cases, the attackers were able to lock up files on the network by breaching the faux factory’s robotics workstation, which […]

The post Researchers set up a mock factory network — and watched the criminals rush in appeared first on CyberScoop.

Continue reading Researchers set up a mock factory network — and watched the criminals rush in

Researchers create OT honeypot, attract exploits and fraud

Trend Micro announced the results of research featuring a honeypot imitating an industrial factory. The highly sophisticated Operational Technology (OT) honeypot attracted fraud and financially motivated exploits. Hardware equipment that ran the factor… Continue reading Researchers create OT honeypot, attract exploits and fraud

Thwart the pressing threat of RDP password attacks

How long does it takes for Internet-facing, RDP-enabled computers to come under attack? In some cases, a few minutes. In most, less than 24 hours. The problem with RDP “In recent years, criminals deploying targeted ransomware like BitPaymer, Ryuk… Continue reading Thwart the pressing threat of RDP password attacks

Companies investing in advanced forensic capabilities to identify attackers in greater detail

One in five companies are already using forensic investigations and other sophisticated methods to identify their attackers, like setting up honey pots and repositories of fake data to give attackers the idea they’ve hit real data while acting as a div… Continue reading Companies investing in advanced forensic capabilities to identify attackers in greater detail

Sophos Shines a Light on Cloud Security

Sophos published a report this week that suggest cloud servers on average are attacked within 40 minutes of being deployed. The Sophos report is based on a 30-day test spanning 10 honeypots Sophos set up in 10 data centers belonging to Amazon Web Serv… Continue reading Sophos Shines a Light on Cloud Security

BSides Athens 2018, Andronikos Kyriak’s ‘Paravirtualized Honeypot Deployment For The Analysis Of Malicious Activity’

Permalink
The post BSides Athens 2018, Andronikos Kyriak’s ‘Paravirtualized Honeypot Deployment For The Analysis Of Malicious Activity’ appeared first on Security Boulevard.
Continue reading BSides Athens 2018, Andronikos Kyriak’s ‘Paravirtualized Honeypot Deployment For The Analysis Of Malicious Activity’

Hacker honeypot shows even amateurs are going after ICS systems

While stories of nation-state backed hackers threatening the U.S. power sector garner regular headlines, a new experiment highlights the risk of unintended consequences when less-skilled adversaries target the sector. Researchers from Cybereason, a Boston-based company, set up a honeypot in mid-July that mimicked a utility substation’s network environment, drawing the attention of a determined attacker that repeatedly disabled the honeypot’s security system. The hacker’s attempts to be conspicuous, coupled with some sloppy work, told researchers that they were not part of any advanced persistent threat (APT) group that is linked with a nation-state. “It’s not script kiddies, but I’m not convinced that it’s APT either,” said Ross Rustici, senior director of intelligence at Cybereason. “[That] is a red flag for me because they’re very focused, but they’re making mistakes.” While the spotlight has been on nation-state threats to the energy grid, Rustici told CyberScoop, “one of the more concerning and […]

The post Hacker honeypot shows even amateurs are going after ICS systems appeared first on Cyberscoop.

Continue reading Hacker honeypot shows even amateurs are going after ICS systems

Are attackers harnessing your Redis server?

Earlier this year security researchers warned about vulnerable Apache Solr, Redis, and Windows servers hit with cryptominers. Imperva now says that that are still too many Internet-facing Redis servers and that 75% of them show signs of having been inf… Continue reading Are attackers harnessing your Redis server?