What Setting Live Traps for Cybercriminals Taught Me About Security

The Storm Center is a worldwide network of honeypots that are set up and monitored by volunteers.
For anyone who doesn't know what a honeypot is, it is a server created specifically for the purpose of gathering information about unauthorized users that connect to it.
A honeypot is usually vulnerable by design and often designed to be enticing to trap unsuspecting criminals into spending more time with it.
The information gathered from the Storm Center's network of distributed sensors provides invaluable threat research data about the trending methodologies and suspicious IP addresses used by the nefarious threat actors that attack and exploit other computer systems over the wire.
There was no domain name pointing to my server, or links to the IP address being posted anywhere online for someone to find.
On the honeypot's web server, 449 IP addresses had been scanning, trying to enumerate directories, and searching for vulnerabilities.
Learning how to navigate and filter the data I wanted was a long process, but the realization that real live threat actors were attacking my tiny little server was very inspiring.
Aside from learning that automated bots are attacking my honeypot relentlessly, I learned a lot about how these attacks are designed by breaking down the actual scripts and commands that are run once they have successfully connected.
One of the attacks I dove into was from February 11th, 2024.
A cowrie server is designed to be intentionally vulnerable and allows a certain percentage of brute force attempts to successfully authenticate and gain access to the server.
The second password the attacker tried allowed them in, and they ran a wide variety of commands, most likely via automated script.
First, they ran the echo command and looked at the binary file for it, most likely to check whether the system responds to common commands as expected.
The next part of the attack tried to download malware to a temp directory and execute it.
The script began with the nohup command, which stands for 'no hangup.
The script then attempts file retrieval via curl, using conditional logic to determine if the file downloaded successfully before executing more retrieval attempts, first via wget and then by establishing a TCP connection and running an HTTP GET request.
Seeing a well-thought-out attack script coming from an automated scanner that brute forces any SSH port it sees on an IP range made me very aware of the real threat that exists out there for servers and devices left insecure on the open web.
We don't know if the attacker was trying to upload a miner, a bot, or command and control software, but I see those types of malware uploaded successfully every day.
Use of commands like curl or wget connecting to unusual IP addresses.
Research your hardware online to make sure it's still supported by the manufacturer for security updates.
Outdated software may have vulnerabilities that make it easier to fall prey to a trap that downloads or executes malware on your home computer, which could potentially lead to a threat actor pivoting to other services on your network.


This Cyber News was published on isc.sans.edu. Publication date: Wed, 26 Jun 2024 22:13:06 +0000


Cyber News related to What Setting Live Traps for Cybercriminals Taught Me About Security

