Honeypots come with a sting. The electronic traps offer data that appears to be legitimate but actually allow computers to block or analyze hackers.
Proceed with caution, however. Honeypots can be a dangerous game.
SPYSCAPE offers seven fast facts to bring you up to speed:
What are honeypots?
A honeypot is a deliberately vulnerable computer system used to trap or monitor hackers. It may resemble a website, hosted server or email address used to collect spam or malware. Even a WiFi hotspot can be transformed into a honeypot. It is an effective way to learn how hackers think and operate.
How are honeypots set up?
Usually, honeypots resemble common configurations online such as out-of-date Windows servers. They’re left open to entice hackers and monitor their activities. Once a hacker falls into the trap, an IT administrator can watch their steps, see how data is being breached and report the break-in to legal authorities.
What kind of dirty work can be watched?
Hackers may try various ways to gain access to the honeypot which, when analyzed, can prove useful in stopping future hacks on genuine systems. For example, a hacker may target a company’s billing data to steal customer credit card numbers. With a honeypot in place, the company can track the hacker and assess the snoop’s behavior to make the billing system more robust.
Who uses honeypots?
Anyone from individuals to companies like NorseCorp uses honeypots to track real-time hacking attempts. Hackers also use honeypots on other hackers, hoping adversaries will accidentally leak data that identifies them. Law enforcement uses honeypots to catch criminals. Government agencies and defense networks like NATO also use honeypots, creating a trap for hostile hackers and seducing them into revealing their tools, techniques - even their command structure.