Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Up to 25% of Internet-Exposed ICS Are Honeypots: Researchers

Posted on May 21, 2025May 21, 2025 By CWS

An evaluation carried out by researchers on the Norwegian College of Science and Know-how Gjøvik and the Delft College of Know-how within the Netherlands confirmed {that a} vital share of the economic management system (ICS) cases detected by  web scans are literally honeypots.

The researchers used the Censys search engine to determine internet-exposed ICS. They focused 17 extensively used industrial management protocols and found roughly 150,000 gadgets throughout 175 international locations.  

The researchers then utilized varied standards to find out what number of of these ICS cases have been actual and what number of have been probably or presumably honeypots, decoy programs designed to draw menace actors in an effort to acquire beneficial data on attacker ways, methods, and procedures (TTPs).

Whereas Censys was used to gather the info on internet-exposed programs, the researchers famous that their strategies could be utilized to any supply information, together with Shodan and unbiased scanning.

Their evaluation was carried out over a interval of 1 yr, between January 2024 and January 2025. In April 2024, they decided that roughly 15% of the ICS gadgets they have been seeing on-line seemed to be honeypots, and the proportion elevated to 25% in January 2025.

The researchers tried to detect honeypots based mostly on varied kinds of data, every enabling them to evaluate {that a} system is a honeypot with low, medium or excessive confidence. 

For example, honeypot software program usually has a particular signature, which enabled the researchers to categorise the programs operating this software program as honeypots with excessive confidence.

One other clue that may reveal a honeypot is community sort — actual ICS ought to be on an industrial community and it mustn’t have IPs related to a internet hosting supplier. This can be utilized to determine a honeypot with medium confidence.Commercial. Scroll to proceed studying.

Open ports may also present beneficial clues, as numerous open ports on a system is uncommon. The extra open ports, the upper the probabilities of a system being an ICS honeypot moderately than an actual industrial gadget.

“Our methodology and findings problem earlier ICS research which both partially thought-about or utterly ignored honeypots, resulting in an inflated variety of detected uncovered ICS gadgets,” the researchers stated. “It improves the detection accuracy of weak ICS gadgets and makes researchers conscious of present pitfalls in detection strategies.”

Contacted by SecurityWeek, Censys Principal Safety Researcher Emily Austin famous, “It may be difficult to find out the precise share of ICS honeypots on-line at a given time. These researchers used strategies just like these we use at Censys to determine misleading companies.”

“Nonetheless, there are some variations in methodology–together with utilizing community classification as an indicator–which will clarify why their reported ICS honeypot numbers are larger than what we usually observe. However general, the strategy to honeypot detection outlined on this paper appears very cheap and defensible,” Austin stated.

“Their observations round variations in honeypot prevalence by protocol are additionally just like patterns we’ve noticed previously. Some ICS-related companies are less complicated to run than others or have open supply honeypots obtainable (e.g., ATG), which probably contributes to those variations,” she added.

The paper additionally mentions Shodan Honeyscore, a service designed for detecting honeypots. The researchers determined in opposition to utilizing it because of errors and seemingly inaccurate outcomes. Nonetheless, Shodan’s John Matherly advised SecurityWeek that Honeyscore hasn’t been an lively service for years — it has been expanded and rolled into the crawlers themselves. 

Matherly famous that Shodan now robotically filters out ICS honeypots in order that they don’t present up in searches. “Normally, honeypots have seen elevated deployment over time which I might count on to additionally apply to ICS,” Matherly famous. 

Shodan at present reveals simply over 100,000 internet-exposed ICS cases, with a slight downward development recorded over the previous few years. 

Associated: PLCHound Goals to Enhance Detection of Web-Uncovered ICS

Associated: Iranian Hackers Use IOCONTROL Malware to Goal OT, IoT Units in US, Israel

Associated: US Warns of Hackers Focusing on ICS/SCADA at Oil and Gasoline Organizations

Security Week News Tags:Honeypots, ICS, InternetExposed, Researchers

Post navigation

Previous Post: Researchers Expose PWA JavaScript Attack That Redirects Users to Adult Scam Apps
Next Post: Virtual Event Today: Threat Detection & Incident Response (TDIR) Summit

Related Posts

Radware Says Recently Disclosed WAF Bypasses Were Patched in 2023 Security Week News
Spyware Maker NSO Ordered to Pay $167 Million Over WhatsApp Hack Security Week News
O2 Service Vulnerability Exposed User Location Security Week News
Rising Tides: Kelley Misata on Bringing Cybersecurity to Nonprofits Security Week News
US Student to Plead Guilty Over PowerSchool Hack Security Week News
Adobe Patches Big Batch of Critical-Severity Software Flaws Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Secure Your Home Wi-Fi Network
  • How to Secure External Storage Devices (USB, HDD)
  • CISA Says Russian Hackers Targeting Western Supply-Lines to Ukraine
  • Microsoft Sinkholes Domains, Disrupts Notorious ‘Lumma Stealer’ Malware Operation
  • Russian Hackers Exploit Email and VPN Vulnerabilities to Spy on Ukraine Aid Logistics

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2025

Recent Posts

  • How to Secure Your Home Wi-Fi Network
  • How to Secure External Storage Devices (USB, HDD)
  • CISA Says Russian Hackers Targeting Western Supply-Lines to Ukraine
  • Microsoft Sinkholes Domains, Disrupts Notorious ‘Lumma Stealer’ Malware Operation
  • Russian Hackers Exploit Email and VPN Vulnerabilities to Spy on Ukraine Aid Logistics

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News