Sayers Blog

Breaking Illusion

Threat Deception: Attacking the Illusion

Guardian, this is Rapier....three klicks southeast of target…Rapier is Oscar Mike.  Radio silent.  Over.

Copy Rapier.  This is Guardian.  Out.

divider_green.jpg

 

Guardian, this is Rapier.  Code worked.  Rapier in the perimeter headed to target…..FRV in five.  Over

Roger.  Out….

divider_green.jpg


Guardian, this is Rapier.  What’s goin’ on?  We’re in the building ……negative contact….I repeat, negative contact.  Nothing.  Just empty buildings with a lot of fake furniture…over.

divider_green.jpg

 

This is not the real site, Rapier!  Repeat…NOT THE REAL SITE!  POP SMOKE…REPEAT…POP SMOKE!



Register For Threat Defense Cyber Range

 

Rapier watches in disbelief, as the mirage surrounding him disappears.  The walls, ceiling, and floor of a plain white cell slowly appear.  No door.  No escape.  Rapier’s every move was captured and documented, as his target safely carried out its own mission elsewhere.

Such is the purpose of advanced threat deception technologies.  The idea is to create an attractive and illusionary target to entice a would-be-hacker.  The miscreant spends precious time and money on penetrating a target that is nothing more than a complex illusion.  This illusion’s sole purpose is misdirection, so a defender has more time to mount an effective and proactive defense.  The hacker’s reality is absorbed into the illusion, while the defender watches his every move, and learns his methodologies. 


Couple threat deception technologies with other advanced analytical and detection tools, and you have the capability to keep miscreants chasing their tails for long periods of time, all the while, you recon and enumerate them.  Your blue team becomes increasingly effective as they gather intelligence, and your red team can refine its own processes to mirror an actual threat, rather than a conceptual threat. 

 

 


Interested in reading more content like this? 

Subscribe to Sayers Blog