What Setting Live Traps for Cybercriminals Taught Me About Security

The Storm Center is a worldwide network of honeypots that are set up and monitored by volunteers.
For anyone who doesn't know what a honeypot is, it is a server created specifically for the purpose of gathering information about unauthorized users that connect to it.
A honeypot is usually vulnerable by design and often designed to be enticing to trap unsuspecting criminals into spending more time with it.
The information gathered from the Storm Center's network of distributed sensors provides invaluable threat research data about the trending methodologies and suspicious IP addresses used by the nefarious threat actors that attack and exploit other computer systems over the wire.
There was no domain name pointing to my server, or links to the IP address being posted anywhere online for someone to find.
On the honeypot's web server, 449 IP addresses had been scanning, trying to enumerate directories, and searching for vulnerabilities.
Learning how to navigate and filter the data I wanted was a long process, but the realization that real live threat actors were attacking my tiny little server was very inspiring.
Aside from learning that automated bots are attacking my honeypot relentlessly, I learned a lot about how these attacks are designed by breaking down the actual scripts and commands that are run once they have successfully connected.
One of the attacks I dove into was from February 11th, 2024.
A cowrie server is designed to be intentionally vulnerable and allows a certain percentage of brute force attempts to successfully authenticate and gain access to the server.
The second password the attacker tried allowed them in, and they ran a wide variety of commands, most likely via automated script.
First, they ran the echo command and looked at the binary file for it, most likely to check whether the system responds to common commands as expected.
The next part of the attack tried to download malware to a temp directory and execute it.
The script began with the nohup command, which stands for 'no hangup.
The script then attempts file retrieval via curl, using conditional logic to determine if the file downloaded successfully before executing more retrieval attempts, first via wget and then by establishing a TCP connection and running an HTTP GET request.
Seeing a well-thought-out attack script coming from an automated scanner that brute forces any SSH port it sees on an IP range made me very aware of the real threat that exists out there for servers and devices left insecure on the open web.
We don't know if the attacker was trying to upload a miner, a bot, or command and control software, but I see those types of malware uploaded successfully every day.
Use of commands like curl or wget connecting to unusual IP addresses.
Research your hardware online to make sure it's still supported by the manufacturer for security updates.
Outdated software may have vulnerabilities that make it easier to fall prey to a trap that downloads or executes malware on your home computer, which could potentially lead to a threat actor pivoting to other services on your network.


This Cyber News was published on isc.sans.edu. Publication date: Wed, 26 Jun 2024 22:13:06 +0000


Cyber News related to What Setting Live Traps for Cybercriminals Taught Me About Security

