Six people were arrested by Europol for Bitcoin theft
infosec

Six people were arrested by Europol for Bitcoin theft

According to a press release released on June 25, Europol in partnership with South West Regional Cyber ​​...
Read More
infosec

Why can not I remove Windows 7? But why should it?

As we have mentioned several times in the past, Microsoft is particularly concerned about the world's love for Windows ...
Read More
infosec

Phishing campaign infects Windows computers with two types of trojan

A new phishing campaign infects the victims with two popular trojan and hackers seem to try to target ...
Read More
infosec

Bank Trojan Riltok has also begun to locate itself in Europe

Riltok, a banking Trojan known for its activity in entities in Russia, seems to have been renewed and now has ...
Read More
infosec

An IT service provider paid $ 150.000 to hackers

According to UBX Cloud, one company succumbed to extortion by hackers who placed a ransomware on their systems ...
Read More
Latest Posts

Hackers attacked devices a few seconds after discovery of honeypots

HackersMany times, with the connection of new cloud devices and services, hackers "take up work." This means that in a few seconds from the moment the connection is made, attempts are made to scratch.

Sophos has created honeypots in ten of the most popular AWS data centers around the world (California, Ohio, Sao Paolo, Ireland, London, Paris, Frankfurt, Bombay, Singapore and Sydney). Then, connect them to the Internet using preset credentials or unsafe passwords.

Honeypot sites simulate one service Secure Shell Remote Access (SSH). With this service, users can connect remotely to the device and access files. If SSH is bypassed, then others will be able to gain access.

Since it appeared in less than a minute since honeypots were connected, hackers began to find them and use brute-force attacks to connect to the devices.

52 seconds attacked website of Sao Paulo.

According to a Sophos security specialist, this proves that there is an increased risk, regardless of the region.

At 5 minutes after the connection, the honeypot in Ohio was targeted, and within 20 minutes, attacks were made in California, Paris and Sydney.

London honeypot was discovered by hackers after 1 hour and a quarter, while Ireland after 1 time and 45 minutes.

However, since they were discovered, many attempts were made to connect - about 757 / hour.

Within a month 953.736 attempts to connect to the honeypot in Ohio (most of all areas) and 312.928 in Singapore (the fewest of all areas).

Default credentials (especially hardware-related usernames) are easy to discover by hackers.

Therefore, it is necessary to change the default username and password and choose something that does not "break" easily.

Also, experts recommend using one password manager. This will help manage the different access codes on different devices. Finally, it is necessary to have malware scanning programs.

Share
Do you have an opinion? Leave your comment.

The author allows you to copy his / her text only if you report the source (SecNews.gr), as an e-mail address (Live URL) of the article.
Updated on by

Reader Interactions

Leave a reply

Your email address is not published. Τα υποχρεωτικά πεδία σημειώνονται με *