More traps = less risk | TrapX
Reportage | 08.11.2021
Decoys and traps have been used for years as ways to attract attackers to find out who they are, what methods they use, and how to respond to their doing without endangering real assets.
By posing as a server or other valuable network asset, the trap lures attackers.
In fact, the decoy uses bogus data and she is isolated from the network. Traps are not security tools that actively scan real network assets and collect massive amounts of real-world activity data. On the contrary, baits are passive. They do not collect data for every network asset. Instead, they engage attackers and trick them into disclosing information that can be used against them.
The concept of a cyber trap dates back to the first true computer hacking detailed in The Cuckoo's Egg - a book by Clifford Stoll. It tells the story of Stoll's hunt in the 1980s for a hacker who hacked into a computer at Lawrence Berkeley National Laboratory (LBNL). With the help of Tymnet and various government agencies, Stoll discovered that the invasion was originating from a university in Germany by satellite phone and was targeting military bases to learn about the Strategic Defense Initiative (SDI) or the Star Wars project. To convince the hacker to reveal himself, Stoll created a primitive decoy - a bogus department at LBNL with a fake SDInet account loaded with realistic and interesting files. This prompted a hacker to attack this system. The attack was tracked down and the hacker was brought to justice.
Whether it's sports or war, the skill of outsmarting your opponent is critical to any successful strategy.
TrapX disguises real assets with decoys, traps, forcing the attacker to make mistakes. Automatically set traps significantly reduce the risk to real assets. disguises real assets with decoys, traps, forcing the attacker to make mistakes. Automatically set traps significantly reduce the risk to real assets.
One trap reduces the chance of a negative impact by 50%, two traps by 66%, and so on.