June 28, 2016
Joe Franscella

What is ShockPot and How Can It Keep You Safe?

<p>Early detection of suspicious activity is preventative rather than reactive. Using a honeypot can keep your data and the people who would be affected by a security event safe. <a href="https://www.anomali.com/blog/shockpot">ShockPot</a> collects information that can be used in advance of a devastating ShellShock attack.</p><p>Many servers are run on Mac or Linux, which use a program called Bash. Bashbugs were introduced in <a href="https://www.wired.com/2014/09/hackers-already-using-shellshock-bug-create-botnets-ddos-attacks/" target="_blank">less than 24 hours</a> after a vulnerability was announced. ShellShock is one of these viruses which exploit a vulnerability in one of the operating computer’s ports and then enters unauthorized commands. This program, which is used to enter commands was discovered in September 2014 to create a port through which hackers can attack. Namely, the computer is made to spread the virus to other networks by creating viral botnets. These commands can be deployed individually by the hacker, making ShellShock more akin to a back door than a wild-running virus. Having more control over the proliferation allows attackers to be stealthier than they were with earlier Trojans.</p><p>Once built, botnets can be commanded to drive traffic to a specific network. A deluge of traffic which can cripple a network is known as a distributed denial of service attack. The target of the DDoS is the primary victim, with the others infected with Bashbugs being used as a means to an end. Early reports of this development in malware had come from intelligence gathered via honeypots.</p><p>Using a decoy environment, honeypots are security tools which can log traffic sources for investigation and they divert hacking behavior away from actual assets. ShockPot is different from static malware detection programs. Rather than scan for one particular profile independently, it <a href="http://www.pcworld.com/article/2366280/tool-aims-to-help-enterprise-it-manage-honeypot-hacker-decoys.html" target="_blank">works with the Modern Honey Network</a>.</p><p>Information gathered by honeypots is remitted to the MHN, which keeps a list of IP addresses associated with suspicious activity as well as other indicators of compromise (IoC).</p><p><strong>Types of warning signs detected:</strong></p><ul><li>Virus signatures</li><li>Outgoing traffic to infected web domains</li><li>Incoming traffic from known bad domains</li><li>New and unusual files or processes</li><li>Activity on decoy or dormant staff logins</li><li>Unauthorized access of or changes to security settings</li><li>Suspicious password resets or unexplained login failures</li><li>Correspondence to an unused email address</li><li>Malware or virus activity</li></ul><p>Built on open-source platforms, <a href="http://www.infoworld.com/article/2624664/intrusion-detection/intrusion-detection-on-the-cheap--roll-your-own-honeypot.html" target="_blank">honeypots are the most affordable</a> means of collecting threat intelligence data. When examined individually these signs are dismissible, but when examined as part of a bigger picture, patterns and trends emerge. All of the data reported from every honeypot on the MHN creates small pieces of a bigger picture which illuminate threats on the horizon.</p><p>Respond by leveraging the intelligence from your threat reports. Once properly configured, ShockPot will be able to distinguish firewall activity, antimalware, and other routine legit internal traffic as “noise” which should be excluded from incident reports. Since a honeypot doesn’t have any legitimate traffic, information from all remaining activity should be explored as a possible breach attempt.</p><p>The result of hosting and maintaining a honeypot like ShockPot is a reassurance. Knowing what is lurking in the dark will help you to sleep at night.</p><p><strong>Download the Security Intelligence and Information Sharing Strategy whitepaper and learn more about the new approach to threat intelligence using trusted collaboration.</strong></p><p><strong> <span class="hs-cta-wrapper" id="hs-cta-wrapper-79cc3352-61a2-44b7-8b7c-6f25d759918c"> <span class="hs-cta-node hs-cta-79cc3352-61a2-44b7-8b7c-6f25d759918c" data-hs-drop="true" id="hs-cta-79cc3352-61a2-44b7-8b7c-6f25d759918c" style="visibility: visible; display: block; text-align: center;"><a class="cta_button" cta_dest_link="{page_3458}" href="https://cta-service-cms2.hubspot.com/ctas/v2/public/cs/c/?cta_guid=4f082f1c-a704-4df4-a627-a030c2f8e351&amp;placement_guid=79cc3352-61a2-44b7-8b7c-6f25d759918c&amp;portal_id=458120&amp;redirect_url=APefjpGp9SBKLZbSxkvgsHrJGQoxikNV5YppV7V-pIwDXpWKv2-CfwDuCaocvNkksI0in9QbM04P7TtrzyRDT7F1mwxCOogKUuEgLvqFmIR53X835cwSvqJHFwCnG5RDCWiTwKkvILcosnNXHRzU8QMbo2PoxDLb0oQHGXj8Jd1Q7Q5XyBaZxevQDoZd4mcGSOkSA95uWWORWYFdVN9kVvp1TEL4RJeT1VPocrYkOtAwlJJ7DFwZgqt1e-x33jHuFQwNoclfaJwirEkRIel5QMGeeVITxAtP20nakeXSqGLtBAE84zGbebDOJGKwQKFyHwAXUIug1cqCdGXk_6--LWmVP0J1QFMszQ&amp;hsutk=2767d93d6471d657e0c9f660e4b58ef8&amp;utm_referrer=https%3A%2F%2Fblog.anomali.com%2Fwhat-is-shockpot-and-how-can-it-keep-you-safe&amp;canon=https%3A%2F%2Fblog.anomali.com%2Fwhat-is-shockpot-and-how-can-it-keep-you-safe&amp;pageId=4230427071&amp;__hstc=41179005.2767d93d6471d657e0c9f660e4b58ef8.1456736058655.1478822660171.1478831861868.179&amp;__hssc=41179005.100.1478831861868&amp;__hsfp=1335165674" id="cta_button_458120_4f082f1c-a704-4df4-a627-a030c2f8e351" style="margin: 20px auto;" target="_blank" title="Download Here"> Download Here </a> </span> <script charset="utf-8" src="https://js.hscta.net/cta/current.js"></script> <script type="text/javascript">hbspt.cta.load(458120, '79cc3352-61a2-44b7-8b7c-6f25d759918c', {});</script> </span> </strong></p>

Get the Latest Anomali Updates and Cybersecurity News – Straight To Your Inbox

Become a subscriber to the Anomali Newsletter
Receive a monthly summary of our latest threat intelligence content, research, news, events, and more.