Deceit As A Defense Against Cyberattacks

  /     /     /  
Publicated : 22/11/2024   Category : security


Deceit As A Defense Against Cyberattacks


A new generation of threat deception technology takes the honeypot to a new, enterprise level.



Its not technically hacking back, but its definitely a more aggressive way to defend your network. A wave of startups and established security firms are offering deception-based security technologies, a sort of next-generation, proactive honeypot approach for enterprises.
Gartner calls this emerging sector threat deception, and predicts that 10% of all enterprises by 2018 will employ some form of deception tools and tactics against attackers. These virtual machine or appliance-based tools basically pose as legitimate members of the network--file servers, routers, switches, database servers, and even Internet of Things devices-- typically near critical assets such as a point-of-sale system or a server as another layer of defense. They mimic the real system but also detect, analyze and disrupt an attack from getting to a real target.
Traditional honeypots long have been the domain of security researchers and analysts--and law enforcement--for studying or entrapping malware or other cyberattack activity. They are labor-intensive, and require expertise. But the more automated threat deception technology isnt your fathers honeypot, and its still not a widely deployed approach. Financial services, healthcare, technology, and government organizations are among the early adopters.
Traditional honeypots were never designed to be deployed at scale within enterprise IT environments, says Carl Wright, general manager of TrapX, which sells a next-generation honeypot-type solution called DeceptionGrid. Honeypots really dont do emulations of other than pretty standard PCs, workstations and servers … Deception technology can emulate the IoT or non-standard devices complete with spin data.
Lawrence Pingree, research director/analyst for Gartners security group, says deception is a key component to detecting attacks. What we do today is detect and block, he says. But if you were to start lying to an attacker, for example, you can make them experience pain. You can create a deception zone within the network so the attacker believes he is interacting with a real node, but instead its the deceptive device emulating a real one, he says.
Misdirecting them is a very effective defense, Pingree says. It can divert the attacker from the real target, such as a desktop.
Creating a phony device or system is relatively simple to configure, and threat deception devices also are typically integrated with other security systems; many come with graphical views of the attack across multiple sensors that give a snapshot of what the attacker might be up to, for example.
Ken Baylor, former CSO at Pivotal Software, which runs Attivo Networks BOTsink, recommends placing the device logically close to the data its protecting. Attackers know critical data will be on the same subnets, so placing it in a likely subnet will aid with deception, Baylor says. And give the devices enticing names such as HRRecords, or creditcards, so they catch the attackers eye, he says.
The Attivo systems at Pivotal caught mostly users trying to access devices to which they werent authorized, malware from users BYOD devices, unauthorized vulnerability scanners, and other insider threat issues, says Baylor.
Threat deception technology helps minimize the number of false positives, notes Christopher Ensey, chief operating officer at Dunbar Cybersecurity, a managed security services provider that runs TrapXs threat deception appliance in-house as well as offers it as part of its managed service.
Ensey says IDS and event logs have a high rate of false positives, so adding the threat deception layer helps filter out the real threats. Its almost like an intelligent honeypot, he says. But unlike a honeypot, his TrapX systems are sampling malware and analyzing traffic patterns.
You can quickly make a judgment. Its not like a false positive from an IDS, with multiple hours of packet analysis, he says.
But there some concerns about the risk of messing with the bad guys. What if they figure out theyve hit a decoy? Pingree says these threat deception tools often are set up in a distributed way, and unlike classic honeypots, can respond so they appear real. You can integrate deceptions at the endpoint … on my computer, it could inject fake credentials or fake drive maps to throw off the attacker, he says.
In addition to TrapX, which specifically offers endpoint, application and some/partial data deception, there are several other vendors in the threat deception sspace that perform different types of deception, including: Allure Security Technology (data deception); Attivo Networks (endpoint, application and partial data); CyberTrap (endpoint, application and partial data); Cymmetria (endpoint, application and partial data); ForeScout (network ); Guardicore (network, endpoint, application and partial data); Hexis Cyber Solutions (network);  Illusive Networks (endpoint and partial data); LogRhythm (endpoint); Percipient Networks (network); Rapid7 (endpoint); Shape Security (application); Specter (endpoint, application and partial data); and TopSpin Security (endpoint, application and data).
Some of todays firewall, IPS, endpoint, and Web application firewall products, could also deploy deceptive technology, according to Gartner. Juniper Networks, with its Mykonos Software acquisition for Web deception, could fall into the threat deception technology category, according to Gartner.

Last News

▸ 7 arrested, 3 more charged in StubHub cyber fraud ring. ◂
Discovered: 23/12/2024
Category: security

▸ Nigerian scammers now turning into mediocre malware pushers. ◂
Discovered: 23/12/2024
Category: security

▸ Beware EMV may not fully protect against skilled thieves. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Deceit As A Defense Against Cyberattacks