Banning links from embedded browsers for security reasons
infosec

Banning links from embedded browsers for security reasons

Google has decided to ban the logins from embedded browsers since June of 2019. Why did he ...
Read More
infosec

Malicious AutoHotkey Scripts infect systems for spyware purposes

A new threat appears to have occurred, in which malicious hackers use AutoHotkey scripts to ...
Read More
inet infosec

PS5 details: Is there a risk that hackers will exploit them?

Sony's game developer and creator, Mark Cerny, gave some details about the new PS5 console. In one...
Read More
infosec

Cisco warns of vulnerabilities in 9000 series routers

Cisco has released 31 security tips this week, but has focused users on "critical" patches for ...
Read More
infosec

HP: Adds the Sure Sense malware blocker to its new devices

HP announced a series of updates and new features for PCs, as well as the official HP release ...
Read More
Latest Posts

Hackers attacked devices a few seconds after discovery of honeypots

HackersMany times, with the connection of new cloud devices and services, hackers "take up work." This means that in a few seconds from the moment the connection is made, attempts are made to scratch.

Sophos has created honeypots in ten of the most popular AWS data centers around the world (California, Ohio, Sao Paolo, Ireland, London, Paris, Frankfurt, Bombay, Singapore and Sydney). Then, connect them to the Internet using preset credentials or unsafe passwords.

Honeypot sites simulate one service Secure Shell Remote Access (SSH). With this service, users can connect remotely to the device and access files. If SSH is bypassed, then others will be able to gain access.

Since it appeared in less than a minute since honeypots were connected, hackers began to find them and use brute-force attacks to connect to the devices.

52 seconds attacked website of Sao Paulo.

According to a Sophos security specialist, this proves that there is an increased risk, regardless of the region.

At 5 minutes after the connection, the honeypot in Ohio was targeted, and within 20 minutes, attacks were made in California, Paris and Sydney.

London honeypot was discovered by hackers after 1 hour and a quarter, while Ireland after 1 time and 45 minutes.

However, since they were discovered, many attempts were made to connect - about 757 / hour.

Within a month 953.736 attempts to connect to the honeypot in Ohio (most of all areas) and 312.928 in Singapore (the fewest of all areas).

Default credentials (especially hardware-related usernames) are easy to discover by hackers.

Therefore, it is necessary to change the default username and password and choose something that does not "break" easily.

Also, experts recommend using one password manager. This will help manage the different access codes on different devices. Finally, it is necessary to have malware scanning programs.

Do you have an opinion? Leave your comment.

The author allows you to copy his / her text only if you report the source (SecNews.gr), as an e-mail address (Live URL) of the article.
Updated on by

Reader Interactions

Leave a reply

Your email address is not published. Τα υποχρεωτικά πεδία σημειώνονται με *