Interested in learning more about security? SANS Institute InfoSec Reading Room This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express written permission. Deception Matters: Slowing Down the Adversary with illusive networks® Deception is an effective defense against targeted attacks that leverages a false map of cyber assets to boost the odds of finding an adversary early and mitigate overall damage. The adversary is tricked into a cyber rabbit hole of fake systems with fake libraries and DNS servers, counteracting the attacker's every move. In this review, SANS Fellow Eric Cole recounts his review of illusive networks' deception and protection capabilities to show cyber deception in action. Copyright SANS Institute Author Retains Full Rights Deception Matters: Slowing Down the Adversary with illusive networks® A SANS Product Review Written by Eric Cole, PhD May 2017 Sponsored by illusive networks® ©2017 SANS™ Institute Introduction Based on the number of system breaches, the frequency of compromises and the amount of damage being caused, it’s clear adversaries have the advantage over organizations today. It is also evident that what organizations are doing to prevent breaches is not working, and that the amount of money being spent on security has little to no impact on slowing down attackers. One reason they have an advantage is they can easily create an accurate map of their targets and use it to traverse through sensitive systems, all while hiding under routine procedures and familiar traffic patterns. In addition, most defensive approaches are passive, meaning they wait for the adversary to make the first move. TAKEAWAY: To go on the offensive, organizations need to use the same stealth and deception their Deception is a game changer. adversaries do. Instead of making it easy to find rich targets, what if attackers were The fundamental benefit of provided a very realistic but false view of reality, starting with an incorrect road map of deception technology is that it creates an illusion of reality in which the adversary cannot differentiate between the two. the network, applications and vulnerabilities? What if there were traps and pitfalls on every network and every system along that road map? This is the heart of deception: Provide the adversary a false sense of reality and take back the advantage. In this paper, instead of just extolling the benefits and advantages of deception, we explore how to put deception into action with a hands-on review of illusive networks’ deception technology. Using simulated scenarios, we detail how deception works in the real world to give defenders the advantage. In testing this product, we knew deception had been deployed and we actively looked for it. Instead, illusive networks’ technology found us (posing as malicious actors) first and monitored our every move. No matter what adversaries do or try to do, they will inadvertently access and trigger an illusive deception and be monitored from the moment they begin their attack. SANS ANALYST PROGRAM 1 Deception Matters: Slowing Down the Adversary with illusive networks® Benefits of Using Deception If you think you have not been attacked in the past year, you are fooling yourself. Attacks are happening, as multiple SANS surveys point out,1 but you just aren’t looking in the right place. This is why organizations can be compromised for two to three years without detection—adversaries are stealthy, targeted, data-focused and programmed to sneak past most of the current security technology deployed today. Deception offers a twofold advantage: • It provides so many additional targets that it greatly slows down adversaries, making it harder for them to compromise critical resources. • It not only gives the defense more time to respond but allows for detailed monitoring of adversaries to see exactly what they are doing, how they are doing it and how to stop them. TAKEAWAY: With the threat vectors that These two advantages lead to the ultimate goals of security: detecting threats in a timely manner and minimizing the damage. exist today, organizations need Anatomy of a Typical Attack to recognize that they are Although attacks come in many variations and styles, the majority of them start through going to be compromised and endpoints—particularly user endpoints—and then spread laterally through systems, be prepared to quickly detect threats and prevent damage. looking to exploit richer and richer targets. Attackers also routinely attempt remote attacks directly against discovered devices such as DNS servers, web servers and other critical systems. They then steal data and credentials from the devices directly and also use them as launch points to spread laterally inside