Mumbai Cloud Server Honeypot Was Attacked More Than 6 Lakh Times
Jyotis
On average, each minute went by, there were 13 attacks on each honeypot of cloud servers.
- Connected Cars Face A Growing Risk Of Cybercriminals
- Cybercriminals Are Tricking Online Dating Site Users To Launder Money
- These Indian Cities Are Promising Victims Of Cyber Attacks
On April 10, the British security software and hardware company Sophos reported that there were over 678,000 attacks on a Mumbai Cloud server honeypot within a month. The number of attacks just stands behind that in Ohio, US – where cybercriminals tried to log in the server honeypot more than 950,000 times. At present, there are only 10 honeypots in the whole world.
These honeypots were chosen and built in the 10 most prominent data centers of Amazon Web Services or AWS in a variety of large cities including Singapore, Sydney, Sao Paulo, Paris, Ohio, London, Ireland, Frankfurt and California within more than 30 days from the middle of January to the middle of February.
For those unknown, a honeypot is a kind of system designed to simulate cyberattackers’ possible targets that help security researchers to manage the behavior of hackers.
In the report "Exposed: Cyberattacks on Cloud Honeypots" by Sophos, there were more than 50 lakhs attacks on the honeypots in the world. That shows us what cybercriminals have done to automatically scan and find out weak Cloud buckets.
On average, each minute went by, there were 13 attacks on each honeypot of cloud servers.
The statistics will be a warning for the global businesses who have increasingly adopted Cloud technologies, even when they are moving to all-Cloud and hybrid platforms.
In his statement, Sunil Sharma, who now serves as both a managing director at Sophos India and a leader of SAARC business, said,
In addition, the report also stressed that businesses need to have a clear vision towards public Cloud infrastructure as a solution to maintain compliance as well as to comprehend what they should protect.
However, each organization, as well as each auto-scaling environment, has many development teams. In other words, IT security must face a lot of difficulties. Sophos CISO Ross McKerchar said,
Featured Stories
ICT News - Feb 18, 2026
Google's Project Toscana: Elevating Pixel Face Unlock to Rival Apple's Face ID
Mobile - Feb 16, 2026
Xiaomi Launches Affordable Tracker to Compete with Apple's AirTag
ICT News - Feb 15, 2026
X Platform Poised to Introduce In-App Crypto and Stock Trading Soon
ICT News - Feb 13, 2026
Elon Musk Pivots: SpaceX Prioritizes Lunar Metropolis Over Martian Colony
ICT News - Feb 10, 2026
Discord's Teen Safety Sham: Why This Data Leak Magnet Isn't Worth Your Trust...
ICT News - Feb 09, 2026
PS6 Rumors: Game-Changing Specs Poised to Transform Console Play
ICT News - Feb 08, 2026
Is Elon Musk on the Path to Becoming the World's First Trillionaire?
ICT News - Feb 07, 2026
NVIDIA's Gaming GPU Drought: No New Releases in 2026 as AI Takes Priority
ICT News - Feb 06, 2026
Elon Musk Clarifies: No Starlink Phone in Development at SpaceX
ICT News - Feb 03, 2026
Elon Musk's SpaceX Acquires xAI in Landmark $1.25 Trillion Merger
Read More
ICT News- Feb 18, 2026
Google's Project Toscana: Elevating Pixel Face Unlock to Rival Apple's Face ID
As the smartphone landscape evolves, Google's push toward superior face unlock technology underscores its ambition to close the gap with Apple in user security and convenience.
Mobile- Feb 16, 2026
Xiaomi Launches Affordable Tracker to Compete with Apple's AirTag
For users tired of ecosystem lock-in or high prices, the Xiaomi Tag represents a compelling, no-frills option that delivers core functionality at a fraction of the cost.
Mobile- Feb 17, 2026
Anticipating the Samsung Galaxy S26 and S26+: Key Rumors and Specs
The Samsung Galaxy S26 series is on the horizon, sparking excitement among tech enthusiasts.