Deceptions Everywhere ®

Insights on threat and cyber risk trends, use cases for deception technology
and strategies for combatting targeted attacks

SANS Institute on illusive Solution: A Game-Changer

Posted by the Illusive Networks team on Apr 27, 2017 2:48:37 PM

Growing awareness of illusive networks Deceptions Everywhere™ technology recently led SANS Fellow, Dr. Eric Cole, to test our solution. Not only did he aim to successfully deceive an attacker, he also evaluated illusive’s scalability, manageability, and believability. The results of his (unsuccessful) efforts to attack a network and escape detection are contained in a new SANS Product Review - Deception Matters: Slowing the Adversary with illusive networks.

Read More


Spora Ransomware Detected and Stopped

Posted by Nir Greenberg on Mar 30, 2017 4:15:06 PM

On February 29, 2017 illusive networks received a customer alert and initiated forensic analysis after malicious activity was detected on a certain endpoint in the network. Our Deception Management System identified the malicious activity as Spora, a variant of ransomware, which like Locky, silently encrypts files with selected extensions and then attempts to redeploy itself on additional hosts via elevated privileges.  However, with Deceptions Everywhere deployed illusive networks diverted the ransomware from encrypting files on the original host - redirecting the encryption process to deceptive files - and more importantly thwarted the encryption of files located on the company's network shares. 

Read More


Are Your Wire Transfer Networks Secure?

Posted by the Illusive Networks team on Oct 4, 2016 4:02:47 PM

Cyber criminals are coordinating advanced attacks on banks and financial institutions. If funds and customer information are stolen, it could compromise your institution’s reputation for years.

Recently, these increasingly sophisticated attackers have turned their attentions to wire transfer networks. The February 2016 attack on Bangladesh Bank revealed a sobering truth: the weaknesses in one bank’s cyber defenses compromise the security of all banks in that bank’s wire transfer network.

Do you have protections in place for when cyber criminals get past your firewall?

Read More


Getting Back to the Real Meaning of “Advanced Persistent Threat”

Posted by Ofer Israeli on Dec 3, 2015 6:27:00 AM

Have you ever realized that some words completely lose their meaning because they’re so overused? In the cybersecurity world, “hack” is a word that seems completely benign now that terms like “life hack” and “dinner hack” have become so popular.

Read More


Stay up to date!