ViciousTrap Uses Cisco Flaw To Build Global Honeypot From 5,300 Compromised Devices - Data Intelligence
6 Articles
6 Articles
ViciousTrap Uses Cisco Flaw To Build Global Honeypot From 5,300 Compromised Devices - Data Intelligence
May 23, 2025Ravie LakshmananThreat Intelligence / Network Security Cybersecurity researchers have disclosed that a threat actor codenamed ViciousTrap has compromised nearly 5,300 unique network edge devices across 84 countries and turned them into a honeypot-like network. The threat actor has been observed exploiting a critical security flaw impacting Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers (CVE-2023-20118) …
ViciousTrap Uses Cisco Flaw to Build Global Honeypot from 5,300 Compromised Devices
Cybersecurity researchers have disclosed that a threat actor codenamed ViciousTrap has compromised nearly 5,300 unique network edge devices across 84 countries and turned them into a honeypot-like network. The threat actor has been observed exploiting a critical security flaw impacting Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers (CVE-2023-20118) to corral them into

ViciousTrap Hackers Breaches 5,500+ Edge Devices from 50+ Brands, Turns Them into Honeypots
A sophisticated cyber threat actor, dubbed ViciousTrap by Sekoia.io’s Threat Detection & Research (TDR) team, has compromised over 5,500 edge devices across more than 50 brands, transforming them into a massive honeypot-like network. This alarming operation, detailed in Sekoia.io’s latest investigation, targets a wide array of internet-facing equipment, including Small Office/Home Office (SOHO) routers, SSL […] The post ViciousTrap Hackers Breac…
Honeypots a strategic layer in cyber defence
J2 Software has introduced ‘Honeypot as a Service’, a plug-and-play solution designed to deceive attackers, gather critical threat intelligence, and ultimately strengthen an organisation’s cyber resilience. This new approach is particularly crucial as cyberattacks become more complex and targeted. A honeypot is a digital decoy that mimics a real system, such as a data store, web server, or even an entire network segment. Its primary purpose is t…
Coverage Details
Bias Distribution
- There is no tracked Bias information for the sources covering this story.
To view factuality data please Upgrade to Premium
Ownership
To view ownership data please Upgrade to Vantage