Russian Hackers Lured With Honeypots

The NATO Cyber Coalition is using deceptive cyber security methods, called Honeypots, to entice and engage potential Russian and foreign hackers, so that NATO might potentially have some control of the hacker’s data and subsequently  monitor the attacker’s hacking methods. 

The object of the plan is to encourage a foreign (most likely Russian) hacker to start an attack into the NATO network and engage with a government worker, probably using a phishing email, to get the hacker network access. 

What the hacker does not realise is that they are now being monitored. NATO is using these honeypots techniques in a training activity with Estonia’s NATO Cyber Security Training Center, and the trial has involved over 1,000 participants.

Previous exercises were done to mimic real-world challenges and included Russian hybrid warfare techniques. Alberto Domingo,Technical Director of NATO's ACT Cyberspace Command, said that the honeypots are 'sacrificial machines' and their use is to allow  hackers to breach the honeypots easily, so that NATO can subsequently monitor the hacker’s techniques, giving NATO detailed information about their operations and procedures.

The objective is to collect intelligence on the adversary without their being aware of it. “It’s answering the questions of who is the adversary? What type of adversary are we talking about? What do they want and what are they going to do next?” said Domingo. 

With this plan the hackers will try to infiltrate NATO’s sensitive data by penetrating a NATO officials’ sensitive data with the aim to gain access to the whole NATO network.  This would potentially allow them to breach the systems and the sensitive information they are interested in. 

NATO will use the fake engage methods so that hackers believes their data hacking was a success. But, the attackers will probably later realise that the information they hacked is fake, yet what they won’t understand is that NATO can now gather the information to expose the cyber criminals’ techniques or tools. 

By letting this information out into the public domain, NATO probably believes that it will begin to reduce the number of cyber attacks. 

NATO ccdcoe:      NATO:       Tech Visibilty:      DefenseOne

You Might Also Read:

Estonia’s Crucial Role In Tackling Growing Cyber Threats:

 

« A Christmas Warning For Online Shoppers
In The Age of Risk, Cyber Security Is The Leading Concern »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Bulb Security

Bulb Security

Whether your internal red team or penetration testing team needs training, or you lack internal resources and need an outsourced penetration test, Bulb Security can help.

HID Global

HID Global

HID Global is a trusted leader in products, services and solutions related to the creation, management, and use of secure identities.

The Open Group

The Open Group

The Open Group: Leading the development of open, vendor-neutral IT standards and certifications.

Steganos

Steganos

Steganos offers highly secure and easy to use software tools that protect and secure on and offline data.

Cryptika

Cryptika

Cryptika is a fully integrated IT security and managed services provider, specialized in Next-Generation Cyber Security Technologies.

SearchInform

SearchInform

SearchInform is a leading risk management product developer, protecting business and government institutions against data theft, harmful human behavior, compliance breaches and incomplete audit.

Ridge Global

Ridge Global

Ridge Global works with C-suite executives and corporate directors to build more resilient organizations through innovative preparedness, protection, response and education capabilities.

SecureLogix

SecureLogix

SecureLogix deliver a unified voice network security and call verification solution. Protect against call attacks & fraud.

Cyber Security for Europe (CyberSec4Europe)

Cyber Security for Europe (CyberSec4Europe)

CyberSec4Europe is designing, testing and demonstrating potential governance structures for a European Cybersecurity Competence Network.

OpenAVN (DefenseArk)

OpenAVN (DefenseArk)

Defending your life online, keeping your data safe and private. We detect digital threats magnitudes faster than the leading antivirus software.

Total Secure Technology

Total Secure Technology

Total Secure Technology provides trusted Managed IT Security and Managed IT Services for organizations looking to increase their cybersecurity defensive posture.

Virtual IT Group (VITG)

Virtual IT Group (VITG)

VITG is a cyber security-focused Managed Service Provider (MSP).

Redcoat AI

Redcoat AI

Redcoat AI provide a comprehensive security platform that continuously evolves with the threats and opportunities presented by AI.

Cypheria

Cypheria

Cypheria harness the expertise of elite military units and combine it with extensive digital combat experience to deliver unparalleled security solutions for organizations.

Iron EagleX

Iron EagleX

Iron EagleX deliver engineering solutions in cloud computing, big data, cyber, and machine learning technologies to US Government customers.

Hicomply

Hicomply

Hicomply simplifies compliance management with smart, user-friendly tools, helping you scale your processes and stay in control - no matter how complex.