Connect with us

Hi, what are you looking for?



Realistic Factory Honeypot Shows Threats Faced by Industrial Organizations

Trend Micro researchers have set up a factory honeypot and found that industrial organizations should be more concerned about attacks launched by profit-driven cybercriminals rather than the threat posed by sophisticated state-sponsored groups.

Trend Micro researchers have set up a factory honeypot and found that industrial organizations should be more concerned about attacks launched by profit-driven cybercriminals rather than the threat posed by sophisticated state-sponsored groups.

The honeypot mimicked a factory and was designed to be as realistic as possible. The industrial environment included ICS hardware, physical hosts, and hardened virtual machines. The ICS hardware included PLCs from Siemens, Allen-Bradley and Omron, and the virtual machines ran an HMI for controlling the factory, a robotics workstation that controlled a palletizer, and an engineering workstation used for programming PLCs. The physical machine served as a file server for the factory.

In an effort to make everything even more realistic, the researchers created a fake company that claimed to be a “small industrial prototyping boutique working for special customers.” They developed a website for it and set up some phone numbers that, when called, would play a recording that instructed the caller to leave a message.

In order to make the honeypot a more attractive target, the experts intentionally left some ports open, including for a couple of VNC services that could be accessed without a password, the PLCs, and Ethernet/IP.

Factory honeypot design

The honeypot went online in May 2019 and Trend Micro researchers monitored it for a period of seven months. The company told SecurityWeek that the honeypot was fully taken offline after the experiment was concluded.

Unsurprisingly, the honeypot was initially mostly targeted by scanners, which is why the researchers blocked requests coming from known scanning services, such as Shodan, ZoomEye and Shadowserver.

Once the honeypot was online and properly configured, Trend Micro saw a significant number of attempts to misuse the systems and their resources for fraudulent activities, such as cashing out airline miles for gift cards and buying smartphones by upgrading mobile subscriber accounts.

Advertisement. Scroll to continue reading.

Other hackers installed cryptocurrency miners, and there were also two instances of file-encrypting ransomware being installed. The ransomware attacks involved Crysis and Phobos malware, and some cybercriminals also attempted to deploy a fake piece of ransomware that only renamed files to make them appear as if they were encrypted, but without actually encrypting them.

Learn More About Threats to Industrial Systems at SecurityWeek’s 2020 ICS Cyber Security Conference

In terms of control system attacks, Trend Micro said the PLCs were mostly targeted by unknown scanners — scanning activity associated with tools and services other than the ones that were blacklisted. While the traffic did not appear malicious — the scanners mainly collected information about the exposed devices — the experts said they could not discount the possibility that the scans were part of reconnaissance activity conducted in preparation for later attacks.

In the case of the Allen-Bradley MicroLogix PLC hosted by the honeypot, the researchers observed a number of unknown commands. While they may seem harmless, the unknown commands could cause some older devices to crash, as demonstrated a few years ago by Cisco Talos researchers.

In some cases, the attacker closed applications running on the compromised device, shut down the device, or logged off the current user.

Some of the most interesting activities from an ICS perspective occurred in December. One threat actor started the factory, stopped the conveyor belt, stopped the factory, and then closed the application window. One day later, the same hacker started the palletizer and opened the log view for its optical system.

Trend Micro told SecurityWeek that in these cases the attacker was likely just curious to see what would happen.

“In most cases, the attacker would stop the process almost immediately when they saw it had started something,” explained Stephen Hilt, senior threat researcher at Trend Micro. “During one of the three attacks [from December], the attacker let the system run for hours and we finally stopped it by acting like the ‘company’ who had realized what was happening and reset all the values. Since then, we haven’t seen any further activity from this person.”

Hilt said none of the source IP addresses they analyzed could be linked to a known threat group.

“Too often, discussion of cyber threats to industrial control systems (ICS) has been confined to highly sophisticated, nation-state level attacks designed to sabotage key processes. While these do present a risk to Industry 4.0, our research proves that more commonplace threats are more likely,” Greg Young, vice president of cybersecurity for Trend Micro, commented on the research. “Owners of smaller factories and industrial plants should therefore not assume that criminals will leave them alone. A lack of basic protections can open the door to a relatively straightforward ransomware or cryptojacking attack that could have serious consequences for the bottom line.”

More details about the factory honeypot are available on Trend Micro’s website. 

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join security experts as they discuss ZTNA’s untapped potential to both reduce cyber risk and empower the business.


Join Microsoft and Finite State for a webinar that will introduce a new strategy for securing the software supply chain.


Expert Insights

Related Content


The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.


A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...


The overall effect of current global geopolitical conditions is that nation states have a greater incentive to target the ICS/OT of critical industries, while...

CISO Strategy

Cybersecurity-related risk is a top concern, so boards need to know they have the proper oversight in place. Even as first-timers, successful CISOs make...


No one combatting cybercrime knows everything, but everyone in the battle has some intelligence to contribute to the larger knowledge base.

Malware & Threats

Threat actors are increasingly abusing Microsoft OneNote documents to deliver malware in both targeted and spray-and-pray campaigns.

Malware & Threats

Unpatched and unprotected VMware ESXi servers worldwide have been targeted in a ransomware attack exploiting a vulnerability patched in 2021.


The recent ransomware attack targeting Rackspace was conducted by a cybercrime group named Play using a new exploitation method, the cloud company revealed this...