article thumbnail

Pro-Ukraine attackers compromise Docker images to launch DDoS attacks on Russian sites

Security Affairs

Pro-Ukraine hackers, likely linked to Ukraine IT Army , are using Docker images to launch distributed denial-of-service (DDoS) attacks against a dozen websites belonging to government, military, and media. CrowdStrike Intelligence assesses these actors almost certainly compromised the honeypots to support pro-Ukrainian DDoS attacks.

Honeypots 112
article thumbnail

Episode 255: EDM, Meet CDM – Cyber Dance Music with Niels Provos

The Security Ledger

Niels Provos has a storied, two decade career on the forefront of cybersecurity, starting in the late 1990s with his work as a graduate student on phenomena like steganography and honeypots.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Bad Packets warns of over 14,500 Pulse secure VPN endpoints vulnerable to CVE-2019-11510

Security Affairs

The scanning activity detected by the honeypots of BadPackets was originated from a host in Spain, threat actors aim at gaining access into the private VPN network. ?????????????? “Unauthenticated remote attacker with network access via HTTPS can send a specially crafted URI to perform an arbitrary file reading vulnerability.”

Honeypots 101
article thumbnail

Podcast Episode 109: What’s The US Freedom Army? Ask Russia.

The Security Ledger

Among the revelations: the prevalence of online efforts to organize real world gatherings, like the “US Freedom Army,” which appears to be a military organization promoted via Twitter and other social media to U.S. Dave recently completed an analysis of Twitter bot data. survivalist groups. You might also be interested in: U.S.

article thumbnail

Warning the World of a Ticking Time Bomb

Krebs on Security

A security expert who has briefed federal and military advisors on the threat says many victims appear to have more than one type of backdoor installed. “There are researchers running honeypots to [attract] attacks from different groups, and those honeypots are getting shelled left and right,” she said.

Honeypots 328
article thumbnail

Past, present, and future of the Dark Web

Security Affairs

The dark web is full of honeypots. It is also impossible to determine the diffusion of honeypots. Or is the Dark Web itself a honeypot for criminals, anarchists, terrorists and. These doubts are legitimate, given that the military origins of the most popular anonymizing network. CONCLUSIONS. Information: 0.3% pedophiles?

article thumbnail

The Hacker Mind Podcast: Hacking Real World Criminals Online

ForAllSecure

While I produced this episode, a 21 year old Massachusetts National Guard airman is alleged to have photographed and distributed copies of classified US Military material on Discord, a social media site. All those exercises, the honeypot or honeynet challenges I think that's what they were called in. Let's analyze stuff.

IT 40