Here’s what happens when you lay a trap for cybercriminals

(Image credit: Shutterstock / GoodStudio)

To leave a database exposed online for even a brief period of time carries a significant risk for businesses, according to the findings of a recent experiment.

Cybersecurity firm Comparitech set up a honeypot, in the form of a deliberately exposed database hosted on an Elasticsearch instance, which was attacked by unauthorized parties for the first time only 8.5 hours after it was made public.

During the 11-day period in which the fake database remained exposed, hackers attempted to gain access on 175 separate occasions, averaging 18 attacks per day.

Unsecured databases

According to the Comparitech report, many hackers rely on IoT search engines such as Shodan.io or BinaryEdge to identify vulnerable databases worthy of attack.

Five days after the honeypot was first deployed, the database was indexed on Shodan, leading to the largest number of attacks in a single day (22). Within just one minute of the honeypot appearing in search listings, two distinct attacks took place.

The report was noted that a significant volume of attacks took place before the database was listed by any search engine, which Comparitech says demonstrates “how many hackers rely on their own proactive scanning tools rather than waiting on passive IoT search engines to crawl vulnerable databases.”

Of the 175 attacks incurred by the honeypot, almost all originated in the United States (89), Romania (38) and China (15). The majority of attacks attempted to gain information about the database and its settings, with hackers using the GET request method in 147 instances and the POST method in 24.

While the company's initial intention was to challenge the assumption that exposing data for a short period is unlikely to result in an attack, the experiment also served to highlight the wide range of cyberthreats businesses face.

After the research had already concluded, a ransomware bot discovered the still public honeypot and deleted the few files that remained - an attack that lasted only five seconds.

“If you want to recover your data send 0.06 TBC to [redacted address] and you must send email to [redacted address] with your IP. If you need a proof about your data just send email (sic). If you don’t do a payment all your data may be used for our purposes and/or will be leaked/sold,” read a note left behind by the malicious bot.

The security firm noted that a portion of the attackers identified as part of the study could well have been fellow security researchers (benign attackers), which are often indistinguishable from malicious actors.

TOPICS
Joel Khalili
News and Features Editor

Joel Khalili is the News and Features Editor at TechRadar Pro, covering cybersecurity, data privacy, cloud, AI, blockchain, internet infrastructure, 5G, data storage and computing. He's responsible for curating our news content, as well as commissioning and producing features on the technologies that are transforming the way the world does business.

Latest in Security
Image depicting hands typing on a keyboard, with phishing hooks holding files, passwords and credit cards.
Microsoft warns about a new phishing campaign impersonating Booking.com
Data leak
Hacked Tata Technologies data leaked by ransomware gang
A close-up photo of an iPhone, with the App Store icon prominent in the center of the image.
Thousands of iOS apps found to expose user data and leak Stripe keys
China
Chinese hackers targeting Juniper Networks routers, so patch now
Google Chrome dark mode
Google updates Chrome extension rules to ban affiliate link injection without user action or benefit
Abstract image of robots working in an office environment including creating blueprint of robot arm, making a phone call, and typing on a keyboard
This worrying botnet targets unsecure TP-Link routers - thousands of devices already hacked
Latest in News
The Russo brothers posing for a photograph and Herman carrying a Volkswagen camper van in The Electric State
'We're optimists': AI enthusiasts Joe and Anthony Russo defend its use in movies and TV shows, but admit there are 'very real dangers' around its application
UK Prime Minister Sir Kier Starmer
UK PM says AI should soon replace civil servants
Xbox Copilot in Minecraft
Microsoft confirms Copilot can be tested by Xbox Insiders next month and shares new details about how the AI sidekick will enhance the player experience: 'It has to be about gameplay, it has to be personalized to you'
Eight Samsung TVs mounted to the wall showing different basketball games
Samsung is offering you 8 new TVs in one bundle for March Madness, in case you want to watch all games at once like a Bond villain’s lair
Image depicting hands typing on a keyboard, with phishing hooks holding files, passwords and credit cards.
Microsoft warns about a new phishing campaign impersonating Booking.com
The Steam Logo on a mobile phone in front of a wall of games.
Today’s Steam Spring Sale features my absolute favorite game of all time - here's when the sale starts and all the key info