Honeypot #Draws Thousands of #Hackers to #Fake #Medical #Websites

Source: National Cyber Security News

From the outset, the medical practice’s 2 websites drew plenty of eyeballs. But it wasn’t the kind of attention anyone wants. Hackers, it turned out, were flocking to the platforms in droves. On average, 1 server attracted more than 560 scans and attempted attacks per week, a clear mark of the urgent cybersecurity threat facing healthcare.

Fortunately, the website was a so-called “honeypot,” a ploy designed to lure hackers to record and analyze their movements. The cybersecurity company Armor had teamed up with a third party to create the trap, launching 3 servers—1 with no firewall, 1 with some degree of protection, and a third with Armor’s proprietary technology, each mimicking a “public cloud environment that would be deployed by small and midsized businesses,” according to the resultant report. In this case, the honeypot used 2 medical practice websites, MetropolisPrimary.com and MetropolisMed.com.

“Unsurprisingly, the network was hit early and often,” Armor researchers wrote in the report. “Attacks started within minutes of the honeypot sensors being activated. Ultimately, each instance was scanned thousands of times by likely attackers.”

By the trial’s end, hackers had attacked the unsecured server more than 19,000 times, for roughly 2,500 attempts per week, over about 3 months, according to the survey.

Read More….

advertisement:

View full post on National Cyber Security Ventures

Sponsored Link: http://youtube.com/no1hacker

http://twiter.com/gregorydevans