Deception in real-world situations

04/09/2019

A few days ago it was reported that Israel’s Defense Forces has used deception against Hezbollah, making the latter believe its strike against the IDF was successful and caused several injured soldiers.

https://www.youtube.com/watch?v=fNEwZ_2wFEc
The attack on IDF’s vehicle from another perspective (from Ynet)

It’s not the first time deception has been used to trick enemies and in other dangerous situations, here are some examples…

#1 – Animal kingdom deception

From animals that blend into their environment and can hide in plain sight to animals that mimic harmful ones to deter predators to animals that fake death to prevent capture, the animal kingdom is filled with different deception techniques used for preservation and as they rely on the behavior and limitations of their predators.

 

#2 – D-Day

D-Day is a classic example in modern history to utilizing deception in warfare as described by Sun Tzu in “The Art of War” and gaining the upper hand, as the allied forces fooled the Nazis into believing they will attack from one location to actually attacking from another, eventually leading to the west’s victory in WWII.

#3 – Network deception

The concept of honeypots to identify cyber attacks has existed for a long time but only in the last few years it has been taken to the next level by luring attackers inside the organization’s network to a safer place where the attack can be identified and controlled. By using decoys, lures, breadcrumbs and honeytokens, network deception vendors make it tougher for attackers and insiders to successfully penetrate the organization.

#4 – Endpoint deception

But unlike network deception, endpoint deception works differently, utilizing the same techniques and defenses used by threat actors and malware to prevent advanced attacks in the first place. Deceptive Bytes’ solution makes regular computers look like environments that deter malware such as sandbox systems (which a staggering 98% test for and evade, according to research by Security Week from last year).

Additionally, the solution proactively continues the deception during the entire Endpoint Kill Chain by responding dynamically to threats as they evolve, based on the detected stage of compromise, and changes their outcome. Which is one of the reasons we were recognized in Gartner’s 2019 report: “Cool Vendors in Security Operations and Threat Intelligence”.

 

If you’d like to learn more about Deceptive Bytes and how we help organizations prevent advanced threats, just contact us or request a demo

Contact Us

Don’t Miss a Thing

Sign up today and we’ll send an email when new posts come out.

We collect and use this information in accordance with our privacy policy.

Related content

Deceptive Bytes mentioned in Gartner’s research on Top Use Cases in Preemptive Cyber Defense

Avi Lamay

18/11/2024

Receive high-fidelity alerts as threats are forced to uncover their presence when checking the environment prior to...

Case study – preventing Malgent trojan horse

12/09/2024

Receive high-fidelity alerts as threats are forced to uncover their presence when checking the environment prior to...

The Role of Large Language Models in Enhancing Ransomware and Malware Threats

22/08/2024

Receive high-fidelity alerts as threats are forced to uncover their presence when checking the environment prior to...

Skip to content