It is hard to judge the significance of this. IMHO the honeypot was likely made easy to crack to gin up some business.
Let's see. Fake Network simulating endpoints in different countries with remote access vulnerabilities and "researchers" did this.
This is no small honeypot. It took a lot of work to set this up. And it had to look authentic otherwise it wouldn't attract what it did.
I'd say this was a very successful honeypot if it was done by McAfee or such and they observed the next generation of these things and how they work. Very useful indeed.
Also very useful for cybersecurity as they get a peek at what the latest nasty stuff looks like.