Honeypots, Fake Credentials, and Cyber Traps: The Role of Deception in Defence

Billabong Bandit

“All warfare is based on deception.”

Adrian Volkov | Deception Rina kent

Hackers thrive on certainty — they want to know where your defences are weak, what credentials are real, and how they can slip through undetected but what if everything they saw was a lie?

The greatest victories aren’t always won through brute force — they’re won through deception. In warfare, misleading the enemy can cause them to waste resources, expose their weaknesses, or walk into an ambush. In cybersecurity, deception technologies serve the same purpose: misdirecting attackers, wasting their time, and revealing their presence before they can cause real damage.

“All warfare is based on deception.”Sun Tzu

Sun Tzu’s Wisdom

Sun Tzu understood that misleading the enemy is a fundamental part of strategy. Generals throughout history have used feints, false retreats, and misinformation to gain the upper hand. In cybersecurity, deception techniques can trick attackers into revealing themselves while protecting real assets.

Cybersecurity Interpretation

Defenders often assume a purely reactive stance — detecting and responding to intrusions after they happen. But deception flips the script, putting attackers on the defensive. Instead of waiting for a breach, defenders deploy fake assets designed to lure and track attackers, turning an intrusion attempt into an intelligence-gathering opportunity.

Common deception techniques include:

  • Honeypots — Fake systems designed to attract attackers and log their activities.
  • Honeytokens — Fake credentials, API keys, or database entries that alert defenders when accessed.
  • Decoy Active Directory Accounts — Fake privileged accounts designed to detect lateral movement.
  • Deceptive Network Paths — Bogus file shares, fake SMB drives, and misconfigured-looking services that waste an attacker’s time.
Photo by The New York Public Library on Unsplash

Real-World Example

One of the most famous uses of deception in cybersecurity was the Honeytokens used to detect insider threats at a major financial institution. The company created fake employee login credentials and planted them in internal documentation. If an attacker or insider attempted to use them, an alert would trigger, instantly revealing unauthorised access.

Similarly, Microsoft’s Active Directory Deception techniques involve planting decoy domain administrator accounts and fake credentials in memory. If an attacker dumps credentials using tools like Mimikatz, they unknowingly steal fake ones, leading defenders straight to their presence.

Defensive Takeaways

  1. Deploy Honeypots — Set up decoy systems that mimic real services and track attacker behaviour.
  2. Use Honeytokens — Embed fake credentials in repositories, logs, and files to detect unauthorised access.
  3. Implement Active Directory Deception — Place fake admin accounts to lure attackers attempting privilege escalation.
  4. Set Traps for Credential Theft — Monitor for the use of decoy credentials in logs and alert on unauthorised use.
  5. Continuously Improve Deception Tactics — Rotate and refresh deceptive assets to keep attackers guessing.

Conclusion

Sun Tzu’s lesson on deception applies directly to cybersecurity: by misleading adversaries, we force them into making mistakes. Attackers rely on stealth and speed — but deception disrupts their tactics, making every step risky and uncertain.

The best fight is the one where the enemy never realises they’ve already lost.

Sign up to discover human stories that deepen your understanding of the world.

Free

Distraction-free reading. No ads.

Organize your knowledge with lists and highlights.

Tell your story. Find your audience.

Membership

Read member-only stories

Support writers you read most

Earn money for your writing

Listen to audio narrations

Read offline with the Medium app

Billabong Bandit
Billabong Bandit

Written by Billabong Bandit

Just a bloke in the outback doing cyber

No responses yet

Write a response