The report also found a total number of 26,166 usernames that were used to log into the networks by the attackers, while a total of 80,282 passwords were found that were used to log in. to networks by attackers.
According to research done by the Institution of Electronics and Telecommunication Engineers (IETE) and CyberPeace Foundation (CPF) with Autobot Infosec, the attackers tried to execute several terminal commands and also tried to download malicious payloads to the system .
The researchers found that a total of 131,388 unique terminal commands were executed in the system, while a total of 1,262 unique payloads were identified and injected into the environment. Payloads include malicious files like botnet, Trojan, etc.
“By deploying the simulated network, we can collect data on attack patterns, different types of attack vectors for different protocols, and recent trends in malicious activity,” a spokesperson said. Cyberpeace Foundation.
The objective was to examine the different types of signatures that can be used as exponents of compromise on the simulated Data Center network by collecting information that can mitigate future attacks on real networks.