
A study of honeypot and cyber deception technologies by the UKβs National Cyber Security Centre (NCSC) found that the deception tools hold promise for disrupting cyberattacks, but more information and standards are needed for them to work optimally. The agency plans to help with that.
The NCSC test involved 121 organizations, 14 commercial providers of honeypots and deception tools, and 10 trials across environments ranging from the cloud to operational technology (OT).
The NCSC
concluded that βcyber deception can work, but itβs not plug-and-play.β
Honeypot and Cyber Deception Challenges
The NCSC said surveyed organizations believe that
cyber deception technologies can offer βreal value, particularly in detecting novel threats and enriching threat intelligence,β and a few even see potential for identifying insider threats.
βHowever, outcome-based metrics were not readily available and require development,β the NCSC cautioned.
The UK
cybersecurity agency said the effectiveness of honeypots and cyber deception tools βdepends on having the right data and context. We found that cyber deception can be used for visibility in many systems, including legacy or niche systems, but without a clear strategy organisations
risk deploying tools that generate noise rather than insight.β
The NCSC blog post didnβt specify what
data was missing or needed to be developed to better measure the effectiveness of deception technologies, but the agency nonetheless concluded that βthereβs a compelling case for increasing the use of cyber deception in the UK.β
The study examined three core assumptions:
- Cyber deception technologies can help detect compromises already inside networks.
- Cyber deception and honeypots can help detect new attacks as they happen.
- Cyber deception can change how attackers behave if they know an organization is using the tools.
Terminology, Guidance Needed for Honeypots and Deception Tools
The tests, conducted under the Active Cyber Defence (ACD) 2.0 program, also found that inconsistent terminology and guidance hamper optimal use of the technologies.
βThereβs a surprising amount of confusion around terminology, and vocabulary across the industry is often inconsistent,β NCSC said. βThis makes it harder for organisations to understand whatβs on offer or even what theyβre trying to achieve. We think adopting standard terminology should help and we will be standardising our cyber deception vocabulary.β
Another challenge is that organizations donβt know where to start.
βThey want impartial advice, real-world case studies, and reassurance that the tools theyβre using are effective and safe,β the agency said. βWeβve found a strong marketplace of cyber deception providers offering a wide range of products and services. However, we were told that navigating this market can be difficult, especially for beginners.β
The NCSC said it thinks it can help organizations βmake informed, strategic choices.β
Should Organizations Say if Theyβre Using Deception Tools?
One interesting finding is that 90% of the trial participants said they wouldnβt publicly announce that they use cyber deception.
While itβs understandable not to want to tip off attackers, the NCSC said that academic research shows that βwhen attackers believe cyber deception is in use they are less confident in their attacks. This can impose a cost on attackers by disrupting their methods and wasting their time, to the benefit of the defenders.β
Proper configuration is also a challenge for adopters.
βAs with any cyber security solution, misconfiguration can introduce new
vulnerabilities,β the NCSC said. βIf cyber deception tools arenβt properly configured, they may fail to detect threats or lead to a false sense of
security, or worse, create openings for attackers. As networks evolve and new tools are introduced, keeping cyber deception tools aligned requires ongoing effort. It is important to consider regular updates and fine-tuning cyber deception solutions.β
Next steps for the NCSC involve helping organizations better understand and deploy honeypots and deception tools, possibly through a new ACD service.
βBy helping organisations to understand cyber deception and finding clear ways to measure impact, we are building a strong foundation to support the deployment of cyber deception at a national scale in the UK,β the agency said. βWe are looking at developing a new ACD service to achieve this.
βOne of the most promising aspects of cyber deception is its potential to impose cost on adversaries,β the NCSC added. βBy forcing attackers to spend time and resources navigating false environments, chasing fake credentials, or second-guessing their access, cyber deception can slow down attacks and increase the likelihood of detection. This aligns with broader national resilience goals by making the UK a harder, more expensive target.β