gosecure.ai Open in urlscan Pro
141.193.213.11  Public Scan

Submitted URL: https://security.gosecure.net/NDgzLURKVC00NjgAAAGS89S196JN7efBvXNdmPr37c9YVDaQNeTrVlGLgMYlxBBIs3Ah7PFovLpYoKVy8UGpm-pljKU=
Effective URL: https://gosecure.ai/blog/2024/02/07/beyond-the-script-attackers-sleep-schedule-and-strategies-behind-automated-attac...
Submission: On May 08 via api from CA — Scanned from CA

Form analysis 4 forms found in the DOM

GET https://gosecure.ai/

<form role="search" method="get" class="et_pb_menu__search-form" action="https://gosecure.ai/">
  <input type="search" class="et_pb_menu__search-input" placeholder="Search …" name="s" title="Search for:">
</form>

GET https://gosecure.ai/

<form role="search" method="get" id="searchform" class="searchform" action="https://gosecure.ai/">
  <div>
    <label class="screen-reader-text" for="s">Search for:</label>
    <input type="text" value="" name="s" id="s">
    <input type="submit" id="searchsubmit" value="Search">
  </div>
</form>

GET https://gosecure.ai

<form action="https://gosecure.ai" method="get"><label class="screen-reader-text" for="cat">Categories</label><select name="cat" id="cat" class="postform">
    <option value="-1">Select Category</option>
    <option class="level-0" value="54">.Net</option>
    <option class="level-0" value="90">AAP</option>
    <option class="level-0" value="107">Active Directory</option>
    <option class="level-0" value="328">Advisory Services</option>
    <option class="level-0" value="13">Alt Sec Con</option>
    <option class="level-0" value="100">Android</option>
    <option class="level-0" value="72">AppSec</option>
    <option class="level-0" value="441">Artificial Intelligence</option>
    <option class="level-0" value="15">ASP.net</option>
    <option class="level-0" value="327">Assessment</option>
    <option class="level-0" value="34">Auditor</option>
    <option class="level-0" value="42">Automation</option>
    <option class="level-0" value="33">Backdoor</option>
    <option class="level-0" value="297">Bazarloader</option>
    <option class="level-0" value="110">Binary Analysis</option>
    <option class="level-0" value="98">Bitcoin</option>
    <option class="level-0" value="55">BlackHat</option>
    <option class="level-0" value="350">BluStealer</option>
    <option class="level-0" value="47">Botnet</option>
    <option class="level-0" value="330">Breach Readiness</option>
    <option class="level-0" value="301">Brute Force</option>
    <option class="level-0" value="35">Burp</option>
    <option class="level-0" value="49">C#</option>
    <option class="level-0" value="61">Checkpoint</option>
    <option class="level-0" value="58">Christmas</option>
    <option class="level-0" value="384">Chrome</option>
    <option class="level-0" value="383">CI/CD</option>
    <option class="level-0" value="60">Cisco</option>
    <option class="level-0" value="94">Code Review</option>
    <option class="level-0" value="258">Compliance</option>
    <option class="level-0" value="11">Conference</option>
    <option class="level-0" value="16">Confoo</option>
    <option class="level-0" value="259">COVID-19</option>
    <option class="level-0" value="372">Credential Stuffing</option>
    <option class="level-0" value="48">Criminal Market</option>
    <option class="level-0" value="431">Criminology</option>
    <option class="level-0" value="21">Cryptography</option>
    <option class="level-0" value="36">CSP</option>
    <option class="level-0" value="99">Cybercrime</option>
    <option class="level-0" value="108">Cybersecurity</option>
    <option class="level-0" value="317">Cybersecurity Assessment</option>
    <option class="level-0" value="320">Cybersecurity Audits</option>
    <option class="level-0" value="319">Cybersecurity Risk</option>
    <option class="level-0" value="321">Cybersecurity Roadmaps</option>
    <option class="level-0" value="101">Cybersecurity Statistics</option>
    <option class="level-0" value="318">Cybersecurity Strategy</option>
    <option class="level-0" value="92">Darknet</option>
    <option class="level-0" value="66">Deserialization</option>
    <option class="level-0" value="65">Detection</option>
    <option class="level-0" value="85">Development</option>
    <option class="level-0" value="43">Devops</option>
    <option class="level-0" value="64">DNS</option>
    <option class="level-0" value="111">Dynamic Analysis</option>
    <option class="level-0" value="88">EDR</option>
    <option class="level-0" value="119">Email</option>
    <option class="level-0" value="366">Email Security</option>
    <option class="level-0" value="382">Engineering</option>
    <option class="level-0" value="30">Enterprise</option>
    <option class="level-0" value="91">ESI</option>
    <option class="level-0" value="109">ESI Tags</option>
    <option class="level-0" value="374">Ethical Hacking</option>
    <option class="level-0" value="403">Events</option>
    <option class="level-0" value="68">Exploit</option>
    <option class="level-0" value="22">Exploitation</option>
    <option class="level-0" value="116">Find-Sec-Bugs</option>
    <option class="level-0" value="62">Firewall</option>
    <option class="level-0" value="81">Fraud</option>
    <option class="level-0" value="112">Fuzzing</option>
