Avira honeypot discovers the most insecure password combination

INSUBCONTINENT EXCLUSIVE:
most commonly used credential is blank, which means that the attackers just enter an empty username and password
two-part combination of the username and password hackers enter into the company's smart device honeypot while attacking it
Attacks with blank or empty credential slots made up 25.6 percent of all credentials entered and vastly outnumber the other top username and
available under a number of different names.The honeypot set up by Avira mimics the features and behaviors of connected devices such as
routers and smart IoT devices in an effort to draw in hackers
As the honeypot makes itself visible and seemingly vulnerable online, it uses the Telnet, Secure Shell and Android Debug Bridge protocols
which are most commonly used with smart devices.Smart device attacks are made up of two largely automated phases
During the first phase a target is selected and this is done by IP/port scanning
The second phase is when the hackers work to infect the identified device and here Avira's honeypot plays a critical role
In addition to recording the credentials used by hackers during the attack, the honeypot also collects data on infection vectors, malicious
scripts and malware.While smart devices are often criticized for their insecurity and the fact that many users do not change their default
of these protocols and they are not even aware that their devices might be accessible by hackers
victim to a smart device attack, Avira recommends doing a search online for any reported potential vulnerabilities in a device before
purchasing it, checking devices for firmware updates to patch any known vulnerabilities or issues and scanning your network for open ports
that could be inviting hackers in.