Was this helpful?
Thumbs UP Thumbs Down

Pro-Russian cyberattackers duped by a decoy target

A hacker using his laptop
Man working on a laptop, cybersecurity concept

The digital trap is set

Imagine cybersecurity experts creating a fake online water utility, a digital trap known as a honeypot. A pro-Russian hacktivist group named TwoNet took the bait and launched an attack on the decoy that included defacement and attempted process manipulation.

According to researchers, the attackers used default HMI credentials to log in, a common and dangerous configuration in industrial systems.

A hacker using his laptop

Hackers boast about fake wins

Thrilled with their supposed success, TwoNet quickly took to their Telegram channel to boast. They announced they had disrupted a critical Dutch water organization, seeking credibility and notoriety. This public bragging is what confirmed the honeypot’s success in tricking them, as they celebrated an attack on a facility that never existed.

Researchers observed a defacement message on the login page that read ‘HACKED BY BARLATI’ followed by an expletive, which the actors used to claim credit on their channels.”

Programmer or IT person in glasses reading script, programming and cybersecurity research on computer

A revealing performance unfolds

Researchers observed the entire attack from start to finish, gaining valuable insights. The hackers spent about 26 hours inside the fake system, exploring and manipulating its controls. Their actions demonstrated a clear intent to disrupt a water treatment process, not just leave a mark.

In the honeypot, researchers observed the attackers delete PLC data sources, which disabled real-time monitoring inside the decoy environment.

Risk alert concept

Why do experts set these traps

Honeypots act as early warning systems for cybersecurity professionals. They provide a safe environment to study how attackers think and operate without risking real infrastructure. The intelligence gathered is crucial for building stronger defenses for our essential services.

By analyzing these interactions, experts learn the specific tricks hackers use to break in and cause harm. This knowledge helps them develop better security strategies and detection methods for real-world protection.

A man using laptop with system hacked alert warning sign

The illusion of a major victory

TwoNet operated completely unaware that its triumph was an elaborate illusion. They confidently publicized their hack of a real Dutch water organization, an entirely false claim. Forescout said this was the first time a named group publicly claimed a breach of one of their honeypots.

The event highlights how hacktivist channels often blur the line between genuine incidents and pure exaggeration. It shows that not all online boasts should be taken at face value.

Ddos concept with faceless hooded male person

A dangerous shift in targets

TwoNet previously ran DDoS and defacement campaigns, and this attempt shows the group testing techniques against industrial control interfaces which could indicate an interest in critical infrastructure targets.

Other hacktivist groups are also attempting this risky escalation, aiming for energy and water utilities. Their ambition is real, even if their current skills are still developing.

Hackers making cryptocurrency fraud using virus software and computer interface

The open door of weak passwords

The hackers’ first step was to exploit weak, default credentials on the system’s control panel. This is like someone breaking into a house because the lock was never changed from the factory setting. Many internet-connected devices, including some in industrial settings, ship with simple, well-known passwords.

Leaving these default passwords in place is one of the biggest security mistakes an organization can make. It provides an easy entry point for even low-skilled attackers.

Hacker hacking software.

Hands on the control panel

Once inside, the hacker actively manipulated the Human-Machine Interface (HMI), the industrial control panel. They did not stop at leaving a message; they changed operational setpoints, which are critical values that control machinery.

This move from simple defacement to process manipulation proves their goal was genuine disruption. It shows a clear intent to interfere with the utility’s normal operations.

Time running out concept with dissolving alarm clock.

Silencing the alarms

A particularly alarming step was their effort to disable the system’s safeguards. They deliberately modified settings to turn off logs and alarms, attempting to cover their tracks. This would prevent engineers from noticing the unauthorized changes in a real scenario.

In a real world scenario, disabling alarms and logs could allow dangerous conditions such as a tank overflow to go unnoticed, which is why these controls are critical.

Telegram app on a smartphone

The short life of hacktivist groups

According to researchers, TwoNet later announced it would cease operations and its associated channels subsequently became unreachable.

