SolarWind’s Data Breach – Update
Some of the information stolen from the various companies after the hack into Solarwinds is now up for sale.
What’s on the shelf:
- Microsoft Information (Partial Source Code) for $ 600k
- Cisco Information (source code for some products) for $ 500k
- SolarWinds information (source code of the entire product) for $ 200k.
- FireEye Information (Red Team Assault Tool) for $ 50k.
Oh, and there is a sale … a package of all the above information for a million dollars.
WIIFM (What’s in it for me)
Beware: the next wave of ransomware and malware will not be recognized by antivirus which means that if you install it, the hackers will have 6 to 9 months of data
WSID2P (What should I do to protect)
Be aware. They are coming for you, and they’ll use any trick in the book for it.
Get informed and Start to protect your company now.
( Source: http://solarleaks.net/)
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW,
And see where your Company is Exposed to Hackers
Recently Posted on AUMINT.io Blog
🐝 Free Open-Source Honeypots Exposing Real Attacks Right Now 🐝
Honeypots give CISOs a unique view into attacker behavior – and the best part? Several powerful solutions are completely free and open-source. Here’s a curated list to start deploying today:
1️⃣ Cowrie – SSH and Telnet honeypot that logs brute-force attacks and shell interaction.
🔗 https://github.com/cowrie/cowrie
2️⃣ Dionaea – Captures malware targeting vulnerable services and downloads.
🔗 https://github.com/DinoTools/dionaea
3️⃣ Glastopf – Web application honeypot for detecting and logging exploit attempts.
🔗 https://github.com/mushorg/glastopf
4️⃣ Honeyd – Create virtual hosts to emulate entire networks and trap attackers.
🔗 https://github.com/DataSoft/Honeyd
5️⃣ Snort + Honeywall – IDS combined with honeypot monitoring to detect network attacks.
🔗 https://www.snort.org/
6️⃣ Conpot – ICS/SCADA honeypot to expose attacks on critical infrastructure protocols.
🔗 https://github.com/mushorg/conpot
7️⃣ Thug – Low-interaction client honeypot for tracking web-based exploits.
🔗 https://github.com/bishopfox/thug
8️⃣ Modern Honey Network (MHN) – Centralized honeypot management framework for multiple sensors.
🔗 https://github.com/pwnlandia/mhn
9️⃣ T-Pot – All-in-one honeypot platform combining multiple honeypots with dashboards.
🔗 https://github.com/dtag-dev-sec/t-pot
⚡ Deploying these allows CISOs to observe live attacks, study tactics, and improve defenses before attackers hit production systems.
At AUMINT.io, we go beyond technology – simulating how attackers exploit the human layer to complement technical insights, ensuring your people are as prepared as your systems.
🔗 Curious how your employees would respond if targeted in real-world attack simulations? Book a free demo
#CISO #Honeypots #CyberSecurity #ThreatIntelligence #AUMINT