    <option class="level-0" value="381">GoSecure Titan</option>
    <option class="level-0" value="418">Hackers</option>
    <option class="level-0" value="352">Hacktoberfest</option>
    <option class="level-0" value="39">Header</option>
    <option class="level-0" value="103">Honeypot</option>
    <option class="level-0" value="40">HTTP</option>
    <option class="level-0" value="348">IDR</option>
    <option class="level-0" value="386">Incident Response</option>
    <option class="level-0" value="76">Industry</option>
    <option class="level-0" value="10">IoT</option>
    <option class="level-0" value="45">Java</option>
    <option class="level-0" value="69">Jboss</option>
    <option class="level-0" value="70">Jenkins</option>
    <option class="level-0" value="302">Jetpack</option>
    <option class="level-0" value="87">Kotlin</option>
    <option class="level-0" value="23">Lansweeper</option>
    <option class="level-0" value="93">Leaks</option>
    <option class="level-0" value="311">LinkedIn</option>
    <option class="level-0" value="12">Linux</option>
    <option class="level-0" value="368">Log4j</option>
    <option class="level-0" value="369">Log4Shell</option>
    <option class="level-0" value="63">Malboxes</option>
    <option class="level-0" value="9">Malware</option>
    <option class="level-0" value="298">Malware Research</option>
    <option class="level-0" value="105">Man-In-The-Middle</option>
    <option class="level-0" value="80">Manipulation</option>
    <option class="level-0" value="349">MDR</option>
    <option class="level-0" value="77">Media</option>
    <option class="level-0" value="387">MFA</option>
    <option class="level-0" value="57">Moose</option>
    <option class="level-0" value="53">MSBuild</option>
    <option class="level-0" value="89">MSSP</option>
    <option class="level-0" value="14">NorthSec</option>
    <option class="level-0" value="106">NTLM</option>
    <option class="level-0" value="26">Opcache</option>
    <option class="level-0" value="117">Open-Source</option>
    <option class="level-0" value="78">Opinion</option>
    <option class="level-0" value="31">Oracle</option>
    <option class="level-0" value="315">OSINT</option>
    <option class="level-0" value="118">OWASP</option>
    <option class="level-0" value="24">Password</option>
    <option class="level-0" value="260">PCI DSS</option>
    <option class="level-0" value="113">PDF</option>
    <option class="level-0" value="362">Penetration Testing</option>
    <option class="level-0" value="83">Pentest</option>
    <option class="level-0" value="32">PeopleSoft</option>
    <option class="level-0" value="120">Phishing</option>
    <option class="level-0" value="27">PHP</option>
    <option class="level-0" value="28">PHP7</option>
    <option class="level-0" value="41">Plugin</option>
    <option class="level-0" value="264">Privacy</option>
    <option class="level-0" value="84">Privilege-Escalation</option>
    <option class="level-0" value="73">Process</option>
    <option class="level-0" value="86">Proxy</option>
    <option class="level-0" value="375">Purple Team</option>
    <option class="level-0" value="115">PYRDP</option>
    <option class="level-0" value="75">Ransomware</option>
    <option class="level-0" value="95">RCE</option>
    <option class="level-0" value="104">RDP</option>
    <option class="level-0" value="17">RequestValidation</option>
    <option class="level-0" value="46">Research</option>
    <option class="level-0" value="50">Roslyn</option>
    <option class="level-0" value="74">SDLC</option>
    <option class="level-0" value="51">Security</option>
    <option class="level-0" value="436">Security Advisory</option>
    <option class="level-0" value="331">Security Framework</option>
    <option class="level-0" value="329">Security Maturity</option>
    <option class="level-0" value="287">Security Measures</option>
    <option class="level-0" value="121">Sextortion</option>
    <option class="level-0" value="79">Social Media</option>
    <option class="level-0" value="96">SPEL</option>
    <option class="level-0" value="97">Spring</option>
    <option class="level-0" value="353">SQL</option>
    <option class="level-0" value="44">Static Analysis</option>
    <option class="level-0" value="102">Statistics Canada</option>
    <option class="level-0" value="29">Threat</option>
    <option class="level-0" value="114">Threat-Intelligence</option>
    <option class="level-0" value="340">Titan Labs</option>
    <option class="level-0" value="37">Tool</option>
    <option class="level-0" value="1">Uncategorized</option>
    <option class="level-0" value="56">Video</option>
    <option class="level-0" value="52">Visual Studio</option>
    <option class="level-0" value="59">VoIP</option>
    <option class="level-0" value="71">Vulnerability</option>
    <option class="level-0" value="354">WAF</option>
    <option class="level-0" value="25">Web</option>
    <option class="level-0" value="67">Weblogic</option>
    <option class="level-0" value="82">Windows</option>
    <option class="level-0" value="303">Wordpress</option>
    <option class="level-0" value="361">WSUS</option>
    <option class="level-0" value="18">XSS</option>
    <option class="level-0" value="38">Zap</option>
  </select>
</form>

