"Uncovering Attacker Tactics Through Cloud Honeypots"

According to Orca Security, attackers typically discover exposed "secrets," or sensitive information that grants access to an enterprise cloud environment, in as little as two minutes and, in many cases, begin exploiting them almost immediately, highlighting the need for comprehensive cloud security. Between January and May of 2023, Orca conducted research, starting with creating "honeypots" on nine different cloud environments that simulated misconfigured cloud resources to entice attackers. Orca then monitored each honeypot to determine if and when attackers took the bait to determine which cloud services are most frequently targeted, how long it takes attackers to access public or easily accessible resources, and how long it takes to find and use leaked secrets. This article continues to discuss Orca Security's findings regarding attacker tactics. 

Help Net Security reports "Uncovering Attacker Tactics Through Cloud Honeypots"

Submitted by Anonymous on