Saturday September 21, 2019
Home Lead Story Over 6 Lakh A...

Over 6 Lakh Attacks on Mumbai Cloud Server Honeypot

However, multiple development teams within an organisation and an ever-changing, auto-scaling environment make this difficult for IT security

0
//

Cybercriminals attempted attacks on a Mumbai Cloud server honeypot more than 678,000 times in a month, which was second to Ohio in the US that recorded more than 950,000 login attempts, among a total of 10 honeypots placed globally, global cyber security major Sophos said on Wednesday.

The honeypots were set-up in 10 of the most popular Amazon Web Services (AWS) data centres in the world, including California, Frankfurt, Ireland, London, Ohio, Paris, Sao Paulo, Singapore and Sydney over a 30-day period from mid-January to mid-February.

A honeypot is a system intended to mimic likely targets of cyberattackers for security researchers to monitor cybercriminal behaviour.

According to Sophos’ “Exposed: Cyberattacks on Cloud Honeypots” report, over five million attacks were attempted on the global network of honeypots, thus, demonstrating how cybercriminals are automatically scanning for weak open Cloud buckets.

Cloud servers were subjected to 13 attempted attacks per minute, per honeypot, on an average.

Cyberattacks
An employee works near screens in the virus lab at the headquarters of Russian cybersecurity company Kaspersky Labs in Moscow, July 29, 2013. VOA

With businesses across the globe increasingly adopting Cloud technology, the report revealed the extent to which businesses migrating to hybrid and all-Cloud platforms are at risk.

“The aggressive speed and scale of attacks on devices demonstrates the use of botnets to target an organisation’s Cloud platform,” Sunil Sharma, Managing Director, Sales, India and Saarc, Sophos, said in a statement.

Continuous visibility of public Cloud infrastructure is vital for businesses to ensure compliance and to know what to protect, the report emphasised.

Also Read- Social Networking Giant Facebook to Punish Groups for Spreading Fake News

However, multiple development teams within an organisation and an ever-changing, auto-scaling environment make this difficult for IT security.

“Instead of inundating security teams with a massive number of undifferentiated alerts, Sophos Cloud Optix significantly minimises alert fatigue by identifying what is truly meaningful and actionable,” said Ross McKerchar, CISO, Sophos. (IANS)

Next Story

Phishing Attacks Remain Top Threat to Financial Services Organisations and Customers

The goal of phishing is to trick the recipient of a malicious email into opening and engaging with it

0
tech, tools, slavery, UN
But the opportunities for using tech as a tool to identify people who are in modern slavery and to assist them are far greater and they outweigh the threat. Pixabay

Criminals seem to be recycling old attack methods as a new report has found that phishing attacks remain the top threat to financial services organisations and customers.

The study by cloud delivery network provider Akamai Technologies found that 50 per cent of all unique organisations impacted by observed phishing domains were from the financial services sector.

The goal of phishing is to trick the recipient of a malicious email into opening and engaging with it.

The “sender” of the email deceives the victim by making the email appear to be sent from a reputable source, such as a government department, a supplier, or a customer of the business.

Phishing, Attacks, Threat
Criminals seem to be recycling old attack methods as a new report has found that phishing attacks remain the top threat to financial services organisations and customers. Pixabay

The phishing email may have a malicious attachment, like a PDF or Word document, that, once opened, will harm the user’s computer by installing malware.

Or, the phishing email will contain a malicious URL link in its body. When the user clicks on that link, they might be directed to a site that appears legitimate, but in actuality it is used to collect confidential information such as usernames and passwords, or to install malware onto their device, according to Akamai.

The report indicates that between December 2, 2018 and May 4, 2019, nearly 200,000 phishing domains were discovered, and of those domains, 66 per cent targeted consumers directly.

In addition to unique phishing attempts, adversaries also leveraged credential stuffing attacks to the tune of 3.5 billion attempts during an 18-month period (November 2017 to
April 2019), putting the personal data and banking information of financial services customers at risk, said the “State of the Internet/Security Financial Services Attack Economy” report.

Also Read- Conclave of Himalayan States Urge Centre for Development of New Tourist Destinations, New Central Ministry

In credential stuffing, bad actors use real credentials stolen from a third-party resource. They take advantage of a common habit of people using the same credentials for different online accounts.

“We’ve seen a steady rise in credential stuffing attacks over the past year, fed in part by a growth in phishing attacks against consumers,” said Martin McKeay, Security Researcher at Akamai.

“Criminals supplement existing stolen credential data through phishing, and then one way they make money is by hijacking accounts or reselling the lists they create. We’re seeing a whole economy developing to target financial services organisations and their consumers,” McKeay added. (IANS)