POST /blog/2024/02/07/beyond-the-script-attackers-sleep-schedule-and-strategies-behind-automated-attacks/?mkt_tok=NDgzLURKVC00NjgAAAGS89S19-PWOOh0X9j_B334VXCiXj2cjMxFlld2Q3y2qRBIgx5SDVdpiXroJfKq1tFZXrlUGoGl10gZnJahqtTat7S4KMjGnEPsygON5GZEgPJG

<form method="post" enctype="multipart/form-data" id="gform_13"
  action="/blog/2024/02/07/beyond-the-script-attackers-sleep-schedule-and-strategies-behind-automated-attacks/?mkt_tok=NDgzLURKVC00NjgAAAGS89S19-PWOOh0X9j_B334VXCiXj2cjMxFlld2Q3y2qRBIgx5SDVdpiXroJfKq1tFZXrlUGoGl10gZnJahqtTat7S4KMjGnEPsygON5GZEgPJG"
  data-formid="13" novalidate="">
  <div class="gform-body gform_body">
    <div id="gform_fields_13" class="gform_fields top_label form_sublabel_above description_below">
      <div id="field_13_1" class="gfield gfield--type-email gfield--input-type-email field_sublabel_above gfield--no-description field_description_below hidden_label gfield_visibility_visible" data-js-reload="field_13_1"><label
          class="gfield_label gform-field-label" for="input_13_1">Email</label>
        <div class="ginput_container ginput_container_email">
          <input name="input_1" id="input_13_1" type="email" value="" class="medium" aria-invalid="false">
        </div>
      </div>
      <fieldset id="field_13_2" class="gfield gfield--type-consent gfield--type-choice gfield--input-type-consent gfield_contains_required field_sublabel_above gfield--no-description field_description_below gfield_visibility_visible"
        data-js-reload="field_13_2">
        <legend class="gfield_label gform-field-label gfield_label_before_complex">Consent<span class="gfield_required"><span class="gfield_required gfield_required_text">(Required)</span></span></legend>
        <div class="ginput_container ginput_container_consent"><input name="input_2.1" id="input_13_2_1" type="checkbox" value="1" aria-required="true" aria-invalid="false"> <label
            class="gform-field-label gform-field-label--type-inline gfield_consent_label" for="input_13_2_1">I consent to receive communications from GoSecure and I agree to the Privacy Notice.</label><input type="hidden" name="input_2.2"
            value="I consent to receive communications from GoSecure and I agree to the Privacy Notice." class="gform_hidden"><input type="hidden" name="input_2.3" value="8" class="gform_hidden"></div>
      </fieldset>
      <div id="field_13_3" class="gfield gfield--type-honeypot gform_validation_container field_sublabel_above gfield--has-description field_description_below gfield_visibility_visible" data-js-reload="field_13_3"><label
          class="gfield_label gform-field-label" for="input_13_3">Comments</label>
        <div class="ginput_container"><input name="input_3" id="input_13_3" type="text" value="" autocomplete="new-password"></div>
        <div class="gfield_description" id="gfield_description_13_3">This field is for validation purposes and should be left unchanged.</div>
      </div>
    </div>
  </div>
  <div class="gform_footer top_label"> <input type="submit" id="gform_submit_button_13" class="gform_button button" value="SUBMIT"
      onclick="if(window[&quot;gf_submitting_13&quot;]){return false;}  if( !jQuery(&quot;#gform_13&quot;)[0].checkValidity || jQuery(&quot;#gform_13&quot;)[0].checkValidity()){window[&quot;gf_submitting_13&quot;]=true;}  "
