WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships Trend Micro Creates New OT Honeypot
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

Trend Micro Creates New OT Honeypot

Author: Jennifer Walker

Created: Tuesday, January 28, 2020 - 19:13

Categories: Cybersecurity, General Security and Resilience, Security Preparedness

Cybersecurity firm Trend Micro recently released a report detailing their new OT honeypot research. Members may recall, in 2013 Trend Micro released research that centered on a honeypot they had developed for a water system. This time, Trend Micro Research created a highly elaborate, industrial prototyping company, complete with backstory and online presence. The honeypot consisted of real ICS hardware and a mix of physical hosts and virtual machines to run the factory, including several programmable logic controllers (PLCs), human machine interfaces (HMIs), separate robotic and engineering workstations, and a file server. After seven months online, Trend Micro reports the OT honeypot attracted mostly fraud and financially motivated exploits, confirming the on-going assertion that unsecured industrial environments are primarily victims of commodity threats from cybercriminals, not from an abundance of highly advanced state-sponsored actors bent on sabotage of key processes. These common IT-based attacks included a malicious cryptocurrency mining campaign, two ransomware attacks, another that posed as a ransomware attack, and several scanners. However, the honeypot did not go unnoticed by actors looking for control systems; Trend Micro describes traffic to their PLCs that could have been malicious or originating from lesser known scanners. The report includes details on three specific PLCs, including Siemens S7-1200 PLC, two Allen-Bradley MicroLogix 1100 PLCs, and an Omron CP1L PLC. Interestingly, the honeypot gained attention from a well-known researcher, who had escalated his findings to the appropriate parties that would need to be notified in the event of a control system getting exposed to the internet, including the Industrial Control Systems Cyber Emergency Response Team (ICS-CERT). According to Trend Micro, for their honeypot to garner this kind of attention, they practically had to do everything wrong when it came to their faux company’s general security stance. However, for many small businesses with no IT or OT security staff, such a situation is not uncommon. Members are encouraged to read this fascinating and detailed report, and apply Trend Micro’s findings, particularly organizations running similar systems as the ones included in the research. Read the report at Trend Micro

Related Resources

(TLP:CLEAR) FIRESTARTER Backdoor and Updated Emergency Directive for CISCO Firepower and Secure Firewall Devices

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:GREEN) FBI FLASH – Newly Observed Ransomware Variant Black Shrantac Threat to U.S. Entities

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:AMBER+STRICT) Likely PRC State-Sponsored Activity Observed in the Water Sector – DocuSign Phishing Tactics Identified

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar