Two security researchers observed that a hacker took control of a computer and started running a malicious campaign. The researchers used a vast network of computers created as a honeypot to trick the threat actors. Researchers deploy exposed Windows servers to trick hackers The researchers behind this campaign used several Windows servers exposed to the … Continue reading Researchers Observe A Hacker Spend 100 Hours Compromising Honeypot Computers
The post Researchers Observe A Hacker Spend 100 Hours Compromising Honeypot Computers appeared first on KoDDoS Blog.
Ali Raza
Source: koddos
Source Link: https://blog.koddos.net/researchers-observe-a-hacker-spend-100-hours-compromising-honeypot-computers/