July 18, 2016
-
Joe Franscella
,

The Accuracy of the Honeypot Network

<p>Discovering evidence that someone is probing your network for weaknesses before they successfully attack makes all the difference. You will learn a lot about your enemies and what they are seeking after your network has been infected or your data has been stolen, copied, or sabotaged. But there is no reason to go through that when it’s avoidable, by using a honeypot network.</p><p>Hosting a honeypot network allows you to discover threat actors in a low or no-stakes situation. Honeypots can take many forms, but the principle applies universally that if an unused area of your network sees traffic, that traffic is problematic. Data about <a href="http://www.darkreading.com/attacks-breaches/top-15-indicators-of-compromise/d/d-id/1140647" target="_blank">indicators of compromise</a> (IOCs) is turned into intelligence only after being scrutinized for contextual meaning. Studying honeypot data critically, using both software analytics and human reasoning, informs you of the threats as they exist within the context of your situation.</p><p>How do you know if the intelligence gathered by a honeypot will be useful? First, understanding how they work elucidates what a clever concept they are. Secondly, results depend largely on using them skillfully, as with any tool.</p><p>Such as burglars “case” a target before taking what they want, cyber-criminals begin attacks with smaller invasive tactics. Examining the “evidence” found in a honeypot reveals much about the motives, means, and methods of threat actors. They collect data about the source of traffic, malware used, and which files were accessed. Same as being “cased” by criminals in the physical world, knowing how they intend to enter and what they are going after gives you valuable insight into their means and motives to better protect yourself. Low interaction honeypots are less convincing but are also a lower-stakes venture. High interaction honeypots allow the intruder deeper into your network. You learn more but you risk more, too. Using a <a href="https://www.anomali.com/blog/create-an-army-of-raspberry-pi-honeypots-on-a-budget">multitude of honeypots</a> together is a good strategy for covering your bases.</p><p>It’s possible to compare the IP addresses and other evidence against a log of other known threat actors to help identify the source of the traffic. Comparing the indicators of compromise you’ve discovered against criminal profiles collected by others puts the information in context. The <a href="https://www.anomali.com/blog">Modern Honey Network</a> is a newer novel approach to hosting a honeypot and leveraging all of the IOCs collected, resulting in better identification of cyber-criminals. Adding in your own traffic logs further develops the active bank of hacker profiles, and with MHN built tools you can share threat data securely.</p><p>To collect accurate threat intelligence, the honeypot must appear to be legitimate. Granted there may be some value in hackers discovering you have a honeypot but it may also be a deterrent. If they identify all of the traps on your network, they can avoid them. Even worse, they could feed misinformation to the honeypot in hopes of throwing you off their scent.</p><p>While planning attacks, hackers study popular honeypots to better identify them. The more nuanced and customized your honeypot network, the less likely the intruder will recognize it. Once identified, it’s recommended to rearrange your honey assets to be hidden again. Do not be discouraged when a honeypot is discovered. Rather, you should reconfigure it and set it up again, as you would with a sprung mousetrap.</p><p>To get accurate info from your honeypot network, you cannot simply set out a singular sandbox environment and hope all of your enemies leave digital footprints. Each potential threat, random or targeted, needs its own unique deception trap. For example, if you’re watching out for spam emails, set up an unused email account; whereas if you’re concerned about internal employee espionage, set up some enticing phony R&amp;D folders.</p><p>Use of deceptive tactics against attackers is catching on. Early adopters set up a honeypot network to protect valuable assets like financial transactions and large caches of login credentials. Now the tech is more available. Studies predict <a href="http://www.darkreading.com/attacks-breaches/deceit-as-a-defense-against-cyberattacks/d/d-id/1322453" target="_blank">by 2018, 10% of enterprises</a> will be deploying honeypots.</p><p>Make a “greater good” commitment to the practice of sharing threat intelligence with other organizations in your industry vertical. Learn the obstacles to information sharing, the standards for the exchange of information and best practices for information sharing in this free download.</p><p><span class="hs-cta-wrapper" id="hs-cta-wrapper-bf271459-62f1-402a-848f-8053e3969477"><span class="hs-cta-node hs-cta-bf271459-62f1-402a-848f-8053e3969477" data-hs-drop="true" id="hs-cta-bf271459-62f1-402a-848f-8053e3969477" style="visibility: visible; display: block; text-align: center;"><a class="cta_button" cta_dest_link="{page_3453}" href="https://cta-service-cms2.hubspot.com/ctas/v2/public/cs/c/?cta_guid=18fe26c8-b204-4974-b043-7029208f22e1&amp;placement_guid=bf271459-62f1-402a-848f-8053e3969477&amp;portal_id=458120&amp;redirect_url=APefjpEAnFma8sg3F2BYj9TxrqHe7pC7xTuj2iEoLdDI45xUn3wfrmWnke3svrJvw3a8Uzs6JfAuPqjyCn0UUttqD4tvwnQ9fdkTLnYONhrCJKwwNsbLxp6aqujdojH0ANR1huHN4RaS7HxOpPi3dEUCBsGG5dgiOC_jDT7dpUlkWqCooed8bH3lcnEt7CKHjorV0ID-Yi_5lBEObMJTKQLE72CF2XEC4b4_5qZvg4YonUTyLdzX18xo1W_Ha3yEchCd6g0X0QB3E-wzPcIiJhpFDDiY4KYKbN3xQ6NbGxYAjNxGRgxgGSJFZ4SdKoGGkpw_EL67hi1LVlWmoGyxNkYwWfJR5O2zOw&amp;hsutk=2767d93d6471d657e0c9f660e4b58ef8&amp;utm_referrer=https%3A%2F%2Fblog.anomali.com%2Fthe-accuracy-of-the-honeypot-network&amp;canon=https%3A%2F%2Fblog.anomali.com%2Fthe-accuracy-of-the-honeypot-network&amp;pageId=4233629689&amp;__hstc=41179005.2767d93d6471d657e0c9f660e4b58ef8.1456736058655.1478822660171.1478831861868.179&amp;__hssc=41179005.79.1478831861868&amp;__hsfp=1335165674" id="cta_button_458120_18fe26c8-b204-4974-b043-7029208f22e1" style="margin: 20px auto;" target="_blank" title="Download Here">Download Here </a> </span> <script charset="utf-8" src="https://js.hscta.net/cta/current.js"></script> <script type="text/javascript">hbspt.cta.load(458120, 'bf271459-62f1-402a-848f-8053e3969477', {});</script> </span></p>

Get the Latest Anomali Updates and Cybersecurity News – Straight To Your Inbox

Become a subscriber to the Anomali Newsletter
Receive a monthly summary of our latest threat intelligence content, research, news, events, and more.