• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Privacy
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Industry News
  • Our Experts
    • Tom Kellermann
    • Rik Ferguson
    • Christopher Budd
    • Raimund Genes
    • Mark Nunnikhoven
  • Research
Home   »   Security   »   Details Behind the NBC Honeypots: Part 2

Details Behind the NBC Honeypots: Part 2

  • Posted on:February 7, 2014
  • Posted in:Security
  • Posted by:
    Kyle Wilhoit (Senior Threat Researcher)
0

Recently, I was asked by NBC to participate in an experiment to deploy honeypots in Moscow, Russia, to see how fast they would be compromised. Taking a few steps from my previous blog, this post is intended to clarify some items; in addition an accompanying white paper will discuss the technical details behind the incidents that occurred. Click here to read “Experiment Shows Russia is Still a Hotbed of Nefarious Digital Activity: Part 1.” 

First, all the attacks required some kind of user interaction. Whether to execute “applications” or to open a Microsoft Word document, all the attacks shown required user interaction in order to compromise the device.

Second, these attacks could happen anywhere. They would not just happen in Moscow, nor did it require us to be in Moscow. Whether those attacks occur while you are sitting in a coffee shop in Berlin, or your home in Tokyo, these types of attacks can and do occur, on a worldwide scale.

Third, the infections occurred on newly unboxed hardware. Had basic security precautions such as updating the operating system or not opening emails from unrecognized sources been done, these attacks could have been prevented. A more detailed NBC video explaining these precautions can be seen here.

Finally, to reiterate, while all three devices looked like they had been compromised with no user interactions that was just not the case. Incorrect impressions may have been formed due to the editing process; no zero-days were used and all infections required plenty of risky behavior to succeed.

This blog post and the accompanying white paper both recommend various security best practices that most experts follow, and have been part of our advice to the general public for many years.

Security Intelligence Blog

  • Android-based Smart TVs Hit By Backdoor Spread Via Malicious App
  • Let’s Encrypt Now Being Abused By Malvertisers
  • What About Canada, Eh? – The Canadian Threat Landscape

Featured Authors

Christopher Budd (Global Threat Communications)
Christopher Budd (Global Threat Communications)
  • This Week in Security News
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • What Can Defenders Learn From VTech?
Raimund Genes (Chief Technology Officer)
Raimund Genes (Chief Technology Officer)
  • Trend Micro Receives Accolade for 15-Years of Excellence in Information Security Testing
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • Lone Rangers of the Underground
Tom Kellermann (Chief Cybersecurity Officer)
Tom Kellermann (Chief Cybersecurity Officer)
  • Raise Your Weapon: Observations at Consumer Electronics Show

Trend Micro Twitter Feed

Tweets by @trendmicro

Follow Us

Trend Micro in the News

  • Cyber threats facing news organizations
  • Ransomware one of the biggest threats in 2016
  • A cyber attack doesn’t need to be sophisticated to be dangerous

Trend Micro Blogs

  • CTO Insights
  • CounterMeasures
  • Internet Safety for Kids
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2014 Trend Micro Incorporated. All rights reserved.