Skip to main content

Discovering connections between attackers

posted onJune 5, 2015
by l33tdawg

In the last few years, Pedram Hayati, founder of Australian IT company Security Dimension, has been developing a custom honeypot intelligence system called Smart Honeypot.

Honeypots - fake systems designed to look like the real thing - can be used for many different purposes. One of these is to determine what attackers are after, their capabilities and the tactics they use to achieve their goals, and this is why Hayati set up thirteen Smart Honeypots in different geographic regions of Amazon Web Services and Google Cloud (America, Europe, Asia and Oceania).

"All hosts were identical, mimicking a typical server, and during the experiment their IP addresses were not published," he explained to the audience at Hack in the Box conference in Amsterdam. Interestingly enough, even so it took on average less than ten minutes for attackers to find them and target them.

Source

Tags

Security Industry News HITB2015AMS

You May Also Like

Recent News

Tuesday, July 9th

Wednesday, July 3rd

Friday, June 28th

Thursday, June 27th

Thursday, June 13th

Wednesday, June 12th

Tuesday, June 11th

Friday, June 7th

Thursday, June 6th

Wednesday, June 5th