      onkeypress="if( event.keyCode == 13 ){ if(window[&quot;gf_submitting_13&quot;]){return false;} if( !jQuery(&quot;#gform_13&quot;)[0].checkValidity || jQuery(&quot;#gform_13&quot;)[0].checkValidity()){window[&quot;gf_submitting_13&quot;]=true;}  jQuery(&quot;#gform_13&quot;).trigger(&quot;submit&quot;,[true]); }">
    <input type="hidden" class="gform_hidden" name="is_submit_13" value="1">
    <input type="hidden" class="gform_hidden" name="gform_submit" value="13">
    <input type="hidden" class="gform_hidden" name="gform_unique_id" value="">
    <input type="hidden" class="gform_hidden" name="state_13"
      value="WyJ7XCIyLjFcIjpcIjFjM2E0ZmQzN2YxZjMwZGNiZDg4YzI1MDlmYWQzM2Q4XCIsXCIyLjJcIjpcIjgyYjMxODQ1ZmFhNmMxNTE3NzUxYmFiODM5NTYyYmRmXCIsXCIyLjNcIjpcImU3NDk5MDllZjlmMDE2MGNmNmVlNTZkZjQ5NDcwNWZjXCJ9IiwiZWQ3ZTI0M2FiMTFjMmNjZGQ3NGFkZTdlODc3ZWIzOGIiXQ==">
    <input type="hidden" class="gform_hidden" name="gform_target_page_number_13" id="gform_target_page_number_13" value="0">
    <input type="hidden" class="gform_hidden" name="gform_source_page_number_13" id="gform_source_page_number_13" value="1">
    <input type="hidden" name="gform_field_values" value="">
  </div>
</form>

Text Content

We value your privacy

This website and its third-party tools may process personal data. We do not sell
your personal information. We may share information with our partners, but you
have the option to opt out if you wish. To exercise this option, please click on
the 'Do Not Share My Personal Information' link.

 

Do Not Share My Personal Information
Opt-out Preferences

We use third-party cookies that help us analyze how you use this website, store
your preferences, and provide the content and advertisements that are relevant
to you. However, you can opt out of these cookies by checking "Do Not Share My
Personal Information" and clicking the "Save My Preferences" button. Once you
opt out, you can opt in again at any time by unchecking "Do Not Share My
Personal Information" and clicking the "Save My Preferences" button.

Do Not Share My Personal Information
Cancel Save My Preferences

GoSecure Titan® Managed Extended Detection & Response (MXDR)



GoSecure Titan® Managed Extended Detection & Response (MXDR) Foundation

GoSecure Titan® Vulnerability Management as a Service (VMaaS)

GoSecure Titan® Managed Security Information & Event Monitoring (SIEM)

GoSecure Titan® Managed Perimeter Defense (MPD)

GoSecure Titan® Inbox Detection and Response (IDR)

GoSecure Titan® Secure Email Gateway (SEG)

GoSecure Titan® Threat Modeler

GoSecure Titan® Identity

GoSecure Titan® Platform




GoSecure Professional Security Services



Incident Response Services

Security Maturity Assessment

Privacy Services

PCI DSS Services

Penetration Testing Services

Security Operations

GoSecure MXDR for Microsoft

Comprehensive visibility and response within your Microsoft security environment

LEARN MORE
×
GET A QUOTE

USE CASES



CYBER RISKS

Risk-Based Security Measures

SENSITIVE DATA SECURITY

Safeguard sensitive information

PRIVATE EQUITY FIRMS

Make informed decisions

CYBERSECURITY COMPLIANCE

Fulfill regulatory obligations

CYBER INSURANCE

A valuable risk management strategy

RANSOMWARE

Combat ransomware with innovative security

ZERO-DAY ATTACKS

Halt zero-day exploits with advanced protection

CONSOLIDATE, EVOLVE & THRIVE

Get ahead and win the race with the GoSecure Titan® Platform

24/7 MXDR FOUNDATION



GoSecure Titan® Endpoint Detection and Response (EDR)

