article thumbnail

Pro-Ukraine attackers compromise Docker images to launch DDoS attacks on Russian sites

Security Affairs

Pro-Ukraine hackers, likely linked to Ukraine IT Army , are using Docker images to launch distributed denial-of-service (DDoS) attacks against a dozen websites belonging to government, military, and media. CrowdStrike Intelligence assesses these actors almost certainly compromised the honeypots to support pro-Ukrainian DDoS attacks.

Honeypots 108
article thumbnail

Free Tool: Honey Feed

Security Affairs

Cybersecurity expert Marco Ramilli shared another tool of his arsenal that extracts suspicious IPs from undesired connections, his HoneyPots. Hi folks, today I’d like to point you out another tool of mine which extracts suspicious IPs from undesired connections. In other words: HoneyPots. HoneyPot Page.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Australian Govt agency ACSC warns of Emotet and BlueKeep attacks

Security Affairs

. “The Australian Signals Directorate’s Australian Cyber Security Centre (ACSC), with its state and territory partners, is continuing to respond to the widespread malware campaign known as Emotet while responding to reports that hackers are exploiting the BlueKeep vulnerability to mine cryptocurrency.” They only expose port 3389.

article thumbnail

The Hacker Mind Podcast: Incident Response in the Cloud

ForAllSecure

They do like crypto mining and containers and stuff. So seems relatively benign, but one thing a lot of people don't realize is that they have a detection for crypto mining and they'll just destroy the system. Are governments putting their resources online? This was a more traditional attack.

Cloud 40
article thumbnail

Top Deception Tools for 2022

eSecurity Planet

It identifies unauthorized queries attempting to mine AD for data, hides sensitive or privileged AD query results (such as AD domain admins, domain controllers, SPNs, and others), and inserts fake results that point to decoy systems. Acalvio’s Deception Farm architecture and ShadowPlex application centralizes the deception process.

Cloud 131
article thumbnail

The Hacker Mind Podcast: Hacking Real World Criminals Online

ForAllSecure

Mine was 2000. All those exercises, the honeypot or honeynet challenges I think that's what they were called in. Like, we know that this is going to mature over this amount of time and then get the sponsors to pay for that which would be you know, either the government sponsors or the corporations or whatnot.

IT 40