This server was online for under a minute before hackers were trying to crack it | WHAT REALLY HAPPENED


This server was online for under a minute before hackers were trying to crack it

It can only take seconds before cyber criminals start attempting to hack into newly connected cloud devices and services, as attackers relentlessly pursue new avenues to exploit for malicious purposes.

Researchers at security company Sophos set up honeypots in ten of the most popular AWS data centre locations around the world -- California, Ohio, Sao Paulo, Ireland, London, Paris, Frankfurt, Mumbai, Singapore and Sydney -- and connected them to the internet with common configuration errors, such as using default credentials or insecure passwords.

Each of the honeypot sites simulates a Secure Shell (SSH) remote access service, designed to allow users to connect remotely to the device and access files. If attackers can bypass the SSH, they can gain the same level of access as the owner -- and in some cases, gain more control over the device that was ever intended.

It took under a minute for attackers to start to find the honeypots and begin using brute-force attacks in an effort to login to the devices. The Sao Paulo site first came under attack, with the first login attempt registered after just 52 seconds.

Comments

SHARE THIS ARTICLE WITH YOUR SOCIAL MEDIA