GoSecure Titan® Next Generation Antivirus (NGAV)

GoSecure Titan® Network Detection and Response (NDR)

GoSecure Titan® Inbox Detection and Reponse (IDR)

GoSecure Titan® Intelligence


×

ABOUT GOSECURE



GoSecure is a recognized cybersecurity leader and innovator, pioneering the
integration of endpoint, network, and email threat detection into a single
Managed Extended Detection and Response (MXDR) service. For over 20 years,
GoSecure has been helping customers better understand their security gaps and
improve their organizational risk and security maturity through MXDR and
Professional Services solutions delivered by one of the most trusted and skilled
teams in the industry.

About Us

Leadership

Board of Directors

Careers

EVENT CALENDAR


May 9 CISO Meet
May 12 NorthSec
May 21 ITSec
Jun 5 CPX VIP Dinner
View Calendar
GoSec

LATEST PRESS RELEASE




GOSECURE APPOINTS ERIC ROCHETTE TO CHIEF TECHNOLOGY OFFICER (CTO)

GoSecure, a leading provider of managed detection and response solutions along
with expert professional services, proudly announces the promotion...

read more
GOSECURE NEWSROOM
REQUEST A MEDIA KIT

×

GOSECURE BLOG




MAXIMIZING EMPLOYEE PROTECTION BY RETHINKING EXPECTATIONS OF PHISHING AWARENESS
AND EMAIL SECURITY

Apr 26, 2024

Blaming users for falling victim to phishing...


HACK TO THE FUTURE: THE ATTACK SURFACE OF GPS SIGNALS

Mar 11, 2024

In an era where our critical infrastructures...


PHISHING MAY HAVE JUST BECOME A LOT HARDER TO DETECT…

Feb 20, 2024

We are on the upward trajectory of AI. AI can be...

READ MORE

RESOURCES



Case Studies

Datasheets & Brochures

eBooks

Whitepapers & Reports

Webinars & Podcasts

Videos & Infographics

Technical & User Guides

SEE LIBRARY

SECURITY ADVISORIES




COMBATING ADVANCED CYBER THREATS: GOSECURE’S PROACTIVE DEFENSE AGAINST THE
IVANTI CONNECT SECURE VPN BREACH

Ivanti Connect Secure VPN faced a significant security breach involving two
critical...

read more


ENHANCING CYBER RISK DIALOGUE: LESSONS FROM SEC’S RECENT ACTION

As a reaction to a number of major corporate and accounting scandals (namely
Enron and WorldCom),...

read more
SEE ALL ADVISORIES

×


GET A DEMO

k

BUILD A QUOTE



BECOME A PARTNER

×

24/7 Emergency – (888)-287-5858 SupportContact UsBlog

 * Français



 * What We Do
   * GoSecure Titan® Managed Extended Detection & Response (MXDR)
     * GoSecure Titan® Managed Extended Detection & Response (MXDR) Foundation
     * GoSecure Titan® Vulnerability Management as a Service (VMaaS)
     * GoSecure Titan® Managed Security Information and Event Monitoring (SIEM)
     * GoSecure Titan® Managed Perimeter Defense (MPD)
     * GoSecure Titan® Inbox Detection & Response (IDR)
     * GoSecure Titan® Secure Email Gateway (SEG)
     * GoSecure Titan® Threat Modeler
     * GoSecure Titan® Identity
   * GoSecure Titan® Platform
   * GoSecure Professional Security Services
     * GoSecure Incident Response Services (IRS)
     * GoSecure Security Maturity Assessment
     * GoSecure Privacy Services
     * GoSecure PCI DSS Services
     * GoSecure Penetration Testing Services
     * GoSecure Security Operations
   * MXDR For Microsoft
 * Why GoSecure
   * MXDR Investment
   * Use Cases
     * Cyber Risk
     * Cybersecurity Compliance
     * Ransomware
     * Zero-Day Attacks
     * Sensitive Data Security
     * Cyber Insurance
     * Consolidate, Evolve & Thrive
   * 24/7 MXDR
     * GoSecure Titan® Endpoint Detection and Response (EDR)
     * GoSecure Titan® Next Generation Antivirus (NGAV)
     * GoSecure Titan® Network Detection and Response (NDR)
     * GoSecure Titan® Inbox Detection and Response (IDR)
     * GoSecure Titan® Intelligence
 * Company
   * About GoSecure
     * Leadership
     * Board of Directors
     * Careers
   * Events
     * Event Calendar
     * GoSec
   * Newsroom
     * Request A Media Kit
 * Resources
   * GoSecure Blog
   * Resources
     * White Papers & Reports
     * eBooks
     * Case Studies
     * Datasheets & Brochures
     * Webinars & Podcasts
     * Videos & Infographics
     * Technical Guides
     * See Library
   * Security Advisories
 * Partners
 * Get Secure