This ephemeral life cycle is common, with groups frequently rebranding or dissolving entirely. However, the individual hackers often persist, joining new groups and continuing their activities under different names.

Hand assemble safety first icon on wooden block cube.

Why utilities are in the crosshairs

Critical infrastructure, like water and power utilities, is increasingly targeted by cyber actors. These sectors are attractive targets because of their vital role in society and public safety. Unfortunately, security budgets and awareness in these areas sometimes lag behind the threat.

The TwoNet honeypot incident mirrors a broader pattern of exposed industrial systems online. This widespread exposure creates tangible risks that need urgent attention from both operators and governments.

Serious hooded hacker working with computer to develop malware

Learning from their every move

The attack provided a free, detailed lesson in real-world hacker behavior. Experts saw exactly which vulnerabilities were exploited and which system functions were manipulated. This knowledge is directly used to write better detection rules for security software monitoring real networks.

It helps organizations know what specific activity to look for, like unauthorized changes to HMI settings. Being prepared with this intelligence is a powerful component of a modern defense strategy.

Login verification passcode on a phone

How to build a digital fortress

There are clear, effective steps to protect the systems that manage our essential services. The most critical rule is to never connect industrial control systems directly to the public internet. Strong, unique passwords must immediately replace all default credentials on every device.

Networks should be rigorously segmented, meaning the industrial control system is separated from the business network. This creates a barrier that makes it much harder for an attacker to move laterally.

Cybersecurity concept

Your role in a connected world

Cybersecurity is not just a problem for large corporations and governments. Everyone has a part to play in fostering a safer digital environment. Using strong, unique passwords for your own online accounts is a fundamental first step. Being cautious about suspicious links and emails helps protect your personal data and your network.

A more secure digital world starts with widespread individual awareness. These simple steps create a collective shield that makes everyone safer from evolving online threats.

Hooded hacker hacking

A clear warning for tomorrow

The TwoNet case is a stark warning for all critical infrastructure operators. It proves that even less-experienced groups are actively learning how to disrupt industrial processes. Their attempts may be clumsy now, but their direction is clear and concerning.

The gap between hacker ambition and capability is steadily closing. We must ensure our digital defenses are strengthened and modernized before more determined attackers succeed against real targets.

Group of hooded hackers, hacking

Beyond boasting lies real intent

While hacktivist groups often exaggerate their claims, their actions should not be dismissed. Monitoring their channels provides valuable insight into their intent, chosen targets, and emerging tools. It shows where they are headed, even if their current skills are still developing.

Their demonstrated desire to disrupt critical services is very real, as the honeypot attack proved. Ignoring their bluster could mean missing the early signs of a real, developing threat.

Want to see how else scammers are leveling up their tech? Check out how cyber scammers upgrade tactics with AI.

IT team working

From theory to practice

This real-world example provides an invaluable case study for security teams. They can analyze the exact sequence of events, from initial login to final setting change. This practical data is far more useful than theoretical models for understanding modern threats.

The intelligence gathered directly informs how security controls are designed and implemented. It helps prioritize which vulnerabilities to patch first and which user behaviors to monitor most closely.

Curious how you can apply these security lessons to your own device? See how to shield your smartphone from cyber threats.

What’s your take on using honeypots to catch cybercriminals? Share your thoughts in the comments, and if you found this intriguing, give it a like.

Read More From This Brand:

Don’t forget to follow us for more exclusive content right here on MSN.

If you liked this story, you’ll LOVE our FREE emails. Join today and be the first to get stories like this one.

This slideshow was made with AI assistance and human editing.

This content is exclusive for our subscribers.

Get instant FREE access to ALL of our articles.

Was this helpful?
Thumbs UP Thumbs Down
Prev Next
Share this post

Lucky you! This thread is empty,
which means you've got dibs on the first comment.
Go for it!

Send feedback to ComputerUser



    We appreciate you taking the time to share your feedback about this page with us.

    Whether it's praise for something good, or ideas to improve something that isn't quite right, we're excited to hear from you.