Researchers create OT honeypot, attract exploits and fraud

Trend Micro announced the results of research featuring a honeypot imitating an industrial factory. The highly sophisticated Operational Technology (OT) honeypot attracted fraud and financially motivated exploits. Hardware equipment that ran the factor… Continue reading Researchers create OT honeypot, attract exploits and fraud

Thwart the pressing threat of RDP password attacks

How long does it takes for Internet-facing, RDP-enabled computers to come under attack? In some cases, a few minutes. In most, less than 24 hours. The problem with RDP “In recent years, criminals deploying targeted ransomware like BitPaymer, Ryuk… Continue reading Thwart the pressing threat of RDP password attacks

Companies investing in advanced forensic capabilities to identify attackers in greater detail

One in five companies are already using forensic investigations and other sophisticated methods to identify their attackers, like setting up honey pots and repositories of fake data to give attackers the idea they’ve hit real data while acting as a div… Continue reading Companies investing in advanced forensic capabilities to identify attackers in greater detail

Sophos Shines a Light on Cloud Security

Sophos published a report this week that suggest cloud servers on average are attacked within 40 minutes of being deployed. The Sophos report is based on a 30-day test spanning 10 honeypots Sophos set up in 10 data centers belonging to Amazon Web Serv… Continue reading Sophos Shines a Light on Cloud Security

BSides Athens 2018, Andronikos Kyriak’s ‘Paravirtualized Honeypot Deployment For The Analysis Of Malicious Activity’

Permalink
The post BSides Athens 2018, Andronikos Kyriak’s ‘Paravirtualized Honeypot Deployment For The Analysis Of Malicious Activity’ appeared first on Security Boulevard.
Continue reading BSides Athens 2018, Andronikos Kyriak’s ‘Paravirtualized Honeypot Deployment For The Analysis Of Malicious Activity’

Hacker honeypot shows even amateurs are going after ICS systems

While stories of nation-state backed hackers threatening the U.S. power sector garner regular headlines, a new experiment highlights the risk of unintended consequences when less-skilled adversaries target the sector. Researchers from Cybereason, a Boston-based company, set up a honeypot in mid-July that mimicked a utility substation’s network environment, drawing the attention of a determined attacker that repeatedly disabled the honeypot’s security system. The hacker’s attempts to be conspicuous, coupled with some sloppy work, told researchers that they were not part of any advanced persistent threat (APT) group that is linked with a nation-state. “It’s not script kiddies, but I’m not convinced that it’s APT either,” said Ross Rustici, senior director of intelligence at Cybereason. “[That] is a red flag for me because they’re very focused, but they’re making mistakes.” While the spotlight has been on nation-state threats to the energy grid, Rustici told CyberScoop, “one of the more concerning and […]

The post Hacker honeypot shows even amateurs are going after ICS systems appeared first on Cyberscoop.

Continue reading Hacker honeypot shows even amateurs are going after ICS systems

Are attackers harnessing your Redis server?

Earlier this year security researchers warned about vulnerable Apache Solr, Redis, and Windows servers hit with cryptominers. Imperva now says that that are still too many Internet-facing Redis servers and that 75% of them show signs of having been inf… Continue reading Are attackers harnessing your Redis server?

Wi-Fi honeypots: Alive and well at RSAC 2018

It was a gorgeous, sunny week in San Francisco as the best and brightest security experts around the globe gathered to attend one of the leading cybersecurity tradeshows in the industry – RSA Conference 2018. From hacking iOS to why security matt… Continue reading Wi-Fi honeypots: Alive and well at RSAC 2018

Down The Rabbit Hole: How Hackers Exploit Weak SSH Credentials To Build DDoS Botnets

The post Down The Rabbit Hole: How Hackers Exploit Weak SSH Credentials To Build DDoS Botnets appeared first on BruteForce Lab.
The post Down The Rabbit Hole: How Hackers Exploit Weak SSH Credentials To Build DDoS Botnets appeared first on Security Bou… Continue reading Down The Rabbit Hole: How Hackers Exploit Weak SSH Credentials To Build DDoS Botnets