 * What We Do
   * GoSecure Titan® Managed Extended Detection & Response (MXDR)
     * GoSecure Titan® Managed Extended Detection & Response (MXDR) Foundation
     * GoSecure Titan® Vulnerability Management as a Service (VMaaS)
     * GoSecure Titan® Managed Security Information and Event Monitoring (SIEM)
     * GoSecure Titan® Managed Perimeter Defense (MPD)
     * GoSecure Titan® Inbox Detection & Response (IDR)
     * GoSecure Titan® Secure Email Gateway (SEG)
     * GoSecure Titan® Threat Modeler
     * GoSecure Titan® Identity
   * GoSecure Titan® Platform
   * GoSecure Professional Security Services
     * GoSecure Incident Response Services (IRS)
     * GoSecure Security Maturity Assessment
     * GoSecure Privacy Services
     * GoSecure PCI DSS Services
     * GoSecure Penetration Testing Services
     * GoSecure Security Operations
   * MXDR For Microsoft
 * Why GoSecure
   * MXDR Investment
   * Use Cases
     * Cyber Risk
     * Cybersecurity Compliance
     * Ransomware
     * Zero-Day Attacks
     * Sensitive Data Security
     * Cyber Insurance
     * Consolidate, Evolve & Thrive
   * 24/7 MXDR
     * GoSecure Titan® Endpoint Detection and Response (EDR)
     * GoSecure Titan® Next Generation Antivirus (NGAV)
     * GoSecure Titan® Network Detection and Response (NDR)
     * GoSecure Titan® Inbox Detection and Response (IDR)
     * GoSecure Titan® Intelligence
 * Company
   * About GoSecure
     * Leadership
     * Board of Directors
     * Careers
   * Events
     * Event Calendar
     * GoSec
   * Newsroom
     * Request A Media Kit
 * Resources
   * GoSecure Blog
   * Resources
     * White Papers & Reports
     * eBooks
     * Case Studies
     * Datasheets & Brochures
     * Webinars & Podcasts
     * Videos & Infographics
     * Technical Guides
     * See Library
   * Security Advisories
 * Partners
 * Get Secure




BEYOND THE SCRIPT: ATTACKER’S SLEEP SCHEDULE AND STRATEGIES BEHIND AUTOMATED
ATTACKS

by Andréanne Bergeron | Feb 7, 2024

Examining the brute-forcing attack patterns on our Remote Desktop Protocol (RDP)
honeypot systems reveals the discernible behavior of automated scripts. Yet,
upon closer inspection of the temporal patterns associated with these attacks,
subtle nuances indicative of human behavior begins to emerge.

We’ve accumulated a wealth of data from attempted logins on our exposed RDP
honeypot over time. In a previous blog, we delved into the human presence
revealed by these login attempts. Now, turning our focus to the temporal attack
patterns proves highly insightful, as they unveil valuable information crucial
for understanding the tactics employed by attackers.

To visually depict attack patterns, we generated calendar-style heatmaps. Each
heatmap provides a comprehensive view of one IP address’ activities throughout a
month (July 2022). The Y-axis (vertical) corresponds to the day of the month,
while the X-axis (horizontal) represents the hour of the day. Colors signify the
attack frequency, with a unique legend for each attacker located on the right
side of the graphic.

