Persons

Ing. Veronica Valeros

All publications

Hornet 40: Network Dataset of Geographically Placed Honeypots

  • DOI: 10.1016/j.dib.2022.107795
  • Link: https://doi.org/10.1016/j.dib.2022.107795
  • Department: Artificial Intelligence Center
  • Annotation:
    Deception technologies, and honeypots in particular, have been used for decades to understand how cyber attacks and attackers work. A myriad of factors impact the effectiveness of a honeypot. However, very few is known about the impact of the geographical location of honeypots on the amount and type of attacks. Hornet 40 is the first dataset designed to help understand how the geolocation of honeypots may impact the inflow of network attacks. The data consists of network flows in binary and text format, with up to 118 features, including 480 bytes of the content of each flow. They were created using the Argus flow collector. The passive honeypots are IP addresses connected to the Internet and do not have any honeypot software running, so attacks are not interactive. The data was collected from identically configured honeypot servers in eight locations: Amsterdam, Bangalore, Frankfurt, London, New York, San Francisco, Singapore, and Toronto. The dataset contains over 4.7 million network flows collected during forty days throughout April, May, and June 2021.

Growth and Commoditization of Remote Access Trojans

  • DOI: 10.1109/EuroSPW51379.2020.00067
  • Link: https://doi.org/10.1109/EuroSPW51379.2020.00067
  • Department: Artificial Intelligence Center
  • Annotation:
    In the last three decades there have been significant changes in the cybercrime world in terms of organization, type of attacks, and tools. Remote Access Trojans (RAT) are an intrinsic part of traditional cybercriminal activities but they have become a standard tool in advanced espionage and scams attacks. The overly specialized research in our community on Remote Access Trojans has resulted in a seemingly lack of general perspective and understanding on how RATs have evolved as a phenomenon. This work presents a new generalist perspective on Remote Access Trojans, an analysis of their growth in the last 30 years, and a discussion on how they have become a commodity in the last decade. We found that the amount of RATs increased drastically in the last ten years and that nowadays they have become standardized commodity products that are no very different from each other.

Machete: Dissecting the Operations of a Cyber Espionage Group in Latin America

  • DOI: 10.1109/EuroSPW.2019.00058
  • Link: https://doi.org/10.1109/EuroSPW.2019.00058
  • Department: Department of Computer Science, Artificial Intelligence Center
  • Annotation:
    Reports on cyber espionage operations have been on the rise in the last decade. However, operations in Latin America are heavily under researched and potentially underestimated. In this paper we analyze and dissect a cyber espionage tool known as Machete. Our research shows that Machete is operated by a highly coordinated and organized group who focuses on Latin American targets. We describe the five phases of the APT operations from delivery to exfiltration of information and we show why Machete is considered a cyber espionage tool. Furthermore, our analysis indicates that the targeted victims belong to military, political, or diplomatic sectors. The review of almost six years of Machete operations show that it is likely operated by a single group, and their activities are possibly state-sponsored. Machete is still active and operational to this day.

Responsible person Ing. Mgr. Radovan Suk