Intentar ORO - Gratis

Cyberattacks On Cloud Honeypots

Enterprise IT World

|

April 2019

Contrary to popular belief, every device is worth hacking when the process is automated.

- Matt Boddy, Sophos

Cyberattacks On Cloud Honeypots

It doesn’t matter who or where you are, if you own a company big or small, or have technology in the home – every device can be monetized by an enterprising criminal. Brute force login attempts are likely occurring on any online device. Yet the speed and scale of the problem can boggle the mind. Criminals are relentless and often competitive with one another to find, take over, and monetize your smart devices.

The research you’ll find here, using honeypot devices across the internet, is a first step in attempting to quantify the issue. In cybersecurity terms, a honeypot is an open, vulnerable device, configured to deliberately lure a cybercriminal to attack. When the criminal starts to interact with the device, they are in fact triggering alarms to alert a business or individual to their presence and track their activity.

There are many types of honeypots, but in this paper we focus on two main distinctions: high and low interaction.

A low-interaction honeypot is a honeypot that, once found by the hacker, will not be of much use to them. In our case, the attacker is presented with a login prompt they have no way of getting past. This logs and stores any attempts to log in, providing information on the attacker’s IP address of origin (which can be attributed to a location), and the username and password used in the login attempt.

A high-interaction honeypot permits the attacker to go further in order to gather additional information about their intentions. In the context of this paper where high interaction honeypots are referenced, we allowed the attacker to log in to the honeypot with a designated set of usernames and passwords, and stored any command the attacker attempted to use.

MÁS HISTORIAS DE Enterprise IT World

Enterprise IT World

Enterprise IT World

INDIA-JAPAN SEMICONDUCTOR FORUM CHARTS PATH FOR TRUSTED GLOBAL COLLABORATION

SEMICON Japan 2025 sets the stage for resilient, sustainable, and competitive semiconductor value chains through bilateral cooperation.

time to read

1 mins

January 2026

Enterprise IT World

Enterprise IT World

CYCOGNITO PREDICTS FIVE ATTACK-SURFACE TRENDS THAT WILL REDEFINE ENTERPRISE SECURITY IN 2026

AI-driven adversaries, regulatory complexity, and unmanaged assets will push organizations toward outcome-based cybersecurity strategies.

time to read

2 mins

January 2026

Enterprise IT World

Enterprise IT World

FROM ENABLER TO ARCHITECT: HOW CIOS ARE DRIVING DIGITAL-FIRST TRANSFORMATION

Technology is no longer a support function it's the strategic engine powering growth and resilience. CIOs like Rajeev Pradhan are reimagining legacy systems, embedding responsible Al, and building cyber-secure frameworks to thrive amid disruption. His roadmap offers a blueprint for enterprises determined not just to adapt but to lead in a digital-first world.

time to read

9 mins

January 2026

Enterprise IT World

Enterprise IT World

Exotel's Al-Driven Turnaround in FY25

Exotel has scripted a remarkable comeback in FY2024-25, transforming from an EBITDA loss of ₹31 crore in FY24 to a positive ₹34 crore in FY25.

time to read

1 min

January 2026

Enterprise IT World

Enterprise IT World

HEALING WITHOUT HARM: BUILDING DATA PRIVACY INTO AI-POWERED HEALTHCARE

AI is transforming healthcare-from diagnostics to drug discovery-at an unprecedented scale. But innovation without trust is fragile. This story explores why embedding privacy into AI systems is not just a compliance requirement but a moral imperative for sustainable healthcare transformation.

time to read

2 mins

January 2026

Enterprise IT World

Enterprise IT World

2026 WILL BE THE YEAR OF COGNITIVE THREATS: SEQRITE WARNS OF HUMAN-MIMICKING CYBERATTACKS

India Cyber Threat Report 2026 predicts Al-driven attacks that combine intelligence and automation, demanding a new era of cognitive resilience.

time to read

2 mins

January 2026

Enterprise IT World

Enterprise IT World

WHY AI ALONE WON'T SAVE MALAYSIAN BUSINESSES FROM CYBERCRIME

AI is a powerful ally, not a lone savior. True cyber resilience demands human insight, layered defenses and continuous vigilance.

time to read

2 mins

January 2026

Enterprise IT World

Enterprise IT World

CYBERCRIME'S NEXT FRONTIER: WHY 2026 COULD BE THE MOST DANGEROUS YEAR YET

From autonomous AI hackers to deepfakes and wearable data theft, experts warn that cyber threats are evolving faster than defences.

time to read

1 mins

January 2026

Enterprise IT World

Enterprise IT World

2026: THE YEAR INTELLIGENT ENTERPRISES MOVE FROM ADOPTION TO ORCHESTRATION

Workforce readiness will become a C-suite survival metric. Enterprises that foster continuous learning and effective human-machine collaboration will gain a decisive edge.

time to read

1 mins

January 2026

Enterprise IT World

Enterprise IT World

COFORGE BETS BIG ON AI: ACQUIRES ENCORA TO BUILD A US$2.5 BILLION ENGINEERING POWERHOUSE

The landmark deal positions Coforge as a global leader in Al-driven engineering, creating a scaled enterprise core of Al, Cloud, and Data services for the new era.

time to read

3 mins

January 2026

Translate

Share

-
+

Change font size