In the cyber world, a honeypot
consists of data (for example, in a network site) that appears to be a legitimate part of the site but is actually isolated and monitored, and that seems to contain information or a resource of value to attackers, which are then blocked.
Of course, nothing prevents nefarious persons or entities from using honeypots to draw in honest folks for nefarious purposes. Purposes like the following.
The trove of leaked Democratic National Committee emails posted to Wikileaks on July 22 has sparked concerns about malware as users access the vast trove of documents.
On the day of the leak, Google’s Transparency Report warned users of dangerous downloads from Wikileaks.org. Google has not revealed specifically what was detected….
Malware was detected in the Global Intelligence Files dumped last year by Wikileaks, too. Further, Wikileaks actually could be a victim in this malware ploy, too: they do little of their own hacking, getting their stuff from other sources. One of their sources already has been implicated in the recent hacks of Democratic Party IT facilities like the DNC, DNCC, and Democratic Party Presidential candidate Hillary Clinton’s campaign email servers, along with Clinton’s official State Department business personal email server: Russia is suspected of conducting these particular hacks.
Are these guys—Russians, Chines, ordinary thieves—setting up other botnets? Setting up sources for stealing personal financial data or data useful for blackmail or data useful for espionage, with these sources to be tapped at a time of convenience in the future? Setting up something else?