Russian Hackers Lured With Honeypots

The NATO Cyber Coalition is using deceptive cyber security methods, called Honeypots, to entice and engage potential Russian and foreign hackers, so that NATO might potentially have some control of the hacker’s data and subsequently  monitor the attacker’s hacking methods. 

The object of the plan is to encourage a foreign (most likely Russian) hacker to start an attack into the NATO network and engage with a government worker, probably using a phishing email, to get the hacker network access. 

What the hacker does not realise is that they are now being monitored. NATO is using these honeypots techniques in a training activity with Estonia’s NATO Cyber Security Training Center, and the trial has involved over 1,000 participants.

Previous exercises were done to mimic real-world challenges and included Russian hybrid warfare techniques. Alberto Domingo,Technical Director of NATO's ACT Cyberspace Command, said that the honeypots are 'sacrificial machines' and their use is to allow  hackers to breach the honeypots easily, so that NATO can subsequently monitor the hacker’s techniques, giving NATO detailed information about their operations and procedures.

The objective is to collect intelligence on the adversary without their being aware of it. “It’s answering the questions of who is the adversary? What type of adversary are we talking about? What do they want and what are they going to do next?” said Domingo. 

With this plan the hackers will try to infiltrate NATO’s sensitive data by penetrating a NATO officials’ sensitive data with the aim to gain access to the whole NATO network.  This would potentially allow them to breach the systems and the sensitive information they are interested in. 

NATO will use the fake engage methods so that hackers believes their data hacking was a success. But, the attackers will probably later realise that the information they hacked is fake, yet what they won’t understand is that NATO can now gather the information to expose the cyber criminals’ techniques or tools. 

By letting this information out into the public domain, NATO probably believes that it will begin to reduce the number of cyber attacks. 

NATO ccdcoe:      NATO:       Tech Visibilty:      DefenseOne

You Might Also Read:

Estonia’s Crucial Role In Tackling Growing Cyber Threats:

 

« A Christmas Warning For Online Shoppers
In The Age of Risk, Cyber Security Is The Leading Concern »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Trulioo

Trulioo

Trulioo is a leading global identity and business verification company providing secure access to data sources worldwide to instantly verify consumers and businesses online.

IT Career Switch

IT Career Switch

An IT Career Switch Traineeship is the easiest way to start a new career in IT or Cybersecurity with fantastic career prospects.

DestructData

DestructData

DestructData is a leading independent provider of End of Life data destruction/security solutions.

Garner Products

Garner Products

Garner design, manufacture, and sell equipment that delivers complete, permanent, and verifiable data elimination.

Perch Security

Perch Security

Perch is a co-managed threat detection and response platform backed by an in-house Security Operations Center (SOC).

SynSaber

SynSaber

SynSaber is a data collection, detection, and visibility solution that forms the foundation of industrial cybersecurity.

Cloud Range

Cloud Range

Cloud Range provides cybersecurity teams with access to the world's leading cyber range platform, eliminating the need to invest in costly cyber range infrastructure.

HackersEra

HackersEra

HackersEra is a leading offensive cybersecurity service provider. We enable our clients to operate in a more secure environment efficiently and produce more value.

Morpheus Enterprises

Morpheus Enterprises

Morpheus Enterprises offer managed security solutions designed to keep your web applications secure and your business running smoothly.

Velum Labs

Velum Labs

Velum Labs is a cyber intelligence company that provides simple and non-intrusive, cloud and cyber intelligence solutions; built from a market-leading understanding of cyber-attack methodology.

NSW IT Support

NSW IT Support

NSW IT Support: Your exclusive hub for comprehensive Business IT services in Sydney. Our skilled team ensures seamless technology solutions nationwide, consistently delivering top-tier IT support.

StealthMole

StealthMole

StealthMole is a deep and dark web threat intelligence company that delivers a cloud-based, unified platform for digital investigation, risk assessment, and threat monitoring.

CardinalOps

CardinalOps

The CardinalOps platform continuously assesses your detection posture and eliminates coverage gaps in your existing detection stack so you can easily implement a threat-informed defense.

Hunt & Hackett

Hunt & Hackett

Hunt & Hackett helps European companies prevent, detect and respond to today’s most advanced adversaries, safeguarding them against cyberthreats and espionage.

Yondu

Yondu

Yondu empowers businesses across various industries through a wide array of innovative technology solutions to help them scale in the new digital economy.

Bureau

Bureau

Bureau is a no-code, identity decisioning platform that offers businesses the complete range of risk, compliance and ongoing fraud monitoring solutions innovated with AI.