the network. Phishing and email-based social engineering are the top means by which attacks penetrate organizations, according to the SANS 2017 Threat Landscape Survey.2 In the survey, 75 percent of respondents identified their most impactful threats as initially entering through an email attachment, while 46 percent also witnessed attacks that started with users clicking email links. To compromise the user’s system, the adversary must get the user’s password or exploit a vulnerability or exposure, such as a lack of error checking, an outdated service or an application vulnerability. After the system is compromised, the adversary usually performs further lateral movement, targeting other critical assets similarly across the network to map the network and locate the richest targets, such as Microsoft Exchange or database servers. SANS ANALYST PROGRAM 1 “ Incident Response Capabilities in 2016: The 2016 SANS Incident Response Survey,” www.sans.org/reading-room/whitepapers/incident/incident-response-capabilities-2016-2016-incident-response-survey-37047 2 “ Exploits at the Endpoint: SANS 2016 Threat Landscape Survey,” www.sans.org/reading-room/whitepapers/firewalls/exploits-endpoint-2016-threat-landscape-survey-37157 2 Deception Matters: Slowing Down the Adversary with illusive networks® Benefits of Using Deception (CONTINUED) Beating Them at Their Game Deception systems anticipate these movements and follow, log and interrupt them by turning real endpoints and servers on the network into deception machines when an attacker, attempting any of the aforementioned actions or others, trips the alarm. Meanwhile, the attacker cannot see the real machine, and all of the attacker’s activity is monitored in real time. For example, the bait might be exposing some connection history, credential data, adjacent systems and services in the data that is on the machine the attacker is on. When attackers try to validate the data or connect using the bait, detection turns on, and more and more deceptions—100 times more machines and accounts than actually present, for example—cause the attackers to waste cycles while never knowing they’ve been had. Whatever adversaries try, they will unwittingly access a The deployed deception comprehensively and strategically integrated with our review environment (a virtual host and server architecture), greatly increasing the attack surface for the attacker to fumble around in, as diagramed in Figure 1. deception—and be monitored from the moment an attack begins. Figure 1. Deceptive Attack Surface from the Attacker’s Perspective At any time, security personnel monitoring the actions can lock out the attacker; some can be handled automatically through policy, while activities are logged and saved for future detection and response. SANS ANALYST PROGRAM 3 Deception Matters: Slowing Down the Adversary with illusive networks® Benefits of Using Deception (CONTINUED) The illusive Deceptions Everywhere® Solution Today, deception techniques are quite different than honey pots of the past, in that deceptions are now more widely distributed, much more interactive with the attacker’s actions, and more difficult for attackers to detect. With illusive’s Deceptions Everywhere solution, deception is fully integrated across the entire network at multiple levels, with deception so realistic that it fooled us and is almost impossible to bypass. Intelligent Policy Deceptions Everywhere is an intuitive, easy-to-use management solution that allows deception techniques to be deployed in a scalable manner with minimal overhead. With a few point-and-clicks, we were able to deploy and configure deceptions across the simulated test environment. The solution also learns about and understands the TAKEAWAY: While the power of deception has always been recognized, the problem with widescale deployment stems from three main areas: environment, and then autonomously creates and deploys deception techniques that fit within the environment and are adaptive and updatable. It then automatically deploys deceptive policy on each endpoint and server on the network, leveraging artificial intelligence (AI) to determine if a certain type of deception is appropriate or not on a per-endpoint basis. The result is a deception deployment that is customized to every endpoint and server on the network to look even more realistic to the attacker. The environment is then scalability, manageability monitored for any changes, new deception suggestions are automatically generated, and believability. With illusive and with just one click, the new deceptions are applied to the policy. See Figure 2. networks’ solution, these challenges have been solved. Figure 2. User Names Generated for Deception Servers