Technology

Image copyrightGetty ImagesImage caption Attack bots scan net address ranges looking for vulnerable servers Cyber-attackers are turning to tools that automate the process of finding and hijacking vulnerable servers, a study has found.The study used a fake server known as a honeypot to log everything done to it by digital intruders.

Put online by security firm Cybereason, the server was quickly found and hijacked in seconds by a bot that broke through its digital defences.The firm said it expected to see more attacks staged with little human help."The bot did all the hard work," said Ross Rustici, head of intelligence services at Cybereason.

"It shows how lazy hackers have become."To make the fake server look more convincing, Cybereason thought up a company name, generated staff identities and spoofed network traffic.

This, said Mr Rustici, helped it pass the "sniff test" and convince bots it was a target that was worth their attention.About two hours after the server for the fake finance firm was put online it was found by a bot which then aggressively set about taking it over.

Passwords to protect some of the server's functions were left intentionally weak to tempt the bot which duly cracked them and then went on to plunder information on the machine.Within 15 seconds of getting access, the bot: sought out and exploited several known vulnerabilitiesscanned the network to which the server was connected stole and dumped credentials for other vulnerable machinescreated new user accounts for its creators to use"It completely owned the network in an automated fashion," said Mr Rustici.

While bots are widely used by cyber-criminals to seek out and subvert vulnerable servers, the process of going from initial compromise to a full-blown breach is often carried out by a human, he said.But in this case in just a couple of minutes the bot did 80% of the work a human hacker would typically have to carry out, he said."We have never seen this first-hand before," said Mr Rustici.

"If you are only concerned with gaining as much access to as many machines as possible then this bot is fantastic for you."Once the bot had done its work, the attackers went quiet for two days but returned to steal data to which the compromised server allowed access.

In total, the attackers took about four gigabytes of data, all of which was fake."Once they looked at the data they stole they probably lost interest and were probably quite annoyed," said Mr Rustici.Cyber-attackers were mounting a vast number of attacks every day, said Martin Lee, technical lead at Cisco's security information arm."We block more than 20 billion attacks each and every day," said Mr Lee adding that this involved booby-trapped emails, malicious web pages and novel strains of malware.

"There's a wide spectrum in the threat landscape ranging from the least sophisticated 'script kiddies' through to the criminal threat actors that have a lot of resources at their disposal," he said.





Unlimited Portal Access + Monthly Magazine - 12 issues-Publication from Jan 2021


Buy Our Merchandise (Peace Series)

 


Contribute US to Start Broadcasting



It's Voluntary! Take care of your Family, Friends and People around You First and later think about us. Its Fine if you dont wish to contribute and if you wish to contribute then think about the Homeless first and Feed them. We can survive with your wishes too :-). You can Buy our Merchandise too which are of the finest quality.

Debit/Credit/UPI

UPI/Debit/Credit

Paytm


STRIPE





25