Home » Security » Sophos Global Report exposes How Cyberattacks On Cloud Honeypots Occurs Within Seconds

Sophos Global Report exposes How Cyberattacks On Cloud Honeypots Occurs Within Seconds

IT NEWS NIGERIA:

·         Sophos study of 10 cloud server honeypots placed worldwide reveals the need for visibility and security to protect what businesses put into hybrid and all-cloud platforms

Key Report Findings:

·         Cloud server honeypots across 10 global locations attacked within 40 minutes, on average

·         Cloud servers were subjected to 13 attempted attacks per minute, per honeypot, on average

·         More than 5 million attempted attacks on all cloud server honeypots in a 30-day period

Lagos – April 10, 2019 – Sophos (LSE: SOPH), a global leader in network and endpoint security, today announced the findings of its report, Exposed: Cyberattacks on Cloud Honeypots, which reveals that cybercriminals attacked one of the cloud server honeypots in the study within 52 seconds of the honeypot going live in Sao Paulo, Brazil. 

On average, the cloud servers were hit by 13 attempted attacks per minute, per honeypot. 

The honeypots were set up in 10 of the most popular Amazon Web Services (AWS) data centers in the world, including California, Frankfurt, Ireland, London, Mumbai, Ohio, Paris, Sao Paulo, Singapore, and Sydney over a 30-day period. A honeypot is a system intended to mimic likely targets of cyberattackers, so that security researchers can monitor cybercriminal behaviors.

In the study, more than 5 million attacks were attempted on the global network of honeypots in the 30-day period, demonstrating how cybercriminals are automatically scanning for weak open cloud buckets.

If attackers are successful at gaining entry, organizations could be vulnerable to data breaches. Cybercriminals also use breached cloud servers as pivot points to gain access onto other servers or networks.

“The Sophos report, Exposed: Cyberattacks on Cloud Honeypots, identifies the threats organizations migrating to hybrid and all-cloud platforms face. The aggressive speed and scale of attacks on the honeypots shows how relentlessly persistent cybercriminals are and indicates they are using botnets to target an organization’s cloud platforms. 

READ ALSO  Greenhouse Carbon Audit: V4 Advisors Certifies Zenith Bank Of Nigeria

In some instances, it may be a human attacker, but regardless, companies need a security strategy to protect what they are putting into the cloud,” said Matthew Boddy, security specialist, Sophos. “The issue of visibility and security in cloud platforms is a big business challenge, and with increased migration to the cloud, we see this continuing.”

Visibility into Weaknesses

Continuous visibility of public cloud infrastructure is vital for businesses to ensure compliance and to know what to protect. However, multiple development teams within an organization and an ever-changing, auto-scaling environment make this difficult for IT security.

Sophos is addressing security weaknesses in public clouds with the launch of Sophos Cloud Optix, which leverages artificial intelligence (AI) to highlight and mitigate threat exposure in cloud infrastructures. Sophos Cloud Optix is an agentless solution that provides intelligent cloud visibility, automatic compliance regulation detection and threat response across multiple cloud environments.

“Instead of inundating security teams with a massive number of undifferentiated alerts, Sophos Cloud Optix significantly minimizes alert fatigue by identifying what is truly meaningful and actionable,” said Ross McKerchar, CISO, Sophos. “In addition, with visibility into cloud assets and workloads, IT security can have a far more accurate picture of their security posture that allows them to prioritize and proactively remediate the issues flagged in Sophos Cloud Optix.”

Key features in Sophos Cloud Optix include:

·         Smart Visibility  Provides automatic discovery of an organization’s assets across AWS, Microsoft Azure and Google Cloud Platform (GCP) environments, via a single console, allowing security teams complete visibility into everything they have in the cloud and to respond and remediate security risks in minutes

READ ALSO  Wikileaks : CIA Hacks Target Windows, Android, iOS, Internet Routers

·         Continuous Cloud Compliance – Keeps up with continually changing compliance regulations and best practices policies by automatically detecting changes to cloud environments in near-time

·         AI-Based Monitoring and Analytics – Shrinks incident response and resolution times from days or weeks to just minutes. The powerful artificial intelligence detects risky resource configurations and suspicious network behavior with smart alerts and optional automatic risk remediation

“Migrating several petabytes of data and many applications to AWS and Azure made it necessary to transition from a manual to automated process for security monitoring. Sophos Cloud Optix’s multi-cloud security and compliance platform capabilities provided real-time cloud workload protection status in seconds. 

“The AI-powered monitoring and alerts helped reduce the noise and allowed our teams to focus on delivering value to the business,” said Aaron Peck, vice president and CISO, Shutterfly, Inc., a Sophos customer, based in Redwood City, Calif.

“Our goal is to provide the most comprehensive and highly-effective cyber security services to all of our clients. Whether in technology, manufacturing or utilities, our customers want to maximize their investments and protect their data in the cloud. The partnership with Sophos and the ability to offer Sophos Cloud Optix is important to us because it allows us to provide continuous compliance coupled with intelligent cloud visibility and immediate threat response. With Cloud Optix, our growing customer-base will have the opportunity to solve the toughest challenges in cloud security,” said Rajeev Khanolkar, president and CEO, SecurView Inc., a Sophos partner based in Edison, New Jersey.

Leave a Reply

Your email address will not be published. Required fields are marked *

*

x

Check Also

scams phishing malware

Scams, phishing and malware : 60% of emails in May and June were fraudulent

Scams , phishing, and malware : ...

account takeovers 61 percent

61 percent of companies experience insider attacks

A new survey from Bitglass reveals that 61 ...

access bank

Access Bank denies hacker Ihebuzo Chris exposes 2000 customers’ data

Access Bank Plc  says it is ...

office 365 attack

Office 365: New phishing attack tries to steal credentials via Box

Office 365 new phishing attack: Researchers ...

UNILAG postgraduate student charged for allegedly defrauding Konga

UNILAG postgraduatestudent, Aniekan Charles Ekong has ...