Technical

Introducing Object First’s Honeypot Feature

Sophia BarnettSB
Sophia Barnett
Technical Marketing Writer

Backup environments are a key target on a ransomware attacker’s agenda. Attackers know that if your backups survive, you are less likely to pay the ransom. That’s why backup servers, including Veeam Backup & Replication (VBR) are often the first systems they try to disable. 

To help backup administrators monitor these threats, Object First has released a honeypot feature in our Ootbi (Out-of-the-Box Immutability) 1.7 release. This feature is designed to assist in the early detection of suspicious activity targeting backup infrastructure without adding complexity or overhead to your administrative tasks. 

What’s a Honeypot? 

 

Image Courtesy of Western Washington University and designed by Zeck Koa and Chris Baker. 

As bees are drawn to nectar, so bad actors are drawn to vulnerable systems. Honeypots are decoy systems that are real servers, operating in isolated and monitored environments. They’re intended to attract attackers and alert you when someone is probing your environment. Think of it as a tripwire. It’s a way to become aware of threat activity before they escalate into a catastrophe. 

Ootbi’s Honeypot feature simulates a VBR production server, complete with open ports that attackers typically look for (like SSH, RDP, SQL Server, and VMware). When someone scans or tries to access it, the system immediately generates alerts. 

This is especially useful during the dwell phase of an attack—when intruders have gained access to the environment and are stealthily exploring your network before launching a full-scale assault. Detecting them early can prevent a successful ransomware attack. 

How to Enable the Feature 

Most honeypots are custom, unsupported toolkits that are complex to set up and operate.  Existing toolkits can take 30–50 steps to configure, which often deters administrators from deploying them. 

Conversely, Ootbi's Honeypot is designed for ease of use and monitoring. The feature is built into all Ootbi appliances and can be easily turned on in five steps: 

1. Log into the Cluster Manager UI of your Object First appliance. 

2. Navigate to Settings > Security > Honeypot.

3. Check the box to Enable Honeypot.

4. Choose your IP mode: 

  • DHCP: Automatically assigns an IP address. 
  • Static: Manually set an IP and netmask.

5. Click the “Apply Changes” button. 

 

That’s it. In just a few clicks, you’ve deployed a fully functional honeypot. Even if you opt for a static IP configuration, setup rarely exceeds five clicks once you’re in the Cluster Manager. 

How Alerts Work—and Where They Go 

Once the honeypot is active, it begins monitoring for abnormal activity. This includes: 

  • Multiple authorization attempts 
  • Port scans
  • Probing behavior
  • Requests on sensitive protocols
  • Service startup failure
  • Unexpected service stop
  • Service failure
  • Suspicious Veeam Console access
  • Cumulative suspicious activity
  • Service lifecycle events (start/stop) – informational 

 

Alerts are visible in Ootbi Cluster manager, and can be sent through Object First’s standard notification system, which supports: 

  • Email (SMTP): You’ll need to specify your email server. 
  • Syslog: For integration with SIEM platforms like Splunk or ELK. 

Each alert includes key details like: 

  • Event ID (e.g., 7041 for SSH attempts, 7030 for port scans) 
  • Source IP address
  • Protocol targeted
  • Summary of activity 

As depicted above, you can view alerts directly in the Object First dashboard. 

Real-World Use Cases 

Whether you’re a solo IT admin or part of a larger team, the honeypot feature can offer immediate benefit to your team: 

  • Small teams: If you wear multiple hats—backup, security, infrastructure—you’ll appreciate the simplicity. You’ll gain insight into suspicious activity without needing to be a security expert. 
  • Larger organizations: Backup admins can use honeypot alerts to begin discussions with security teams. “Are you scanning my systems?” If not, it’s time to investigate. 

Even internal misbehavior—like junior staff running unauthorized scans—can trigger alerts. This feature's benefits extend beyond catching bad actors. It helps the team build security awareness and best practices response protocols. 

What It’s Not 

Let’s be clear: this is not an EDR (Endpoint Detection and Response) system. It’s not a replacement for your existing security tools. 

Instead, it’s a value-add: a lightweight, easy-to-use feature that helps you detect threats early and respond faster. It’s another tool in your toolbox, not one that replaces others. 

Final Thoughts 

Setting up your cybersecurity defenses can be a complex process, but your everyday tools shouldn’t be. With Object First’s Honeypot feature, you can easily add more defense in depth, getting powerful early detection capabilities without the burden of setup, maintenance, or deep security expertise. 

It’s simple. It’s effective. And it’s built to make your life easier.

Stay up-to-date

By submitting this form, I confirm that I have read and agree to the Privacy Policy.

You can unsubscribe any time.