Skip to content

menu

Reed Smith LLP logo
HomeAboutOur ServicesSubscribeTopicsContact
Search
Close

Technology Law Dispatch

Cloud ‘honeypot’ shows risk of hacking, based on research by Sophos

By Cynthia O’Donoghue on 15 April 2019
Print:
Email this postLike this postShare this post on LinkedIn

Sophos, an IT and network security company, conducted a study entitled “Exposed: Cyberattacks on Cloud Honeypots”. The study involved placing servers in 10 of the most popular data centres around the globe.

The servers were ‘honeypots’ configured in an open and vulnerable way to lure a cybercriminal attack. The study included both ‘low-’ and ‘high-interaction’ honeypots. The low-interaction honeypots logged and stored log-in attempts, providing information on a hacker’s IP address and the username and password used during the attempted log-in.

The high-interaction honeypots allowed further interaction with the hacker to try and gather information about the administrative commands made by the hacker after they managed to log in.

The low-interaction servers based in the United States, Europe, South America, Asia, and Australia suffered between 335,000 and 900,000 log-in attempts over a 30-day period, and in most cases the attempts were made from IP addresses based in China. In the most extreme case, one of the honeypots was attacked less than one minute from deployment, and once deployed averaged 13 log-in attempts per minute.

For the high-interaction honeypots, the findings show that the use of default usernames results in privileged access to servers and allows large-scale DDOS attacks. The findings also show that hackers target commonly used but poorly chosen passwords, such as “admin” or “123456”.

Sophos’ report highlights threats facing organisations that migrate data to hybrid and all-cloud platforms. Best practice and following the recommendations of ENISA and other cybersecurity agencies, as well as the security guidelines issued by various regulators, such as the EU data protection supervisory authorities, really are a must for organisations to protect data placed on the cloud.

Posted in Privacy & Data Protection, Social, Mobile, Analytics & Cloud (SMAC)
Tags: cloud, Cyberattacks, honeypots, log-in, Sophos
Photo of Cynthia O’Donoghue Cynthia O’Donoghue
Read more about Cynthia O’Donoghue
Related Posts
Personal Jurisdiction Doctrine Shows Teeth as First Circuit Dismisses Class Action Wiretapping Claim
May 16, 2024
Germany’s government plans to introduce a statutory ‘right to encryption’ for users of messaging and cloud storage services
February 20, 2024
Department for Digital, Culture, Media and Sport launches consultation on app security
May 16, 2022

Subscribe to Technology Law Dispatch

Updates direct to your inbox
Subscribe by Email

Technology Law Dispatch

View Our Network of Blogs
Published by
Reed Smith LLP logo
RSS Facebook LinkedIn YouTube
Privacy Policy |Disclaimer

About Our Firm

At Reed Smith, everything we do is to apply our global experience in law to drive progress for our clients, for ourselves and for our communities. We are focused on outcomes, are highly collaborative and have deep industry insight. When combined with our local market knowledge and innovative mindset, this allows us to anticipate and address the needs of our clients and help them achieve their goals.

Our team of 3,000 people (including more than 1,700 lawyers) operate across 31 offices in the United States, Europe, the Middle East and Asia.

Read More...

Topics

Archives

Copyright © 2025, Reed Smith LLP. All Rights Reserved.
Law blog design & platform by LexBlog LexBlog Logo