Back to Work
Threat IntelligenceThreat Intelligence / Cloud Security2024

Honeypot Deployment - Google Cloud

Real-world attacker behaviour analysis via T-Pot on GCP

T-PotGCPELK StackDockeriptables

Overview

This project deployed a production-grade honeypot infrastructure on Google Cloud Platform to capture, analyse, and document real-world attacker behaviour. The T-Pot multi-honeypot framework was chosen for its breadth of simulated services and built-in ELK-based logging stack. The deployment was carefully secured to enable controlled threat exposure.The attackers could interact with honeypots while being prevented from pivoting to other cloud resources.

Methodology

01

Infrastructure Setup

Provisioned a GCP e2-standard-4 VM running Ubuntu 22.04. Deployed T-Pot via Docker Compose, bringing up 20+ honeypot services including Cowrie (SSH/Telnet), Dionaea (malware capture), Conpot (ICS/SCADA), and Elasticpot.

02

Security Hardening

Configured GCP firewall rules to expose only honeypot ports externally while restricting management access to a specific IP. Implemented iptables rules and SSH hardening (key-only auth, non-standard management port) to prevent honeypot escape.

03

Traffic Monitoring

Used T-Pot's integrated ELK stack to visualise attack patterns in real time. Created custom Kibana dashboards for geographic source mapping, top attacked ports, and credential spray patterns.

04

Threat Analysis

Analysed collected logs over a 4-week period. Documented attacker TTPs mapped to MITRE ATT&CK, extracted malware samples captured by Dionaea, and identified common credential combinations used in automated spray attacks.

Findings

Info

SSH Credential Spraying

Over 50,000 SSH login attempts recorded within the first 24 hours. Top credentials: root/root, admin/admin, pi/raspberry.

Info

Top Targeted Ports

Ports 22 (SSH), 23 (Telnet), 80 (HTTP), 8080, and 5900 (VNC) received the highest volume of scanning traffic.

Info

Malware Samples Captured

Dionaea captured 12 unique malware samples including Mirai botnet variants targeting exposed Telnet services.

Info

Geographic Sources

Top attacking countries: China, Russia, United States, Netherlands, Germany.

Info

ICS/SCADA Probing

Conpot honeypot recorded multiple interactions probing Modbus and S7comm protocols, indicating targeted ICS scanning.

Tools Used

T-Pot (multi-honeypot framework)Docker + Docker ComposeELK Stack (Elasticsearch, Logstash, Kibana)GCP FirewalliptablesCowrieDionaea

Remediation

  • Disable Telnet entirely; enforce SSH key authentication with fail2ban
  • Never expose ICS/SCADA protocols to the public internet
  • Implement geo-blocking for known malicious ASNs at the firewall level
  • Use threat intelligence feeds to proactively block known scanner IPs

References

  • [1]T-Pot GitHub documentation
  • [2]MITRE ATT&CK - Initial Access techniques
  • [3]Mirai botnet analysis reports