article thumbnail

Pro-Ukraine Groups Exploit Containers to Launch DoS Attacks

Data Breach Today

Cybersecurity firm CrowdStrike's researchers say that through their Docker Engine honeypots, they observed two different Docker images targeting these assets. Unsuspecting Hosts Are Potential Targets for Retaliation Containers and cloud-based resources are being used to launch DoS attacks against Russian, Belarusian and Lithuanian websites.

Honeypots 246
article thumbnail

New ZHtrap botnet uses honeypot to find more victims

Security Affairs

Netlab 360 experts discovered a new Mirai-based botnet dubbed ZHtrap that implements honeypot to find more victims. Researchers from Netlab 360 discovered a new Mirai-based botnet dubbed ZHtrap that implements honeypot to find more victims. Experts noticed that that the bot borrows some implementations of the Matryosh DDoS botnet.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Robocall Results from a Telephony Honeypot

Schneier on Security

A group of researchers set up a telephony honeypot and tracked robocall behavior : NCSU researchers said they ran 66,606 telephone lines between March 2019 and January 2020, during which time they said to have received 1,481,201 unsolicited calls -- even if they never made their phone numbers public via any source.

Honeypots 101
article thumbnail

No, I Did Not Hack Your MS Exchange Server

Krebs on Security

The group looks for attacks on Exchange systems using a combination of active Internet scans and “honeypots” — systems left vulnerable to attack so that defenders can study what attackers are doing to the devices and how. ” “The web shell path that was dropped was new to us,” said Watson said.

Honeypots 347
article thumbnail

Threat Group TeamTNT Returns with New Cloud Attacks

eSecurity Planet

However, the researchers are convinced the threat actor is back, as their honeypots identified TeamTNT signatures and tools in a series of three attacks during the first week of September. The post Threat Group TeamTNT Returns with New Cloud Attacks appeared first on eSecurityPlanet. Read next: How to Control API Security Risks.

Cloud 119
article thumbnail

Tourists Give Themselves Away by Looking Up. So Do Most Network Intruders.

Krebs on Security

. “Canarytokens does all this and more, letting you implant traps in your production systems rather than setting up separate honeypots.” But in an interview with KrebsOnSecurity, Thinkst founder and CEO Haroon Meer said most deception techniques involve some degree of hubris. “Nobody really has time for that.

Honeypots 180
article thumbnail

We infiltrated an IRC botnet. Here’s what we found

Security Affairs

To conduct this investigation, a CyberNews researcher infiltrated an IRC botnet that we captured in one of our honeypots. Our honeypot setup. In cybersecurity terms, a honeypot is a decoy service or system that poses as a target for malicious actors. Here’s how it all happened. About this investigation.

Honeypots 139