San Francisco Police's Live Surveillance Yields Almost 200 Hours of Spying-Including of Music Festivals - A new report reveals that in just three months, from July 1 to September 30, 2023, the San Francisco Police Department racked up 193 hours and 19 minutes of live access to non-city surveillance cameras. That means for the equivalent of 8 days, police ...
5 months ago Eff.org
Fake Ledger Live app in Microsoft Store steals $768,000 in crypto - Microsoft has recently removed from its store a fraudulent Ledger Live app for cryptocurrency management after multiple users lost at least $768,000 worth of cryptocurrency assets. Published with the name Ledger Live Web3, the fake application ...
7 months ago Bleepingcomputer.com
Industrials at Cisco Live 2024 - Network with thought leaders and gain forward-thinking insights driving your sector forward. Get started with a full list of industry sessions and activities. Join the leading minds in IT and learn about cutting-edge practices driving innovation in ...
1 month ago Feedpress.me
CVE-2024-36969 - In the Linux kernel, the following vulnerability has been resolved: ...
4 weeks ago
Embracing Security as Code - Everything is smooth until it isn't because we traditionally tend to handle the security stuff at the end of the development lifecycle, which adds cost and time to fix those discovered security issues and causes delays. Over the years, software ...
6 months ago Feeds.dzone.com
Microsoft Security Copilot improves speed and efficiency for security and IT teams - First announced in March 2023, Microsoft Security Copilot-Microsoft's first generative AI security product-has sparked major interest. With the rapid innovations of Security Copilot, we have taken this solution beyond security operations use cases ...
7 months ago Microsoft.com
Join Customer Experience for Cisco Live EMEA Demos - In her blog, Countdown to Cisco Live EMEA, Adele Trombetta, SVP, Cisco Customer Experience EMEA, mentioned how excited she is for Cisco Live EMEA in just a little more than a week, and I agree. I want to go a little deeper and give you some more ...
5 months ago Feedpress.me
10 Best Security Service Edge Solutions - Security Service Edge is an idea in cybersecurity that shows how network security has changed over time. With a focus on customized solutions, Security Service Edge Solutions leverages its expertise in multiple programming languages, frameworks, and ...
4 months ago Cybersecuritynews.com
What Is Cloud Security Management? Types & Strategies - Cloud security management is the process of safeguarding cloud data and operations from attacks and vulnerabilities through a set of cloud strategies, tools, and practices. The cloud security manager and the IT team are generally responsible for ...
1 month ago Esecurityplanet.com
6 Best Cloud Security Companies & Vendors in 2024 - Cloud security companies specialize in protecting cloud-based assets, data, and applications against cyberattacks. To help you choose, we've analyzed a range of cybersecurity companies offering cloud security products and threat protection services. ...
4 months ago Esecurityplanet.com
Application Security Testing Explained - That's precisely why application security is a top priority for security teams and a crucial consideration for DevOps. Application security testing is like giving your software a thorough health check to ensure it's robust and resilient against cyber ...
5 months ago Securityboulevard.com
Five business use cases for evaluating Azure Virtual WAN security solutions - To help organizations who are evaluating security solutions to protect their Virtual WAN deployments, this article considers five business use cases and explains how Check Point enhances and complements Azure security with its best-of-breed, ...
1 month ago Blog.checkpoint.com
CVE-2024-35873 - In the Linux kernel, the following vulnerability has been resolved: ...
1 month ago
Reflections from Cisco Live Melbourne: Innovation, Sustainability, and Connections - As I reflect on the whirlwind of excitement and innovation that was Cisco Live Melbourne, I am inspired by the sheer passion and engagement that filled every corner of the event. Being there, live and in person, was a reminder of the power of human ...
6 months ago Feedpress.me
What's Coming to Cisco Live Europe 2024 for the Data Center Developer? - In just a week or so, Cisco Live EMEA, 2024 will be ready to sizzle at the RAI Amsterdam. From a Cisco Cloud Networking standpoint, Cisco Nexus Dashboard, Cisco ACI, and Nexus 9000 Series switches are showing up in a big way. Read on to learn what ...
5 months ago Feedpress.me
Files with TXZ extension used as malspam attachments - Malicious e-mail attachments come in all shapes and sizes. These container files, especially, can sometimes be quite unusual Which is where today's diary comes in. While going over messages that were caught in my malspam traps over the course of May, ...
1 month ago Isc.sans.edu
What Setting Live Traps for Cybercriminals Taught Me About Security - The Storm Center is a worldwide network of honeypots that are set up and monitored by volunteers. For anyone who doesn't know what a honeypot is, it is a server created specifically for the purpose of gathering information about unauthorized users ...
1 week ago Isc.sans.edu
IaaS vs PaaS vs SaaS Security: Which Is Most Secure? - Security concerns include data protection, network security, identity and access management, and physical security. While IaaS gives complete control and accountability, PaaS strikes a compromise between control and simplicity, and SaaS provides a ...
6 months ago Esecurityplanet.com
Data Insights Exposes Ledger's Granular Tracking: Is Privacy at Stake? - An investigation by Rekt Builder has raised concerns about the extent of data collection by Ledger Live, the official software for managing Ledger hardware wallets. The developer claims that Ledger Live tracks every move users make, including the ...
6 months ago Cysecurity.news
A Practitioner's Guide to Security-First Design - Instead, organizations must proactively fortify their defenses and enter the era of security-first design - an avant-garde approach that transcends traditional security measures. Security-first design is an approach that emphasizes integrating robust ...
6 months ago Feeds.dzone.com
New Stellar Cyber Alliance to Deliver Email Security for SecOps Teams - Stellar Cyber, a Double Platinum 'ASTORS' Award Champion in the 2023 Homeland Security Awards Program, and the innovator of Open XDR has entered inao a new partnership with Proofpoint, a leading cybersecurity and compliance company. Through this ...
4 months ago Americansecuritytoday.com
Benefits and challenges of managed cloud security services - Too many organizations lack the in-house cloud security expertise and resources needed to protect cloud assets effectively. One option to address these challenges is managed cloud security. Outsourcing cloud security to a third party not only helps ...
4 months ago Techtarget.com
Understanding the 2024 Cloud Security Landscape - As we swiftly move towards the second quarter of 2024, predictions by cloud security reports highlight the challenges of cloud adoption in the cloud security landscape. This growing reliance on cloud infrastructure raises the critical issue of ...
3 months ago Feeds.dzone.com
The old, not the new: Basic security issues still biggest threat to enterprises - Attacks on critical infrastructure reveal industry faux pas. Ransomware attacks on enterprises saw a nearly 12% drop last year, as larger organizations opt against paying and decrypting, in favor of rebuilding their infrastructure. X-Force analysis ...
4 months ago Helpnetsecurity.com
Rugged Laptops: What Defense and First Responders Should Look For - Guest Editorial by Mike McMahon, President, Getac North America With law enforcement and first response data being targeted by bad actors and the growing threat of cyberspace being used as a theater of war, the rugged laptops used in the defense of ...
5 months ago Americansecuritytoday.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)