Tag: deception

  • Deception Centric Defense Against Ransomware

    Team Acalvio It is estimated that in 2017, damages due to the ransomware will exceed $5 billion.[8]B When successful, ransomware can not only infect the endpoint, it can also spread across the network extending its exploit. The initial versions of ransomware like CryptoWall, CryptoFortess, DMA-Locker, CryptoLuck used mapped and unmapped drive for lateral movement. B […]

  • Meeting HIPAA Requirements with Acalviobs Deception 2.0 Solution, ShadowPlex

    Meeting HIPAA Requirements with Acalviobs Deception 2.0 Solution, ShadowPlex

    The recent ransomware attacks such as Wannacry have highlighted the need for robust security controls in healthcare firms.B These organizations are subject to HIPAA/HITECH compliance requirements, but unfortunately many firms just seem them as a distraction. B This is a big mistake: The controls typically implemented for HIPAA/HITECH shouldnbt be regarded as useless bcheck the […]

  • Donbt be a sitting duck. Make your BreadCrumbs & Lures Dynamic!

    Donbt be a sitting duck. Make your BreadCrumbs & Lures Dynamic!

    BreadCrumbs and Lures are very critical components of any deception based architecture. As the name suggests, breadcrumbs and lures aid to divert a threat a threat actor (an individual or malware) to deception sensors. The moment the deception sensor gets tripped, instead of blocking the multi-stage threat, the threat actor is allowed to execute its […]

  • Ransomware: Catch me if you can.

    Ransomware: Catch me if you can.

    Ransomware demand in 2016 was around a billion dollars[1]. B WannaCry[3] was the recent ransomware campaign that spread across 150 countries affecting 200,000 users. It is estimated that in 2017[2], damages due to ransomware will exceed $5 billion. Modern defenses make use of virtualized environments or machine learning algorithms to ensnare the threat actor.B This […]

  • The Industrybs First bDeception 2.0 for Dummiesb Book

    The Industrybs First bDeception 2.0 for Dummiesb Book

    Since the dawn of time,B deception has been used in nature in various forms as a successful survival strategy and has played an important role in the physical and behavioral adaptations of all organisms.B Humankind, with its higher cognitive ability, has successfully adapted deception to warfare, as a powerful mechanism toB draw an enemy into […]

  • How to outfox Shamoon? Put Deception to work!

    How to outfox Shamoon? Put Deception to work!

    Acalvio Threat Labs Shamoon is one of the critical threats that has been able to penetrate traditional defenses successfully not once, twice, but thrice – in 2012, 2016 and 2017. B The main purpose of Shamoon Threat Actor was the destruction of the endpoint computers by wiping the Master Boot Record (MBR), rendering them unusable. […]

  • If Deception is so Great, Why Isn’t Everyone Doing it?

    Using deception as a threat detection solution would seem to be a no-brainer: B It can detect malware at multiple points in the kill chain, with no false positives and no modifications or impact to production systems. B Everyone must be doing it you would think. B However, the reality is that deception isnbt widely […]

  • Deception in Depth: A Novel, Effective Way to Mitigate Attacks from the Inside

    Recently, an interesting survey pointed out that malware attacks are goingB fileless.B In some cases, this means even using an internal employee to help with the process. For example, the attack on the Bank of Bangladesh and you quickly realize that advanced attackers continue their rapid evolution from amateur to professional.B What can enterprises do? […]

  • Honeypots are dead! Long live Honeypots (Part4b&The Crystal Ball)

    Self healing system capabilities, specifically analysis and intelligence shared between Acalvio instances so you end up with a worst case scenario of only company1 getting hit, companies 2,3,4 have automatically learned from company1. IoT, V2V, V2X etc. This technology, unlike traditional honeypots is NOT contained solely to the standard enterprise environments. Your data is NOT, […]

  • Honeypots are dead! Long live Honeypots (Part3b&The Futurebs Just Changed)

    In days gone past (and arguable in the current timeline we occupy) I would simply launch from the existing machine like an Olympic diver off the high board and go about my merry way for an bindustrial averageb of 200 days or thereabouts before ANYONE even knows or detects my presence. Thatbs 200 days of […]