Deception in real-world situations

A few days ago it was reported that Israel’s Defense Forces has used deception against Hezbollah, making the latter believe its strike against the IDF was successful and caused several injured soldiers.

The attack on IDF’s vehicle from another perspective (from Ynet)

It’s not the first time deception has been used to trick enemies and in other dangerous situations, here are some examples…

#1 – Animal kingdom deception

From animals that blend into their environment and can hide in plain sight to animals that mimic harmful ones to deter predators to animals that fake death to prevent capture, the animal kingdom is filled with different deception techniques used for preservation and as they rely on the behavior and limitations of their predators.

#2 – D-Day

D-Day is a classic example in modern history to utilizing deception in warfare as described by Sun Tzu in “The Art of War” and gaining the upper hand, as the allied forces fooled the Nazis into believing they will attack from one location to actually attacking from another, eventually leading to the west’s victory in WWII.

#3 – Network deception

The concept of honeypots to identify cyber attacks has existed for a long time but only in the last few years it has been taken to the next level by luring attackers inside the organization’s network to a safer place where the attack can be identified and controlled. By using decoys, lures, breadcrumbs and honeytokens, network deception vendors make it tougher for attackers and insiders to successfully penetrate the organization.

#4 – Endpoint deception

But unlike network deception, endpoint deception works differently, utilizing the same techniques and defenses used by threat actors and malware to prevent advanced attacks in the first place. Deceptive Bytes’ solution makes regular computers look like environments that deter malware such as sandbox systems (which a staggering 98% test for and evade, according to research by Security Week from last year).

Additionally, the solution proactively continues the deception during the entire Endpoint Kill Chain by responding dynamically to threats as they evolve, based on the detected stage of compromise, and changes their outcome. Which is one of the reasons we were recognized in Gartner’s 2019 report: “Cool Vendors in Security Operations and Threat Intelligence”.

If you’d like to learn more about Deceptive Bytes and how we help organizations prevent advanced threats, just contact us or request a demo

Share via:


Request a free trial or send us a message

Let's get in touch

Request a demo or send us a message