August 5, 2016
-
Joe Franscella
,

Turn the Tables on Cyber-crime With the Modern Honey Network

<p>If your network is hacked, you will have a multitude of reactions, including an urge to respond in kind. Technically hacking the hackers isn’t legal, but deceiving intruders is! Advanced persistent threats are targeted at those who have information of value to the hacker. Scrubbing away malware is a simple process one can move on from, but if someone is infiltrating your files, reading your internal emails, etc. you cannot simply close the vulnerability and go about business as normal. Surely the threat actors will find another way back in if you don’t discover who they are. There are varying opinions about fighting hackers with their own tools. Using deception in a legal fashion, such as with the Modern Honey Network, is preferable.</p><p>Hackers routinely use deception tactics to victimize private individuals and enterprises alike. Bots are used to scan for vulnerabilities and to crack login credentials. Once they find a way in they may spy on you indefinitely. Most cyber-crime is motivated by financial gains, either by directly stealing from accounts, or working as a hacker for hire. A black market exists where hackers sell the stolen data they’ve mined from victims. It’s scary to think of other motivations: revenge or deviance. Voyeurs and “sextortionists” can buy the tools to <a href="http://webcache.googleusercontent.com/search?q=cache:SVAguNiWmnUJ:www.welivesecurity.com/2015/04/21/webcam-hacking/+&amp;cd=13&amp;hl=en&amp;ct=clnk&amp;gl=us" target="_blank">spy on private individuals for a paltry $40</a>.</p><p>When you set up a deception trap <a href="https://www.anomali.com/blog/the-importance-of-forming-a-modern-honeypot-network">using the Modern Honey Network</a>, you make a space for hackers to incriminate themselves without endangering your actual network. It’s not a substitute for your firewall and anti-malware applications. It supplements them with contextual intelligence.</p><p>What info can you learn about hackers from <a href="https://www.sans.org/security-resources/idfaq/what-is-a-honeypot/1/9" target="_blank">a honeypot</a>? That depends on where they are placed. Using honeypots outside your firewall will gather info about bots, malware attempts, and logs can be analyzed for unusual visitor behavior. When placed inside your network, you can learn of successful breaches, but also for internal threats. Using multiple honeypots will help protect your network by alerting you of behavior anti-malware software cannot detect. You need to be aware of events like hackers posing as legit users and employees abusing login credentials or accessing files in a pattern indicative of an info leak.</p><p>What makes the Modern Honey Network special? Two things – <a href="https://www.anomali.com/blog/what-open-source-threat-intelligence-means-for-hackers">it’s an open source platform</a>. The base code for a setting up a deception trap is free to download. Secondly, indicators of compromise are added to the growing library of threat intelligence used to inform future alerts.</p><p>Using intelligence from the Modern Honey Network is preferable over switching from defense to offense, which might offend and draw the ire of criminals and mischief-makers. Actually intruding into the source of malware, bots, and phishing servers to investigate them can work or backfire catastrophically. For these reasons, it’s best to deceive hackers into revealing themselves, then involve law enforcement.</p><p>Some reasons to stick to legal and ethical means of fighting hackers:</p><ul><li>Two wrongs don’t make a right, so hacking back in the literal sense is still illegal. Your enterprise could be held liable or individuals can be in legal trouble.</li><li>It’s a slippery slope. Once you don the “black hat” and acquire the tools to penetrate cyber criminals’ networks, you have the tools to attack others. Wielding such a powerful tool against your competitors can be a temptation. Someone in your company may abuse it even if you’d agreed not to, and again you’d still be liable.</li><li>You’ve got the wrong guy! It’s possible that your counter-attack leads you up a false trail to another victim’s computer, not your enemy’s.</li><li>You may be out of your league. Established successful hackers have more experience and resources. You don’t know how deep into your system the invaders went, and may not withstand a counter-counter attack. If they are comfortable with stealing your info, they surely have no qualms with taking revenge or making an example of you by escalating their attacks.</li></ul><p>Using technology like the threat intelligence gathered by the Modern Honey Network to fight back is your responsibility to your customers, employees, and other stakeholders (students, patients, etc.) who have entrusted you with their personal data, financial information, and their livelihoods.</p><p>Download the Security Intelligence and Information Sharing Strategy whitepaper and learn more about the new approach to threat intelligence using trusted collaboration.</p><p><span class="hs-cta-wrapper" id="hs-cta-wrapper-79cc3352-61a2-44b7-8b7c-6f25d759918c"><span class="hs-cta-node hs-cta-79cc3352-61a2-44b7-8b7c-6f25d759918c" data-hs-drop="true" id="hs-cta-79cc3352-61a2-44b7-8b7c-6f25d759918c" style="visibility: visible; display: block; text-align: center;"><a class="cta_button" cta_dest_link="{page_3458}" href="https://cta-service-cms2.hubspot.com/ctas/v2/public/cs/c/?cta_guid=4f082f1c-a704-4df4-a627-a030c2f8e351&amp;placement_guid=79cc3352-61a2-44b7-8b7c-6f25d759918c&amp;portal_id=458120&amp;redirect_url=APefjpE8-E-v1l3BarUm24r7sKcOMGI4JHFW-CQY_TYcQQVplrGZ-ljzerJ95uDoeEL66aIngVCkKyH1g4350j9hZq-LzdYPAU4aO426kJiOR8hOz2ZJ7dbX0hWyQZDYx-Ll3t0ivEuNECV-xwo8fzIBHYKiwwBT9a8VPtI0upDQ9pPYIZp_QIQH218ugiAhlNQMbdfi2gvvah1VZg3OyvBWwJ1zuinX8SKCpg55DFt8ci1NH447m3yiAl_RB-wPhdXFAOg3ZxEcenkUhHRhrh_OgYcegtUaU2Lf9vBL2Mp1mQlIczGLUaI1neRfSf-WsML5BDP26IghGVplbPvaamqQCYXlszxpyQ&amp;hsutk=2767d93d6471d657e0c9f660e4b58ef8&amp;utm_referrer=https%3A%2F%2Fblog.anomali.com%2Fturn-the-tables-on-cyber-crime-with-the-modern-honey-network&amp;canon=https%3A%2F%2Fblog.anomali.com%2Fturn-the-tables-on-cyber-crime-with-the-modern-honey-network&amp;__hstc=41179005.2767d93d6471d657e0c9f660e4b58ef8.1456736058655.1478822660171.1478831861868.179&amp;__hssc=41179005.56.1478831861868&amp;__hsfp=1335165674" id="cta_button_458120_4f082f1c-a704-4df4-a627-a030c2f8e351" style="margin: 20px auto;" target="_blank" title="Download Here">Download Here </a> </span> <script charset="utf-8" src="https://js.hscta.net/cta/current.js"></script> <script type="text/javascript">hbspt.cta.load(458120, '79cc3352-61a2-44b7-8b7c-6f25d759918c', {});</script> </span></p>

Get the Latest Anomali Updates and Cybersecurity News – Straight To Your Inbox

Become a subscriber to the Anomali Newsletter
Receive a monthly summary of our latest threat intelligence content, research, news, events, and more.