Exploring current E-mail cyber threats using authenticated SMTP honeypot

0Citations
Citations of this article
18Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Today, spam is a major attack vector hackers use to cause harm. Let it be through phishing or direct malicious attachments, e-mail can be used to steal credentials, distribute malware, or cause other illegal activities. Even nowadays, most users are unaware of such danger, and it is the responsibility of the cybersecurity community to protect them. To do that, we need tools to gain proper threat intelligence in the e-mail cyber landscape. In this work, we show how an e-mail honeypot requiring authentication can be used to monitor current e-mail threats. We study how such honeypot performs in place of an open relay server. The results show this kind of solution provides a powerful tool to collect fresh malicious samples spreading in the wild. We present a framework we built around this solution and show how its users are automatically notified about unknown threats. Further, we perform analysis of the data collected and present a view on the threats spreading in the recent months as captured by this authentication-requiring e-mail honeypot.

Cite

CITATION STYLE

APA

Zobal, L., Kolář, D., & Křoustek, J. (2020). Exploring current E-mail cyber threats using authenticated SMTP honeypot. In ICETE 2020 - Proceedings of the 17th International Joint Conference on e-Business and Telecommunications (Vol. 3, pp. 253–262). SciTePress. https://doi.org/10.5220/0009591002530262

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free