DECEPTION

Advanced Deception Technology is used to entice attackers to reveal their presence

THE CHALLENGE

Advanced attackers thoroughly examine their target environment, as wee as the security measures in place, and discover their vulnerabilities until they find a means to avoid detection. There is no such thing as 100 percent protection because a mix of persistence, talent, and determination can eventually outpace even the most sophisticated detection.

THE APPROACH

CYB3R-X Deception technology places several forms of decoys around the surroundings to entice attackers to come out of concealment and reach out for what appears to be a worthwhile hunt, revealing their existence and previous activity in the process. There are no false positives with CYB3R-X Deception technology since only a live malevolent presence can trigger a deception warning.

DECEIVE ATTACKERS WITH VARIOUS HONEYPOTS: DECOY FILES, PASSWORDS, AND NETWORK CONNECTIONS

CYB3R-X deception security offers a variety of decoys to Detect threats at different phases of the attack’s lifecycle, including data files, credentials, and network connections. The consumption activity-login attempt with a fake password, a connection attempt with RDP or URL, and opening a data file – Activates the alert in each kind.

CYB3R-X cyber deception offers both pre-made decoy files and the opportunity to create your own, all while taking into account the security requirements of your environment.

DETECT ATTACKS AT THE CREDENTIAL THEFT STAGE: DECOY PASSWORDS

For attackers attempting to gain a foothold in a compromised system, passwords are incredibly valuable. Along with possible attackers’ travels, CYB3R-X creates and plans text files containing bogus passwords. An alert is raised if these passwords are used to log in.

DETECT ATTACKS AT THE LATERAL MOVEMENT STAGE: DECOY CONNECTIONS

When seeking to expand compromise across the environment to access organizational resources, internal network shares and RDP connections are extremely attractive. CYB3R-X decoy connections enable the reliable detection of attacker during the hard-to-detect lateral movement stage.

DETECT ATTACKS AT THE DATA ACCESS AND EXFILTRATION STAGE: DECOY DATA FILES

DATA FILES

The attacker’s primary goal is to obtain sensitive data such as IP addresses, personally Identifiable information (PII) and business strategies. CYB3R-X creates and deploys decoy data files and links comparable to what an attacker would look for in the target organization-across the environments endpoints and servers.

DECOY DATA FILE BEACONING

When an attacker views a fake data file at their location, an alert is sent to CYB3R-X, and the file sends the malicious IP address to CYB3R-X.

WATCH CYB3R-X IN ACTION