Deception + Black Holes = Cleanliness

Deception + Black Holes = Cleanliness

After my last post talking about how the time has come to put deception technology (previously known as honey pots) to active use in our regular cybersecurity arsenal, I had a lot of questions about use cases. In other words: "Just because we can, doesn't mean we should. So, WHY?"

First, let me start my applauding that skepticism, far too many tools are in play today, with far too many consoles and alarms. I am NOT a fan of buying the latest toy for the sake of the toy. So, WHY. What practical problem does deception address? Let's take a look at what happened with a customer's experience with ransomware.

So, a developer was troubleshooting a problem with their application. As a troubleshooting step, they disabled the security controls on the test machine. That didn't fix the problem, but instead of restoring the controls, they proceeded to download a utility to inspect the program. Said utility contained a Trojan (VoidCrypt - which was missed because of the previously described disabled controls). Needless to say, the malware wasted no time looking to spread. Because the deception decoys are promiscuous network members, they are quickly discovered by ransomware - this case being no different. When the malware hit the decoy, the decoy warmly welcomed the malware, and passed the fingerprint (pronounced SHA-256 hash) to the EDR platform, which then prevented its execution anywhere it was running and its removal everywhere, thereby thwarting the ransomware. The beauty of this whole thing is that the customer only heard about this during their quarterly security review.

This is how security SHOULD work. Instead, over 5,000 companies were impacted by ransomware in 2023 - thats over 13 companies every single day!! Clearly, something new is needed to address this pervasive threat. I humbly suggest it is time to look into deception technologies.


要查看或添加评论,请登录

Maria Teigeiro, CISSP的更多文章

  • It's 2024. Do You Know Where Your Data Is?

    It's 2024. Do You Know Where Your Data Is?

    I recently read that "Approximately 35% of companies use AI". I would like to ammend that to say "are purposefully…

  • Islands of Data - Best of Breed in the Age of AI

    Islands of Data - Best of Breed in the Age of AI

    The "best of Breed" design principle has been a school of thought which suggested that by combining a myriad of…

    1 条评论
  • Balancing Sphere of Control vs Fault Domain

    Balancing Sphere of Control vs Fault Domain

    Today, we had a lesson in the balance of sphere of control vs fault domain as Crowdstrike issued a defective content…

    2 条评论
  • It Is Time For Security Through Simplicity

    It Is Time For Security Through Simplicity

    Almost 20 years ago, Cisco advocated for a "defense in depth" model for security. The idea was that optimal security…

  • Data Is the Fuel of AI

    Data Is the Fuel of AI

    We are in the dawn of the Age of AI. LLMs are proliferating and chips are powerful enough to run AI engines.

    2 条评论
  • Kevlar Halter Tops (Buying Data for AI)

    Kevlar Halter Tops (Buying Data for AI)

    Within 60 days, 2 out of the 5 SIEM leaders in Gartner's SIEM MQ (representing a total of 23 of the SIEM marketshare)…

    4 条评论
  • Security for Change, not Performance

    Security for Change, not Performance

    The latest notice of exploitation of critical infrastructure comes with an irresponsible set of actions: Change all…

    1 条评论
  • LLM/AI: Deja Vu

    LLM/AI: Deja Vu

    When you're as old as I am, you get to see that history does indeed repeat itself, no matter how new the technology. In…

    1 条评论
  • Security that Accelerates Business

    Security that Accelerates Business

    One of the best things about a useful security product, is that it not only secures the environment but also…

  • Honey Pots: An Idea Whose Time Has Come

    Honey Pots: An Idea Whose Time Has Come

    Honey pots as a security concept have been around for decades. I first saw the idea of using a dedicate resource to…

    7 条评论

社区洞察

其他会员也浏览了