Aug. 16, 2023, 2:01 a.m. | WiReD

The RISKS Digest catless.ncl.ac.uk

Security researchers set up a remote machine and recorded every move
cybercriminals made -” including their login details. [...]

Some attackers were sophisticated, while others appeared inept. And some
just behaved oddly -” one person who logged into the machine changed the
desktop background and logged out, and another wrote “lol” before covering
their tracks and leaving, the researchers behind the study say. [...]

Bergeron and Bilodeau have grouped the attackers into five broad categories
based on character types from …

attackers cybercriminals desktop hackers honeypot login machine researchers secrets secrets security security security researchers

Sr. Product Manager

@ MixMode | Remote, US

Information Security Engineers

@ D. E. Shaw Research | New York City

Technology Security Analyst

@ Halton Region | Oakville, Ontario, Canada

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

Associate Product Security Engineer

@ Humana | USA - Berkeley, MO

Cyberspace Capability Developer

@ SNC-Lavalin | MA105: BBN Headquarters 10 Moulton Street , Cambridge, MA, 02138 USA