In the first scenario (see Graph 1), the activities exemplify the profile of a
persistent attacker engaged in continuous, fully automated login attempts on our
system.



The attacks are persistent, rapid, and relentless. One can envision a
compromised computer tirelessly executing tentative logins on the target.
Interestingly, this pattern was somewhat rare within our dataset (0.8%),
unveiling other noteworthy attack behaviors.

Human Strategies in Attack Patterns

In the second scenario (see Graph 2), the attack dynamics leave constant
onslaughts to instead present themselves in discernible blocks. Our working
hypothesis suggests a distinctive approach by these attackers, involving the
utilization of lists containing around 6,300 credentials. This strategy entails
systematically testing each set of credentials for potential system entry. Upon
completion of an automated attack list, the intervention of a human operator is
necessary to initiate a new attack block, introducing a new set of credentials
into the equation.



Also, the irregular pauses observed, seemingly arbitrary in duration and
sporadically dispersed throughout different periods of the day, point to the
human operator’s intermittent presence at the computer. These pauses,
characterized by their randomness, introduce an additional layer of complexity
to the attack pattern and represent approximately 14% of the behavior observed
in our dataset.

Avoiding Detection and Weekend Patterns

Attackers often employ a strategic approach involving the deliberate insertion
of delays between successive attacks. The purpose of this calculated tactic is
to effectively mitigate the risk of detection by security systems. This third
scenario is exemplified below (see Graph 3), showcasing a pattern where each
attack is strategically spaced apart by a couple of seconds. This pattern
strongly suggests the implementation of an automated attack specifically
programmed to incorporate intentional delays between each tentative login,
enhancing its ability to evade security measures and operate with a deceptive
resemblance to human interaction. The number of attackers imposing delays
between attempt logins represents 32% of our dataset.




What adds a compelling layer of intrigue to this example is the strategic
placement of pauses during entire days. When scrutinizing the calendar for July
2022, it becomes evident that the pauses align with weekends. Two hypotheses
emerge to elucidate this distinct attack pattern.

The first hypothesis concerns the “office-like” hours of attacks. There have
been documented instances and allegations of state-sponsored cyber activities
involving China. The Chinese government has been accused of engaging in cyber
espionage and hacking campaigns targeting various entities, including other
countries’ government systems and organizations. These activities are believed
to be carried out by different Chinese state-sponsored hacking groups.

One prominent example is the involvement of groups like APT1, also known as Unit
61398, which has been linked to the Chinese military. Reports and analyses by
cybersecurity firms and government agencies have detailed their alleged
involvement in cyber espionage operations targeting a range of sectors and
industries.

Therefore, should the attackers indeed be federal employees adhering to regular
office hours, their schedule would probably exhibit days off, mirroring typical
weekends.

The second hypothesis posits that a computer has been infiltrated and is being
utilized as a proxy for attacking the target. The owner of the compromised
computer may be unaware of its compromise, unwittingly facilitating the hacker’s
activities. This scenario could involve an office computer systematically
powered down on weekends.

Nighttime Patterns

There is a fourth scenario (see Graph 4 below) unveiling another intriguing
pattern: an 8-hour block where no attacks are initiated. The succeeding
tentative logins might be running but there is a hole of 8 hours in which none
are started. This observation is noted among 15% of attackers.



Several hypotheses can be explored here. First, when a human intervention is
required to initiate the block of attacks, a natural period of dormancy occurs.
For instance, adherence to sleep cycles renders individuals unavailable during
specific hours, resulting in an observable 8-hour hiatus.

Beyond the sleep cycle, the 8-hour gap may also be indicative of a work cycle.
Therefore, a second hypothesis suggests a scenario where the hacker initiates
attacks while at home but abstains during legitimate employment hours, when they
are away from home.

A third and final hypothesis is that the hacker is using a compromised computer
that is shut down at a specific time, beyond their control. However, this
hypothesis is less compelling, as the 8 hours blocks are not constant every
night.

Conclusion

The human touch in automated attacks is strikingly apparent. Even within the
realm of heavy attackers, distinctly human behaviors emerge. The observed sample
of attackers on the RDP honeypot reveals the diverse strategies, from continuous
assaults to deliberate pauses, reflect a nuanced understanding of the target.
Notably, the alignment of attacks with weekends and sleep cycles hints at the
attackers’ daily lives. The deliberate imposition of delays between attacks
serves to mimic human behavior, aiding in evading detection. It’s essential to
bear in mind that our adversary is human, not a machine.

