'Lazy Hackers' Turn To Automated Attack Tools
Cyber-attackers are turning to tools that automate the process of finding and hijacking vulnerable servers, a study has found.
The study used a fake server known as a honeypot to log everything done to it by digital intruders.
Put online by security firm Cybereason, the server was quickly found and hijacked in seconds by a bot that broke through its digital defences.
The firm said it expected to see more attacks staged with little human help.
"The bot did all the hard work," said Ross Rustici, head of intelligence services at Cybereason. "It shows how lazy hackers have become."
To make the fake server look more convincing, Cybereason thought up a company name, generated staff identities and spoofed network traffic. This, said Mr Rustici, helped it pass the "sniff test" and convince bots it was a target that was worth their attention.
About two hours after the server for the fake finance firm was put online it was found by a bot which then aggressively set about taking it over.
Passwords to protect some of the server's functions were left intentionally weak to tempt the bot which duly cracked them and then went on to plunder information on the machine.
Within 15 seconds of getting access, the bot:
- sought out and exploited several known vulnerabilities
- scanned the network to which the server was connected
- stole and dumped credentials for other vulnerable machines
- created new user accounts for its creators to use
"It completely owned the network in an automated fashion," said Mr Rustici.
While bots are widely used by cyber-criminals to seek out and subvert vulnerable servers, the process of going from initial compromise to a full-blown breach is often carried out by a human, he said.
But in this case in just a couple of minutes the bot did 80% of the work a human hacker would typically have to carry out, he said.
"We have never seen this first-hand before," said Mr Rustici. "If you are only concerned with gaining as much access to as many machines as possible then this bot is fantastic for you."
Once the bot had done its work, the attackers went quiet for two days but returned to steal data to which the compromised server allowed access. In total, the attackers took about four gigabytes of data, all of which was fake.
"Once they looked at the data they stole they probably lost interest and were probably quite annoyed," said Mr Rustici.
Cyber-attackers were mounting a vast number of attacks every day, said Martin Lee, technical lead at Cisco's security information arm.
"We block more than 20 billion attacks each and every day," said Mr Lee adding that this involved booby-trapped emails, malicious web pages and novel strains of malware.
"There's a wide spectrum in the threat landscape ranging from the least sophisticated 'script kiddies' through to the criminal threat actors that have a lot of resources at their disposal," he said.
From Chip War To Cloud War: The Next Frontier In Global Tech Competition
The global chip war, characterized by intense competition among nations and corporations for supremacy in semiconductor ... Read more
The High Stakes Of Tech Regulation: Security Risks And Market Dynamics
The influence of tech giants in the global economy continues to grow, raising crucial questions about how to balance sec... Read more
The Tyranny Of Instagram Interiors: Why It's Time To Break Free From Algorithm-Driven Aesthetics
Instagram has become a dominant force in shaping interior design trends, offering a seemingly endless stream of inspirat... Read more
The Data Crunch In AI: Strategies For Sustainability
Exploring solutions to the imminent exhaustion of internet data for AI training.As the artificial intelligence (AI) indu... Read more
Google Abandons Four-Year Effort To Remove Cookies From Chrome Browser
After four years of dedicated effort, Google has decided to abandon its plan to remove third-party cookies from its Chro... Read more
LinkedIn Embraces AI And Gamification To Drive User Engagement And Revenue
In an effort to tackle slowing revenue growth and enhance user engagement, LinkedIn is turning to artificial intelligenc... Read more