Deception Technology: A deceivingly simple solution to complex threats

 

Deception Technology: A deceivingly simple solution to complex threats

Written by: Marc Feghali, Co-founder and VP of Product Management – You have almost certainly heard about Deception Technology for cybersecurity, but may be wondering what it will take to implement it in your environment. It seems complex. How can you possibly deploy it in your own diverse, distributed, and complicated network? No doubt you have the battle scars attesting to the challenge of deploying new security controls on your network.  So how do you proceed?

To illustrate our point on simplicity, this enterprise case study will show, even with a larger installation, that deception is exceptionally easy to prepare, deploy, and operate. Here is an example of a deployment that a current customer of ours implemented.

Goal: Deploy deception inside the network to cover network-based attacks, credential-based attacks, attacks against Active Directory, detect Man-the-Middle attacks while providing network visibility across all locations.

Integrate seamlessly with existing EDR, NAC, and SIEM solutions to automatically quarantine infected systems

The Network: 100 local VLANs/subnets distributed between access networks and a hybrid datacenter. 200 remote locations with up to 8 VLANs each and a data center. 10,000 employees spread across multiple locations.

The Solution: 1 Attivo BOTsink® 5000 series, ThreatDirect™, ThreatStrike™ Deceptive Credentials and ThreatPath™

To achieve their objectives, the customer deployed an Attivo BOTsink 5000 series server on their local network and ThreatDirect in each remote location to get coverage of their remote offices and datacenter. Using this configuration, the customer blanketed their entire local and remote network environment with full visibility and deception on all of their VLANs and subnets. It took less than a day to fully deploy the system at HQ with a rolling thunder deployment covering the endpoints and remote locations, enabling the customer to stick to scheduled maintenance windows.

The Deployment Process

The customer started by mounting their BOTsink appliance (it can deploy as a physical appliance, virtual appliance, or a cloud instance) and connecting it to  a trunk port on their network. Once on the network, the BOTsink server automatically identified connected VLANs and subnets and requested IP addresses in each. Alternatively, the customer could have chosen to assign IP addresses manually across the desired VLANs.

Using the ThreatStrike platform on the endpoints, a BOTsink server generates, manages, and updates decoy applications and cloud credentials to help guard against targeted attacks. In this case, the customer deployed ThreatStrike to their endpoints, servers, and in Active Directory. The decoy credentials are hidden from normal users. Any use  of them generates a high fidelity alert identifying the compromised system, stolen credentials used, and all of the attack details.

To support their remote locations and data center, the customer deployed ThreatDirect at each location. This gave them coverage of the remote VLANs and subnets, extending the BOTsink server capabilities to those sites without losing functionality. Through ThreatDirect, the customer gained visibility into their remote locations, meaning any attacker would have to traverse a deception minefield in the remote sites, not just on the headquarters network.

The BOTsink was also configured to automatically quarantine an attacker by leveraging their existing security infrastructure. In practice, once an attacker engages with the deception environment, the BOTsink contains the attack, collects TTPs and IOCs, and shares this intelligence with other security solutions to expedite remediation. The Attivo ThreatDefend™ platform has extensive integrations with NAC, EDR, endpoint solutions, SIEM, firewalls, and gateways to make this automatic and simple.

With Attivo Networks, implementing deception is a straight forward proposition that dramatically reduces dwell time and mean time to remediation.  It’s versatile enough to fit into any environment, it is highly scalable, and is extremely easy to deploy, manage, and operate. In today’s threat landscape, it really can’t get much easier than this to gain the upper hand against attackers. To learn more about the ThreatDefend platform, visit our product page.

No Comments

Post A Comment

two × one =