The GPU Hunter: Anatomy of a Compute Predator
Our honeypot network captured an SSH attacker methodically appraising what it believed was a high-value GPU workstation. 55 commands in 100 seconds: hardware benchmarks, credential harvesting, and a paranoid honeypot detection sweep across six frameworks. It checked for Cowrie, Kippo, Dionaea, and more. Every check came back clean. The machine doesn't exist.
