Monday, July 6, 22:19 p.m.
Home security Hackers attacked devices a few seconds after discovery of honeypots

Hackers attacked devices a few seconds after discovery of honeypots

HackersMany times, with the connection of new cloud devices and services, hackers "take up work." This means that in a few seconds from the moment the connection is made, attempts are made to scratch.

Sophos has created honeypots in ten of the most popular AWS data centers around the world (California, Ohio, Sao Paolo, Ireland, London, Paris, Frankfurt, Bombay, Singapore and Sydney). Then, connect them to the Internet using preset credentials or unsafe passwords.

Honeypot sites simulate one service Secure Shell Remote Access (SSH). With this service, users can connect remotely to the device and access files. If SSH is bypassed, then others will be able to gain access.

Since it appeared in less than a minute since honeypots were connected, hackers began to find them and use brute-force attacks to connect to the devices.

52 seconds attacked website of Sao Paulo.

According to a Sophos security specialist, this proves that there is an increased risk, regardless of the region.

At 5 minutes after the connection, the honeypot in Ohio was targeted, and within 20 minutes, attacks were made in California, Paris and Sydney.

London honeypot was discovered by hackers after 1 hour and a quarter, while Ireland after 1 time and 45 minutes.

However, since they were discovered, many attempts were made to connect - about 757 / hour.

Within a month 953.736 attempts to connect to the honeypot in Ohio (most of all areas) and 312.928 in Singapore (the fewest of all areas).

Default credentials (especially hardware-related usernames) are easy to discover by hackers.

Therefore, it is necessary to change the default username and password and choose something that does not "break" easily.

Also, experts recommend using one password manager. This will help manage the different access codes on different devices. Finally, it is necessary to have malware scanning programs.

LEAVE ANSWER

Please enter your comment!
Please enter your name here

Absent Mia
Absent Miahttps://www.secnews.gr
Being your self, in a world that constantly tries to change you, is your greatest achievement

LIVE NEWS

Windows 10 2004: Unauthorized settings "block" the upgrade

Users report that they have a problem with Windows 10, since they are excluded from the application of the May 2020 update, when they manually attempt to ...
00:02:04

Lenovo is improving Linux ThinkPads but the problems remain

Last month, when Lenovo announced that it was going to certify the ThinkPad series for use with Linux operating systems, we thought directly ...

Nigerian accused of fraud against US companies

A Nigerian was taken to the federal court in Chicago on Friday, after being accused of coordinating an international cyber fraud system, which affected ...

Home routers display critical errors and run unpatched Linux

The German Fraunhofer Communication Institute (FKIE) conducted a survey that included 127 home routers from seven different brands, in an effort to ...

IPhone 12 release: Will we finally see it by the end of 2021?

New data on the release of the iPhone 12, which we all expect not to happen in September, say that it will only be delayed ...

MySQL: Replaces terms that reinforce racial discrimination

MySQL database developers have announced that they will be replacing terminology such as master, slave, blacklist, and whitelist.

The CEO of a cryptocurrency investment company was cheating

As reported by News24, Willie Breedt, the founder of VaultAge Solutions (cryptocurrency investment company), declared bankruptcy last week and the ...

United Kingdom: Will it exclude Huawei from its 5G networks?

The UK government has received an NCSC report on Huawei, which may change its policy ...

A Yahoo engineer is not in jail after hacking 6.000 accounts

A former Yahoo engineer has been sentenced to five years in prison for hacking into personal accounts ...

PoC exploits released for critical vulnerability on F5 BIG-IP devices

PoC exploits released for critical vulnerability on F5 BIG-IP devices Two days after the release of updates on critical vulnerability on F5 ...