EletiofeA Clever Honeypot Tricked Hackers Into Revealing Their Secrets

A Clever Honeypot Tricked Hackers Into Revealing Their Secrets

-

- Advertisment -

Plenty of people tried to access the system. Over the past three years, it has captured 21 million login attempts, with more than 2,600 successful logins by attackers brute-forcing the weak password they purposefully used on the system. They recorded 2,300 of these successful logins, gathered 470 files that were uploaded, and analyzed 339 of the videos with useful footage. (Some recordings were just a couple of seconds long, and proved less useful.) “We cataloged the techniques, the tooling, everything done on these systems,” Bilodeau says.

Bergeron and Bilodeau have grouped the attackers into five broad categories based on character types from the role-playing game Dungeons and Dragons. Most common were the rangers: once these attackers were inside the trap RDP session, they would immediately start exploring the system, removing Windows antivirus tools, delving into folders, looking at the network it was on and other elements of the machine. Rangers wouldn’t take any action, Bergeron says. “It’s basic recon,” she says, suggesting they may be evaluating the system for others to enter it.

Barbarians were the next most frequent kind of attackers. These use multiple hacking tools, such as Masscan and NLBrute, to brute-force their way into other computers, the researchers say. They work through a list of IP addresses, usernames, and passwords, trying to break into the machines. Similarly, the group they call wizards use their access to the RDP to launch attacks against other insecure RDPs—potentially masking their identity across many layers. “They use the RDP access as a portal to connect to other computers,” Bergeron says.

The thieves, meanwhile, do what their name implies. They try to make money out of the RDP access in any way possible. They use traffic monetization websites and install crypto miners, the researchers say. They might not earn a lot in one go, but multiple compromises can add up.

The final group Bergeron and Bilodeau observed is the most haphazard: the bards. These people, the researchers say, may have purchased access to the RDP and are using it for a variety of reasons. One person the researchers watched Googled the “strongest virus ever,” Bergeron says, while another tried to access Google Ads.

Others simply tried (and failed) to find porn. “We can see the beginner level he is in, as he searched for porn on YouTube—nothing appears, of course,” Bergeron says, since YouTube doesn’t permit pornography. Multiple sessions were spotted trying to access porn, the researchers say, and these users were always writing in Farsi, indicating they may be trying to access porn in places where it is blocked. (The researchers weren’t able to determine conclusively where many of those accessing the RDP were doing so from.)

Despite this, watching the attackers reveals the way they behave, including some more peculiar actions. Bergeron, who has a PhD in criminology, says the attackers were sometimes “very slow” at doing their work. Often she was “getting impatient” while watching them, she says. “I’m like: ‘Come on, you’re not good at that’ or ‘Go faster’ or ‘Go deeper,’ or ‘You can do better.’”

Latest news

What The Heck Is This New Meta AI Photo Feature And Can I Turn It Off?

Have you ever wanted to animate your profile picture on Facebook? Or turn your latest Instagram upload into a...

Inside the Race to Develop a Test for the Rare Andes Hantavirus

As passengers return to the US from the cruise that saw a rare hantavirus outbreak, much of the country...

OnlyFans’ First-Gen Creators Are Retiring—and Some Are Begging You to Forget They Exist

On April 28, just before noon, Win White logged onto X and posted a series of messages to his...

Sony Bravia Theater Bar 5 Review: Basic Bar, Big Sound

Review: Sony Bravia Theater Bar 5The latest Bravia Theater soundbar strips away the nice-to-have extras, but its crisp and...
- Advertisement -

A Conspiracy Theory About QR Codes Has Led to Chaos Ahead of Georgia’s Midterms

QR codes are at the center of the latest conspiracy theory in Georgia’s elections. And it’s largely thanks to...

Meet the Sad Wives of AI

If i had to listen to another minute of my husband talking about Claude Code, I might have actually...

Must read

What The Heck Is This New Meta AI Photo Feature And Can I Turn It Off?

Have you ever wanted to animate your profile picture...

Inside the Race to Develop a Test for the Rare Andes Hantavirus

As passengers return to the US from the cruise...
- Advertisement -

You might also likeRELATED
Recommended to you