DECEPTION
Advanced Deception Technology is used to entice attackers to reveal their presence
THE CHALLENGE
Advanced attackers thoroughly examine their target environment, as wee as the security measures in place, and discover their vulnerabilities until they find a means to avoid detection. There is no such thing as 100 percent protection because a mix of persistence, talent, and determination can eventually outpace even the most sophisticated detection.
THE APPROACH
CYB3R-X Deception technology places several forms of decoys around the surroundings to entice attackers to come out of concealment and reach out for what appears to be a worthwhile hunt, revealing their existence and previous activity in the process. There are no false positives with CYB3R-X Deception technology since only a live malevolent presence can trigger a deception warning.
DECEIVE ATTACKERS WITH VARIOUS HONEYPOTS: DECOY FILES, PASSWORDS, AND NETWORK CONNECTIONS
CYB3R-X deception security offers a variety of decoys to Detect threats at different phases of the attack’s lifecycle, including data files, credentials, and network connections. The consumption activity-login attempt with a fake password, a connection attempt with RDP or URL, and opening a data file – Activates the alert in each kind.
CYB3R-X cyber deception offers both pre-made decoy files and the opportunity to create your own, all while taking into account the security requirements of your environment.
DETECT ATTACKS AT THE CREDENTIAL THEFT STAGE: DECOY PASSWORDS
For attackers attempting to gain a foothold in a compromised system, passwords are incredibly valuable. Along with possible attackers’ travels, CYB3R-X creates and plans text files containing bogus passwords. An alert is raised if these passwords are used to log in.
DETECT ATTACKS AT THE LATERAL MOVEMENT STAGE: DECOY CONNECTIONS
When seeking to expand compromise across the environment to access organizational resources, internal network shares and RDP connections are extremely attractive. CYB3R-X decoy connections enable the reliable detection of attacker during the hard-to-detect lateral movement stage.
DETECT ATTACKS AT THE DATA ACCESS AND
EXFILTRATION STAGE: DECOY DATA FILES
DATA FILES
The attacker’s primary goal is to obtain sensitive data such as IP addresses, personally Identifiable information (PII) and business strategies. CYB3R-X creates and deploys decoy data files and links comparable to what an attacker would look for in the target organization-across the environments endpoints and servers.
DECOY DATA FILE BEACONING
When an attacker views a fake data file at their location, an alert is sent to CYB3R-X, and the file sends the malicious IP address to CYB3R-X.