SANS ANALYST PROGRAM 4 Deception Matters: Slowing Down the Adversary with illusive networks® Benefits of Using Deception (CONTINUED) Architecture The Deception Management System™ (DMS) is responsible for deploying realistic deceptions across the network that adapt to the current environment, and the illusive Trap Server is the server attackers are sent to once alarms are triggered. Because the solution is agentless, it requires no modification to existing systems or installation of In setting up the software for the trap servers to operate. environment, it When we (acting as our mock attacker) attempted to use and access a server by trying to was obvious that log in and access a share, we were sent to the Trap Server. From there, our mock attacker Deceptions Everywhere is not a tool but rather a solution. In using looked at connection history from the registry by dumping the browser database or employing search techniques on disk while using commands built into the operating system. All this activity, which is not usually detected by other security tools, triggered more deceptions and so on. See Figure 3. the product, it was evident that it is a preconfigured plugand-play solution. Network discovery is automatic, network analysis is built in, and it all deploys via a single mouse click. Figure 3. Attacker in Action: illusive networks Adapting to the Adversary The general environment we tested was a virtual machine environment that simulated a real-world environment. Also, we ran though several real-world case studies and capture-the-flag exercises to verify and validate the authenticity of illusive networks’ approach to deception. SANS ANALYST PROGRAM 5 Deception Matters: Slowing Down the Adversary with illusive networks® Review and Use Case Scenarios for Deceptions Everywhere The two areas that cause the biggest issues for CIOs are agent solutions and in-line devices. The illusive networks agentless solution is not in-line and requires no changes to an existing infrastructure. Key Components of Deception In testing the DMS, we took a four-part approach to deploying deception within our mock environment: 1.Analysis. For deception to be effective, it must be realistic and comprehensive, and cover all key areas of a network. If a deception technique is deployed on TAKEAWAY: If attackers can avoid and bypass deceptions, such measures offer little value to the organization because they don’t slow down or catch the adversary. only the DMS or open ports that are not being used by the organization, it is not believable and therefore not effective. When we worked with the solution, the product adapted to and understood the environment with minimal interaction. 2.Deployment. Deceptions are non-impactful on legitimate users and network and system operations, but impactful on the adversary. To slow down the adversary (us), illusive forced us to access multiple deception techniques. 3.Monitoring. From initial compromise to setting up a pivot point to lateral movement, all malicious activities were automatically monitored so proper action could be taken to control the overall damage. The illusive interface was easy to use and allowed us to quickly see the before-and-after analysis of what was deployed. 4.Adaption. IT environments are always changing and adversaries are constantly learning, so deception must constantly be changing and adapting. As new servers are added to an environment, old servers are removed and the network is redesigned. As we made changes to the environment and deployed new legitimate systems in our review, the solution automatically adapted and changed the deception policy that was deployed. SANS ANALYST PROGRAM 6 Deception Matters: Slowing Down the Adversary with illusive networks® Review and Use Case Scenarios for Deceptions Everywhere (CONTINUED) Policy Management The key to this solution is the policy deployment and management, which began with the DMS deployment, as stated earlier. First, it used artificial intelligence and various machine learning techniques to understand the environment, and automatically deployed deception techniques that mirrored and aligned with our review network infrastructure. See Figure 4. Figure 4. Overview of Deception Techniques Deployed in the Test Environment SANS ANALYST PROGRAM 7 Deception Matters: Slowing Down the Adversary with illusive networks® Review and Use Case Scenarios for Deceptions Everywhere (CONTINUED) Then, it automatically monitored and adjusted the deception techniques for each device and server so we could focus on monitoring and tracking the adversary, as shown in Figure 5, and not on installing and maintaining deception patterns. Figure 5. Deceptions Everywhere’s Adaptive Techniques, Tailored