Splunk has unveiled DECEIVE (DECeption with Evaluative Integrated Validation Engine), an innovative, AI-augmented honeypot that mimics real-world systems to lure and study cyber attackers.
By leveraging advanced artificial intelligence, DECEIVE provides organizations with a powerful means of tracking, analyzing, and understanding malicious activities in real time, offering actionable insights into attacker tactics and techniques.
Traditional honeypots require significant effort to simulate realistic environments; they must be seeded with credible data and software to effectively engage attackers.
DECEIVE eliminates this challenge by using AI to create highly believable, customizable system simulations.
This new approach allows enterprises to detect and investigate cyber threats while proactively maintaining minimal overhead.
DECEIVE is designed to emulate a Linux server accessible via the SSH protocol, logging all user activity, analyzing attacker behavior, and categorizing sessions as benign, suspicious, or malicious.
The lightweight and intuitive design is particularly useful for cybersecurity research, training, and internal testing.
Key Features Include:
To set up DECEIVE, users can follow these steps:
git clone https://github.com/splunk/DECEIVE
pip3 install -r requirements.txt
ssh-keygen -t rsa -b 4096 -f SSH/ssh_host_key
cp SSH/config.ini.TEMPLATE SSH/config.ini
python3 ./ssh_server.py
The server will listen for SSH connections on the configured port, silently logging all activity.
Splunk emphasizes that DECEIVE is a proof-of-concept and not yet production-grade. While the tool is invaluable for threat analysis, it must be deployed cautiously, as it logs sensitive information, such as usernames and passwords, for research purposes.
The project is open-source and available under the MIT license, encouraging contributions from the cybersecurity community. Developers and researchers can access the code, suggest improvements, or adapt DECEIVE to meet specific use cases.
The launch of DECEIVE underscores Splunk’s commitment to enhancing defensive cybersecurity measures.
By flipping the script and studying attackers in action, organizations can stay a step ahead in the ever-evolving threat landscape.
Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free
Leading cryptocurrency exchange Kraken has disclosed that it recently thwarted an infiltration attempt by a…
Security researchers have uncovered a series of critical vulnerabilities in the Tenda RX2 Pro Dual-Band…
Cybersecurity researchers are raising alarms as hackers increasingly weaponize email input fields to execute cross-site scripting…
A recent investigation by cybersecurity firm EclecticIQ, in collaboration with threat hunters, has exposed a…
Cybersecurity researchers have uncovered a dangerous new exploitation technique, dubbed the "SonicBoom Attack Chain," which…
A researcher has unveiled a novel integration between AI-powered Copilot and Microsoft's WinDbg, dramatically simplifying…