HONEYPOT SPOTTED
@Sh1n0g1
ABOUT ME
• @Sh1n0g1
• Security Researcher of Macnica Networks Corp.
• Malware Simulator Developer
Malware Simulators
• Backdoor Simulator
– ShinoBOT
– ShinoBOT.ps1
• APT Simulator
– ShinoBOT Suite
• Ransomware Simulator
– ShinoLocker
• ICS Malware Simulator
– ShinoICS (not published yet)
https://shinosec.com
QUESTION?
• How do the honeypots, malware
analysis systems, sandboxes look like
from the attacker's point of view?
BIG DATA ANALYTICS(hostname vs ip)
(n=5000)
Small Cluster
CLUSTER1
(n=5000)
CLUSTER2
(n=5000)
CLUSTER3
(n=5000)
"TO BE SPOTTED" does matter?
• Yes
• The attacker will create next malware which avoids
to be run on the honeypots/malware analytics
system/sandboxes
CONCLUSION
• Make your Honey pot "human-y" ≒ dirty
• Make your Honey pot "random"
• Use an IP address which does not related with you
– Cloud service should be good
THANK YOU
@Sh1n0g1
https://shinosec.com

Honeypot Spotted