to Our Review Environment The screenshot in Figure 5 shows the deception that was deployed and the activity of the adversary. Machine Learning DMS uses machine learning to engage each server or workstation and learn the unique activities of each system on the network. This information was used to generate deceptive policy reflecting the unique characteristics of the review environment. While the solution allows an organization to tune and adjust, it can also be implemented automatically with minimal administrator oversight. Initially we asked illusive’s interface to make all of the decisions, and it effectively deployed realistic deception measures across our mock environment. SANS ANALYST PROGRAM 8 Deception Matters: Slowing Down the Adversary with illusive networks® Review and Use Case Scenarios for Deceptions Everywhere (CONTINUED) For example, in our review, illusive’s DMS learned the conventions and standards of the virtual business and generated unique system names and usernames (targets for attackers) for use with deceptive services and credentials, as shown in Figure 6. Figure 6. Deceptive Server Names that Were Automatically Created We could choose to be involved in setup and customization as much or as little as we wanted. This indicated advancements in maturity of deception technologies and their uses. The policy was then intelligently deployed and managed across the environments so that every endpoint and server had deceptive data that was unique and indistinguishable from the organic data on each machine (so it could not be guessed or detected). SANS ANALYST PROGRAM 9 Deception Matters: Slowing Down the Adversary with illusive networks® Review and Use Case Scenarios for Deceptions Everywhere (CONTINUED) Attacker View To get a better view of the environment through the eyes of the adversary, illusive networks created Attacker View™. The following gives an overview of the “virtual” environment that is created by the DMS for attackers to fall into (see Figures 7 and 8). Figure 7. Pre-deception Attacker View Figure 8. Post-deception Attacker View SANS ANALYST PROGRAM 10 Deception Matters: Slowing Down the Adversary with illusive networks® Review and Use Case Scenarios for Deceptions Everywhere (CONTINUED) When we switched from our view to the Attacker View, we could see the fake network from an attacker’s perspective, and the relationships between systems and resources the attacker would map to. In security, one of the rules of success is offense must inform the defense. We saw the attack vectors, represented by the blue circles. These represent the various deception techniques from extraneous servers, fake credentials and deception shares. The Attacker View shows the deceptive entities deployed in the environment that the attacker will try to take advantage of. By combining any mix of deceptive connection information with real or deceptive credential data, the attacker (us) is attempting to target real servers, but instead we are covertly sent to the deception that is deployed without our knowing it. Figure 9 shows the fake vectors used to attract our attacker. Figure 9. Attacker View Revealing Attack Vectors Attacker View allowed us to understand the real attack vectors by focusing on the risks that actually matter to our environment. SANS ANALYST PROGRAM 11 Deception Matters: Slowing Down the Adversary with illusive networks® Review and Use Case Scenarios for Deceptions Everywhere (CONTINUED) In Figure 10, Attacker View showed us the threat intelligence to make the right decisions around our attacker’s changing tactics. Figure 10. Attacker View Displaying Deceptions While Tracking an Attack The illusive solution acted automatically, adapting with artificial intelligence to changes we added to the environment. Attacker View also allowed us to make on-the-fly changes to the environment and see the impact it had on the adversary in real time. User View In User View, we also explored how Administrative, Domain and Local User credentials naturally interact with the real environment. This impact analysis enabled us, acting as administrators rather than as attackers, to understand where concentrations of activity take place and how credentials are used in order to determine how deceptive and traditional security controls can be applied to the organization. See Figure 11. Figure 11. User View Showing Administrator Privilege Abuse SANS ANALYST PROGRAM 12 Deception Matters: Slowing Down the Adversary with illusive networks® Attack Scenarios We started with Deceptions Everywhere turned off for our initial testing, and began exploiting the review environment and moving laterally across systems without being stopped. Within a short period, we were able to compromise