

They exist to fool attackers into thinking that the devices they are targeting are real and contain real data. The purpose of a honeypot is to catch cybercriminal activity and then examine their attack methods. That being said, in the four days, we observed the most attacks coming from servers located in the United States, China, and the Netherlands. Technologies such as Virtual Private Networks (VPNs), the infamous TOR network or proxying connections through an already-infected device, are techniques often used by attackers to obfuscate their origin. However, attribution in cybersecurity is rarely clear-cut. So, where did these potential attacks to our honeypots come from and who were the targets? From our data, the top three most “attacked” countries were Ireland, Germany, and the United States (details in the chart below) while the three most aggressive countries in terms of scans performed were the United States, China and France.Ĭonnections per honeypot during the four days of the show
#ATHOME VIDEO STREAMER MALWARE AVAST SOFTWARE#
Of 11 million routers scanned by Avast in September 2018, 60% either had weak credentials or software vulnerabilities.Īttempted connections as of 12:37 on Thursday, February 28th Router security is also cause for concern. Streaming devices are among the most widespread and vulnerable smart devices in the home, according to our latest research. The three ports that were scanned most often were those usually found in Chromecast streaming devices and Google Smart Home Speakers (port 8088), Telnet port 22 and SSH port 23 that are often present in routers. That’s 11,588 attempts to connect per device per day. In other words, among 500 fake IoT-like devices installed on the internet, 23.2 million potential attacks were performed by possible cybercriminals. The findings were better (or worse) than they expected.Īs MWC drew to a close at around 4pm on Thursday, February 28th, 23.2 million attempts to connect to these honeypots were recorded by the team. The honeypots, akin to mousetraps on the internet, were purposely set up with open ports typically found in internet-connected devices to trick the attackers who scanned them into thinking they were connecting to routers, smart TVs, security cameras, or other smart appliances. The idea was to capture the number of attempted connections that potential attackers made to these honeypots in the hope that valuable data might be lurking within. On Sunday 24th February, the eve of Mobile World Congress 2019, Avast security researchers Martin Hron, Vladislav Iliushin, Libor Bakajsa, and Anna Shirokova set a project in motion: the deployment of 500 honeypots in 10 countries around the world that would run for the length of the show (four days), and beyond. 23.2 million potential attacks target 500 fake IoT-like devices deployed at Mobile World Congress.