 

Researchers: Here is the Code!

As a courtesy to the cybersecurity research community, we shared the code for
the calendar heatmaps on our GitHub.

We would like to thank Olivier Bilodeau for his help in generating the calendar
heatmaps.



SEARCH

Search for:

CATEGORIES

Categories Select Category .Net AAP Active Directory Advisory Services Alt Sec
Con Android AppSec Artificial Intelligence ASP.net Assessment Auditor Automation
Backdoor Bazarloader Binary Analysis Bitcoin BlackHat BluStealer Botnet Breach
Readiness Brute Force Burp C# Checkpoint Christmas Chrome CI/CD Cisco Code
Review Compliance Conference Confoo COVID-19 Credential Stuffing Criminal Market
Criminology Cryptography CSP Cybercrime Cybersecurity Cybersecurity Assessment
Cybersecurity Audits Cybersecurity Risk Cybersecurity Roadmaps Cybersecurity
Statistics Cybersecurity Strategy Darknet Deserialization Detection Development
Devops DNS Dynamic Analysis EDR Email Email Security Engineering Enterprise ESI
ESI Tags Ethical Hacking Events Exploit Exploitation Find-Sec-Bugs Firewall
Fraud Fuzzing GoSecure Titan Hackers Hacktoberfest Header Honeypot HTTP IDR
Incident Response Industry IoT Java Jboss Jenkins Jetpack Kotlin Lansweeper
Leaks LinkedIn Linux Log4j Log4Shell Malboxes Malware Malware Research
Man-In-The-Middle Manipulation MDR Media MFA Moose MSBuild MSSP NorthSec NTLM
Opcache Open-Source Opinion Oracle OSINT OWASP Password PCI DSS PDF Penetration
Testing Pentest PeopleSoft Phishing PHP PHP7 Plugin Privacy Privilege-Escalation
Process Proxy Purple Team PYRDP Ransomware RCE RDP RequestValidation Research
Roslyn SDLC Security Security Advisory Security Framework Security Maturity
Security Measures Sextortion Social Media SPEL Spring SQL Static Analysis
Statistics Canada Threat Threat-Intelligence Titan Labs Tool Uncategorized Video
Visual Studio VoIP Vulnerability WAF Web Weblogic Windows Wordpress WSUS XSS Zap

RECENT POSTS

 * Maximizing Employee Protection by Rethinking Expectations of Phishing
   Awareness and Email Security
 * Hack to the future: The Attack Surface of GPS Signals
 * Phishing may have just become a lot harder to detect…
 * Beyond the Script: Attacker’s Sleep Schedule and Strategies Behind Automated
   Attacks
 * Combating Advanced Cyber Threats: GoSecure’s Proactive Defense Against the
   Ivanti Connect Secure VPN Breach
 * Merry and Secure: Unwrapping the Truth Around Malicious Hackers Activities
   During Holiday Season
 * From Spraying and Praying to Custom Attacks: Different Playbooks for the
   Different Types of Malicious Actors Targeting RDP
 * Enhancing Cyber Risk Dialogue: Lessons from SEC’s Recent Action

CONTACT US

 (855) 893-5428

 * Follow
 * Follow
 * Follow


WHAT WE DO

 

GoSecure Titan®
Managed Extended
Detection & Response

GoSecure Titan® Platform

GoSecure Professional
Security Services

GoSecure Titan®
MXDR for Microsoft


COMPANY

 

About Us
Blog
Library
Careers
Privacy Notice
Support

 

BECOME A PARTNER


GLOBAL HEADQUARTERS

 

13220 Evening Creek Dr.S
Suite 107
San Diego, CA 92128
Tel: 855-893-5428


JOIN 200,000+ SECURITY LEADERS








SIGN UP FOR OUR COMMUNICATIONS TO RECEIVE OUR LATEST NEWS, EVENTS, HELPFUL
ASSETS, AND LEARN MORE.




EMAIL SUBSCRIPTION



Email

Consent(Required)
I consent to receive communications from GoSecure and I agree to the Privacy
Notice.
Comments

This field is for validation purposes and should be left unchanged.




2024 © GoSecure, Inc. All Rights Reserved.


 24/7 Emergency – (888)-287-5858 

Notifications