several systems; had it been a real attack, we could have caused damage—for example, captured additional administrative credentials, accessed critical systems or exfiltrated sensitive data. We then performed similar exploitations and movements with illusive turned on and were easily detected by the system. As the attackers, however, we were unable to detect illusive—we became completely lost in the deceptive data without being able to differentiate between what was real and what was deceptive. Deceptions Reviewed While there are many variations, the three main deception methods utilized for this review were: • Share deceptions. Attackers look for shares as an easy way into a system and sensitive information. Additional legitimate-looking shares were created by illusive to slow down our adversary (us), but also provided valuable insight into what the adversary was doing and attack methods. • Credential deceptions. In this part of the review, we launched an elevation-ofprivileges attack, to elevate access from a normal user to a privileged account such as root or admin. When attempting to do this in deceptive accounts, we felt frustration from the perspective of the attacker because it kept sending us down rabbit holes to research further. For the deception administrator it provided an early warning system to show what the adversary (us) was doing. • File deceptions. We wanted to access critical data, which is in files. With deception deployed, this became almost an impossible task because it was difficult to distinguish between legitimate data and fake data, leading us to spend significant time harvesting fake information of little to no value. SANS ANALYST PROGRAM 13 Deception Matters: Slowing Down the Adversary with illusive networks® Attack Scenarios (CONTINUED) Lost in the Deception With deceptions now deployed, it was time to repeat our exploitation of the environment using the fundamental steps to gain access. Along the way, we were met with various deceptions, as described in Table 1: Table 1. Malicious Actions and Deceptions Malicious Actions Taken Deceptions Deployed Reconnaissance All deceptions Scanning Share deceptions Exploitation • Pivot points Credential deceptions • Internal reconnaissance Share deceptions • Internal scanning File deceptions • Data exploitation File deceptions Creating back doors All deceptions Covering our tracks All deceptions Being a little skeptical, we were overly confident launching our attacks in the new environment. Convinced we had identified a path to bypass the deception, we spent time continuing our attack on what we thought were the legitimate systems. However, when we switched and checked the Attacker View, we were embarrassed: Not only was our analysis wrong, but we were caught red-handed by the illusive system. See Figures 12 and 13 to view illusive detecting our port scanning activities. SANS ANALYST PROGRAM 14 Deception Matters: Slowing Down the Adversary with illusive networks® Attack Scenarios (CONTINUED) Even though we knew the system was deployed and knew how the system Figure 12. Illusive User View Detecting Our Port Scan worked, this advantage proved no match for illusive networks. Figure 13. Illusive Forensic Analysis of Port Scan Attempt SANS ANALYST PROGRAM 15 Deception Matters: Slowing Down the Adversary with illusive networks® Attack Scenarios (CONTINUED) Tracking and Metrics A common shortcoming of many security solutions is that they promise great things but lack a way to track overall effectiveness. A valuable component of illusive’s solution is provision of a variety of metrics to track the benefit of the deployed deceptive measures. Taking deception to the See Figure 14. next level of maturity, metrics enable largescale management of deception measures. The metrics revealed weaknesses and needed improvements, and informed us where to tune the deception measures to maximize the benefit of the illusive solution. Figure 14. Overall Dashboard Showing the Metrics for the Deception The illusive DMS platform revealed that our ability to detect an advanced attacker improved over time during our review. Attack surface information from the perspective of the adversary—such as number of lateral movement targets per endpoint or number of lateral movements to reach domain admin credential—was also provided. SANS ANALYST PROGRAM 16 Deception Matters: Slowing Down the Adversary with illusive networks® Conclusion: Future of Deception With many persistent, targeted attacks, prevention is in many cases postponing the inevitable, because the adversary will eventually get in. Therefore, security is going to be all about timely detection and damage control. Setting up a virtual world of confusion clearly slows