{"id":228,"date":"2013-04-06T00:00:00","date_gmt":"2013-04-06T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/04\/06\/a-different-approach-to-foiling-hackers-let-them-in-then-lie-to-them\/"},"modified":"2021-12-30T11:36:47","modified_gmt":"2021-12-30T11:36:47","slug":"a-different-approach-to-foiling-hackers-let-them-in-then-lie-to-them","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/04\/06\/a-different-approach-to-foiling-hackers-let-them-in-then-lie-to-them\/","title":{"rendered":"A Different Approach To Foiling Hackers? Let Them In, Then Lie To Them."},"content":{"rendered":"<p style=\"margin: 0px;\">Last month Heckman, a researcher for the non-profit IT research corporation MITRE, gave a talk with fellow MITRE researcher Frank Stech at Purdue\u2019s Center for Education and Research in Information Assurance and Security and described a cyber war game scenario MITRE played out internally in which she and Stech tried an unorthodox defensive strategy: Instead of trying to purge a Red Team of hackers from a Blue Team\u2019s network they were defending, Heckman and Stech let the attackers linger inside, watched them, and fed them confusing misinformation. Although both Heckman or Stech declined to talk to me about their lecture, the presentation (video here) suggests an alternative approach to what the cybersecurity industry calls \u201cadvanced persistent threat\u201d (APT) hackers\u2013state-sponsored, sophisticated intruders who have penetrated hundreds of corporations and government agencies in recent years and siphoned vast amounts of information.<\/p>\n","protected":false},"excerpt":{"rendered":"<p style=\"margin: 0px;\">In MITRE\u2019s five-day virtual war game, which the group played out in late January of 2012, the Blue Team was given a mission titled Operation Beggar\u2019s Banquet, of killing a fictional terrorist leader named Richard Hakluyt. The scenario dictated that Hakluyt had holed up in a compound in the fictional People\u2019s Republic of Virginia, (represented by the Red Team) which was in a state of cold war with the equally fictional Republic of New England, represented by Blue. Blue\u2019s secret mission was to parachute a special operations group next to Hakluyt\u2019s compound, which would use a laser designator system to help a gunship target the compound and blow it up, before deploying a Fulton Surface-To-Air-Recovery plane to retrieve the special ops team.<\/p>\n<p style=\"margin: 0px; min-height: 14px;\"><\/p>\n<p style=\"margin: 0px;\">While the game was still in its first day of pre-action planning, Red\u2019s hackers immediately breached Blue\u2019s network and gained access to all of its mission plans, which had been stored on an internal wiki.<\/p>\n<p style=\"margin: 0px; min-height: 14px;\"><\/p>\n<p style=\"margin: 0px;\">Stech and Heckman had worked on a so-called \u201cdenial and deception\u201d system they called BlackJack, which they planned to use to create a parallel version of Blue\u2019s network in real time to misdirect Red\u2019s hackers with false information.<\/p>\n<p style=\"margin: 0px; min-height: 14px;\"><\/p>\n<p style=\"margin: 0px;\">According to Heckman and Stech, Blue used those hacked accounts to feed Red a story about a member of Blue\u2019s team who had foolishly planned to kill Hakluyt when in fact, a murder would be too politically incendiary to risk. Blue went on to create an alternate story that it planned to instead track and then kidnap Hakluyt by using information provided by a double agent within Red\u2019s team that Blue called \u201cCotton Dollar.\u201d Blue used its compromised accounts to feed Red information about when it planned to use its informant Cotton Dollar\u2019s information to send a special forces team to kidnap Hakluyt during a trip outside the compound.<\/p>\n<p style=\"margin: 0px; min-height: 14px;\"><\/p>\n<p style=\"margin: 0px;\">Richard Bejtlich, chief security officer with the breach response firm Mandiant, which recently detailed in a report hundreds of breaches by a prolific team of sophisticated Chinese government hackers, says that creating a fake playground for observing and misinforming intruders can be a costly and dangerous game. Or you have to do so much work setting up a juicy fake network that I pretty much guarantee it takes more time to set up than it takes the intruder to figure out that it\u2019s fake.\u201d<\/p>\n<p>Link: <a href=\"http:\/\/www.forbes.com\/sites\/andygreenberg\/2013\/04\/05\/a-different-approach-to-foiling-hackers-let-them-in-then-lie-to-them\/\">http:\/\/www.forbes.com\/sites\/andygreenberg\/2013\/04\/05\/a-different-approach-to-foiling-hackers-let-them-in-then-lie-to-them\/<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-228","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/228","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=228"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/228\/revisions"}],"predecessor-version":[{"id":2715,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/228\/revisions\/2715"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=228"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=228"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=228"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}