Cyber ​​forces use honeypots to scrutinize and trap cybercriminals: how does it work?


Alexander Boero

June 30, 2023 at 08:00

2

honeypot honeypot © Shutterstock for Clubic

© Shutterstock for Clubic

The French scale-up Tehtris announces that it has deployed a new generation of honeypots (honeypots), computer decoys that deceive hackers.

Cybercriminals are sometimes very imaginative in making victims, but like the sprinkler being watered, they can also be tricked. And companies fighting against cyber espionage and cyber sabotage are gradually acquiring ever more efficient tools. This is the case of the French company Tethris, which announced the deployment of a global network of nomadic honeypots (AMTD), these traps which aim to attract malicious activities from the web in order to identify and neutralize them.

Decoys that were hitherto very quickly spotted by pirates

As you will have understood, these honeypots or computer lures can be very effective. Historically, it may be a false computer inserted into a network, which contains sensitive data that is also fictitious and which may well receive certain attacks. These decoys then allow threat intelligence actors (known as Threat Intelligence) to be kept informed of the progression, literally and figuratively, of computer attacks.

Tehtris, for its part, has just deployed a gigantic network of 1,300 next-generation nomadic honeypots, which the company has been able to distribute in around fifty countries, in order to map the cyber threat landscape in real time.

Until now, honeypots, which have been around for years, only worked in a static form, which made them lose value quite quickly. Hackers and certain cybercriminal groups have become accustomed to sharing their information on these decoys, which quickly limits their effectiveness, once spotted.

hacker hacker © Maksim Shmeljov / Shutterstock

© Maksim Shmeljov / Shutterstock

The nomadic honeypot, and if it was him, the answer to cybercriminals?

Next-generation honeypots, used to track fraudulent activity, thus become nomadic, in that their IP addresses are deactivated at some point and then reprogrammed to another location in the network, thus covering their tracks and putting hackers in the dark. vague. These decoys then have a longer lifespan, which allows them to capture more information than in the past, to detect certain cybercriminal campaigns even more quickly.

And the technology will grow. Gartner sees it as an innovation that will profoundly improve cyber defense techniques, so much so that we imagine that 25% of cloud applications in the world should, by 2025, exploit so-called security features.Automated Moving Target Defensean emerging concept of which the honeypot is one of the first cases of application.

This technology, which is more proactive than passive, is now being studied closely by computer protection players. ” Faced with cybercriminals who are more organized and motivated than ever, it is crucial to act collectively to implement an appropriate and effective defense. By deploying a new generation of honeypots, Tehtris provides the community with advanced cyber intelligence and confirms its position as a pioneer in the detection of cyber threats “, explains the co-founder and technical director of the scale-up, Laurent Oudot. The French firm already publishes a cyber weather report, on which we find the trends of cybercriminal activities detected and analyzed using its network of nomadic decoys. The bulletin is then shared with ANSSI and the Cyber ​​Threat Alliance, for better dissemination of information.



Source link -99