San Francisco Police's Live Surveillance Yields Almost 200 Hours of Spying-Including of Music Festivals - A new report reveals that in just three months, from July 1 to September 30, 2023, the San Francisco Police Department racked up 193 hours and 19 minutes of live access to non-city surveillance cameras. That means for the equivalent of 8 days, police ...
1 year ago Eff.org
CVE-2024-50275 - In the Linux kernel, the following vulnerability has been resolved: arm64/sve: Discard stale CPU state when handling SVE traps The logic for handling SVE traps manipulates saved FPSIMD/SVE state incorrectly, and a race with preemption can result in a ...
7 months ago Tenable.com
Fake Ledger Live app in Microsoft Store steals $768,000 in crypto - Microsoft has recently removed from its store a fraudulent Ledger Live app for cryptocurrency management after multiple users lost at least $768,000 worth of cryptocurrency assets. Published with the name Ledger Live Web3, the fake application ...
1 year ago Bleepingcomputer.com
CVE-2024-36969 - In the Linux kernel, the following vulnerability has been resolved: ...
1 year ago
CVE-2024-42251 - In the Linux kernel, the following vulnerability has been resolved: ...
6 months ago
Industrials at Cisco Live 2024 - Network with thought leaders and gain forward-thinking insights driving your sector forward. Get started with a full list of industry sessions and activities. Join the leading minds in IT and learn about cutting-edge practices driving innovation in ...
1 year ago Feedpress.me
Join Customer Experience for Cisco Live EMEA Demos - In her blog, Countdown to Cisco Live EMEA, Adele Trombetta, SVP, Cisco Customer Experience EMEA, mentioned how excited she is for Cisco Live EMEA in just a little more than a week, and I agree. I want to go a little deeper and give you some more ...
1 year ago Feedpress.me
CVE-2024-35873 - In the Linux kernel, the following vulnerability has been resolved: ...
1 year ago
Reflections from Cisco Live Melbourne: Innovation, Sustainability, and Connections - As I reflect on the whirlwind of excitement and innovation that was Cisco Live Melbourne, I am inspired by the sheer passion and engagement that filled every corner of the event. Being there, live and in person, was a reminder of the power of human ...
1 year ago Feedpress.me
What's Coming to Cisco Live Europe 2024 for the Data Center Developer? - In just a week or so, Cisco Live EMEA, 2024 will be ready to sizzle at the RAI Amsterdam. From a Cisco Cloud Networking standpoint, Cisco Nexus Dashboard, Cisco ACI, and Nexus 9000 Series switches are showing up in a big way. Read on to learn what ...
1 year ago Feedpress.me
Files with TXZ extension used as malspam attachments - Malicious e-mail attachments come in all shapes and sizes. These container files, especially, can sometimes be quite unusual Which is where today's diary comes in. While going over messages that were caught in my malspam traps over the course of May, ...
1 year ago Isc.sans.edu
What Setting Live Traps for Cybercriminals Taught Me About Security - The Storm Center is a worldwide network of honeypots that are set up and monitored by volunteers. For anyone who doesn't know what a honeypot is, it is a server created specifically for the purpose of gathering information about unauthorized users ...
11 months ago Isc.sans.edu
Embracing Security as Code - Everything is smooth until it isn't because we traditionally tend to handle the security stuff at the end of the development lifecycle, which adds cost and time to fix those discovered security issues and causes delays. Over the years, software ...
1 year ago Feeds.dzone.com
Cybersecurity jobs available right now: October 2, 2024 - Help Net Security - As an Applied Cybersecurity Engineer (Center for Securing the Homeland), you will apply interdisciplinary competencies in secure systems architecture and design, security operations, threat actor behavior, risk assessment, and network security to ...
8 months ago Helpnetsecurity.com
Top 30 Best Penetration Testing Tools - 2025 - The tool supports various protocols and offers advanced filtering and analysis capabilities, making it ideal for diagnosing network issues, investigating security incidents, and understanding complex network interactions during penetration testing. ...
2 months ago Cybersecuritynews.com
Microsoft Security Copilot improves speed and efficiency for security and IT teams - First announced in March 2023, Microsoft Security Copilot-Microsoft's first generative AI security product-has sparked major interest. With the rapid innovations of Security Copilot, we have taken this solution beyond security operations use cases ...
1 year ago Microsoft.com
10 Best Security Service Edge Solutions - Security Service Edge is an idea in cybersecurity that shows how network security has changed over time. With a focus on customized solutions, Security Service Edge Solutions leverages its expertise in multiple programming languages, frameworks, and ...
1 year ago Cybersecuritynews.com
Application Security Testing Explained - That's precisely why application security is a top priority for security teams and a crucial consideration for DevOps. Application security testing is like giving your software a thorough health check to ensure it's robust and resilient against cyber ...
1 year ago Securityboulevard.com
Data Insights Exposes Ledger's Granular Tracking: Is Privacy at Stake? - An investigation by Rekt Builder has raised concerns about the extent of data collection by Ledger Live, the official software for managing Ledger hardware wallets. The developer claims that Ledger Live tracks every move users make, including the ...
1 year ago Cysecurity.news
What Is Cloud Security Management? Types & Strategies - Cloud security management is the process of safeguarding cloud data and operations from attacks and vulnerabilities through a set of cloud strategies, tools, and practices. The cloud security manager and the IT team are generally responsible for ...
1 year ago Esecurityplanet.com
Key Breakthroughs from RSA Conference 2025 - Day 1 - Sumo Logic unveiled intelligent security operations with capabilities like detection-as-code (bringing DevSecOps to threat detection), UEBA historical baselining (improving accuracy by learning behavior over time), multiple threat intelligence feeds, ...
1 month ago Cybersecuritynews.com Inception
6 Best Cloud Security Companies & Vendors in 2024 - Cloud security companies specialize in protecting cloud-based assets, data, and applications against cyberattacks. To help you choose, we've analyzed a range of cybersecurity companies offering cloud security products and threat protection services. ...
1 year ago Esecurityplanet.com
Five business use cases for evaluating Azure Virtual WAN security solutions - To help organizations who are evaluating security solutions to protect their Virtual WAN deployments, this article considers five business use cases and explains how Check Point enhances and complements Azure security with its best-of-breed, ...
1 year ago Blog.checkpoint.com
20 Best Endpoint Management Tools - 2025 - What is Good?What Could Be Better?Comprehensive endpoint security against many threats.The user interface may overwhelm some users.Machine learning for real-time threat detection.Integration with existing systems may be complex.A central management ...
2 months ago Cybersecuritynews.com
Linux Kernel Patching: Preventing Exploits in 2025 - Live kernel patching technologies like Kpatch and SUSE Live Patch have evolved from niche tools to essential components of enterprise security postures. Immutable Infrastructure: Cloud providers combine kernel live patching with ...
1 month ago Cybersecuritynews.com