down attackers and makes their job more difficult, but it is often forgotten that deceptions serve no legitimate TAKEAWAY: While deception was originally about slowing down the adversary, in the future it will move toward functioning as an early detection tool. purpose, meaning no one should be connecting to these deceptions. If that occurs, the probability of an adversary touching at least one of the deceptive measures is very high, which allows for early detection capability. The illusive solution provides a comprehensive way to deploy deception across an environment with minimal to no human interaction. The deception is highly effective and covert, making it virtually undetectable when deployed within an existing environment. Even the most skilled adversary would access a deception technique, allowing for early detection of an attack. Expect deception technology to gain wider use and become more tailored to and focused on an organization’s critical assets. If the databases’ servers, the applications themselves and even the tables in the databases all have deception, it raises the difficulty of attacks to a whole new level of complexity. SANS ANALYST PROGRAM 17 Deception Matters: Slowing Down the Adversary with illusive networks® About the Author Eric Cole, PhD, is a SANS faculty fellow, course author and instructor who has served as CTO of McAfee and chief scientist at Lockheed Martin. He is credited on more than 20 patents, sits on several executive advisory boards and is a member of the Center for Strategic and International Studies’ Commission on Cybersecurity for the 44th Presidency. Eric’s books include Advanced Persistent Threat, Hackers Beware, Hiding in Plain Sight, Network Security Bible and Insider Threat. As founder of Secure Anchor Consulting, Eric puts his 20-plus years of hands-on security experience to work helping customers build dynamic defenses against advanced threats. Sponsor SANS would like to thank this paper’s sponsor: SANS ANALYST PROGRAM 18 Deception Matters: Slowing Down the Adversary with illusive networks® Last Updated: July 31st, 2017 Upcoming SANS Training Click Here for a full list of all Upcoming SANS Events by Location SANS Hyderabad 2017 Hyderabad, IN Aug 07, 2017 - Aug 12, 2017 Live Event SANS Boston 2017 Boston, MAUS Aug 07, 2017 - Aug 12, 2017 Live Event SANS Prague 2017 Prague, CZ Aug 07, 2017 - Aug 12, 2017 Live Event SANS New York City 2017 New York City, NYUS Aug 14, 2017 - Aug 19, 2017 Live Event SANS Salt Lake City 2017 Salt Lake City, UTUS Aug 14, 2017 - Aug 19, 2017 Live Event SANS Chicago 2017 Chicago, ILUS Aug 21, 2017 - Aug 26, 2017 Live Event SANS Adelaide 2017 Adelaide, AU Aug 21, 2017 - Aug 26, 2017 Live Event SANS Virginia Beach 2017 Virginia Beach, VAUS Aug 21, 2017 - Sep 01, 2017 Live Event SANS San Francisco Fall 2017 San Francisco, CAUS Sep 05, 2017 - Sep 10, 2017 Live Event SANS Tampa - Clearwater 2017 Clearwater, FLUS Sep 05, 2017 - Sep 10, 2017 Live Event SANS Network Security 2017 Las Vegas, NVUS Sep 10, 2017 - Sep 17, 2017 Live Event SANS Dublin 2017 Dublin, IE Sep 11, 2017 - Sep 16, 2017 Live Event Data Breach Summit & Training Chicago, ILUS Sep 25, 2017 - Oct 02, 2017 Live Event SANS Baltimore Fall 2017 Baltimore, MDUS Sep 25, 2017 - Sep 30, 2017 Live Event Rocky Mountain Fall 2017 Denver, COUS Sep 25, 2017 - Sep 30, 2017 Live Event SANS SEC504 at Cyber Security Week 2017 The Hague, NL Sep 25, 2017 - Sep 30, 2017 Live Event SANS London September 2017 London, GB Sep 25, 2017 - Sep 30, 2017 Live Event SANS Copenhagen 2017 Copenhagen, DK Sep 25, 2017 - Sep 30, 2017 Live Event SANS DFIR Prague 2017 Prague, CZ Oct 02, 2017 - Oct 08, 2017 Live Event SANS Oslo Autumn 2017 Oslo, NO Oct 02, 2017 - Oct 07, 2017 Live Event SANS AUD507 (GSNA) @ Canberra 2017 Canberra, AU Oct 09, 2017 - Oct 14, 2017 Live Event SANS October Singapore 2017 Singapore, SG Oct 09, 2017 - Oct 28, 2017 Live Event SANS Phoenix-Mesa 2017 Mesa, AZUS Oct 09, 2017 - Oct 14, 2017 Live Event Secure DevOps Summit & Training Denver, COUS Oct 10, 2017 - Oct 17, 2017 Live Event SANS Tysons Corner Fall 2017 McLean, VAUS Oct 14, 2017 - Oct 21, 2017 Live Event SANS Tokyo Autumn 2017 Tokyo, JP Oct 16, 2017 - Oct 28, 2017 Live Event SANS Brussels Autumn 2017 Brussels, BE Oct 16, 2017 - Oct 21, 2017 Live Event SANS SEC460: Enterprise Threat San Diego, CAUS Oct 16, 2017 - Oct 21, 2017 Live Event SANS Berlin 2017 Berlin, DE Oct 23, 2017 - Oct 28, 2017 Live Event SANS Seattle 2017 Seattle, WAUS Oct 30, 2017 - Nov 04, 2017 Live Event SANS San Diego 2017 San Diego, CAUS Oct 30, 2017 - Nov 04, 2017 Live Event SANS San Antonio 2017 OnlineTXUS Aug 06, 2017 - Aug 11, 2017 Live Event SANS OnDemand Books & MP3s OnlyUS Anytime Self Paced
© Copyright 2026 Paperzz