Skip to content

menu

Reed Smith LLP logo
HomeAboutOur ServicesSubscribeTopicsContact
Search
Close

Technology Law Dispatch

Cloud ‘honeypot’ shows risk of hacking, based on research by Sophos

By Cynthia O’Donoghue on 15 April 2019
Print:
Email this postTweet this postLike this postShare this post on LinkedIn

Sophos, an IT and network security company, conducted a study entitled “Exposed: Cyberattacks on Cloud Honeypots”. The study involved placing servers in 10 of the most popular data centres around the globe.

The servers were ‘honeypots’ configured in an open and vulnerable way to lure a cybercriminal attack. The study included both ‘low-’ and ‘high-interaction’ honeypots. The low-interaction honeypots logged and stored log-in attempts, providing information on a hacker’s IP address and the username and password used during the attempted log-in.

The high-interaction honeypots allowed further interaction with the hacker to try and gather information about the administrative commands made by the hacker after they managed to log in.

The low-interaction servers based in the United States, Europe, South America, Asia, and Australia suffered between 335,000 and 900,000 log-in attempts over a 30-day period, and in most cases the attempts were made from IP addresses based in China. In the most extreme case, one of the honeypots was attacked less than one minute from deployment, and once deployed averaged 13 log-in attempts per minute.

For the high-interaction honeypots, the findings show that the use of default usernames results in privileged access to servers and allows large-scale DDOS attacks. The findings also show that hackers target commonly used but poorly chosen passwords, such as “admin” or “123456”.

Sophos’ report highlights threats facing organisations that migrate data to hybrid and all-cloud platforms. Best practice and following the recommendations of ENISA and other cybersecurity agencies, as well as the security guidelines issued by various regulators, such as the EU data protection supervisory authorities, really are a must for organisations to protect data placed on the cloud.

Posted in Privacy & Data Protection, Social, Mobile, Analytics & Cloud (SMAC)
Tags: cloud, Cyberattacks, honeypots, log-in, Sophos
Photo of Cynthia O’Donoghue Cynthia O’Donoghue
Read more about Cynthia O’Donoghue
Related Posts
Department for Digital, Culture, Media and Sport launches consultation on app security
May 16, 2022
Germany’s Federal Constitutional Court provides guidance for assessing claims against hate speech on social media
February 8, 2022
Get your Update on IT & Data Protection Law in our Newsletter (Spring 2021 Edition)
June 7, 2021

Subscribe to Technology Law Dispatch

Updates direct to your inbox
Subscribe by Email

Technology Law Dispatch

View Our Network of Blogs
Published by
Reed Smith LLP logo
RSS Twitter Facebook LinkedIn YouTube
Privacy Policy |Disclaimer

About Our Firm

Reed Smith represents many of the world’s leading companies in complex litigation and other high-stakes disputes, cross-border and other strategic transactions, and crucial regulatory matters.

Read More...

Topics

Archives

Copyright © 2023, Reed Smith LLP. All Rights Reserved.
Law blog design & platform by LexBlog LexBlog Logo