My logs were full of attackers probing for secrets. Now, they’re just wasting their own money.

Introducing MIRE/C³: A deception layer designed to drain attacker resources and trigger immediate alerts via canary decoys.

Let them in. They’ll never find the way out. 🕸️

Try it for yourself:
https://cfd.mire.cc/cfdemo.html
#MIRE #CyberSecurity #DevSecOps

@SecuriLee Did you create this? It looks pretty cool!

Hi @RyanB
Yes, I created it.
The potted history....I brought up a subdomain and saw hits after 5 seconds. "This can't be right," I said to myself. Thank you, certificate transparency.
And then they scraped.
I countered with robots.txt
They ignored it 😂
So I examined what they were trying to get and designed a way to fulfil their requests. Fake tokens, dodgy ZIPs, #CanaryTokens
And that's how the thing was born, now I polish it up.

The goal? Synthesise delays, synthesise content. Waste hacker time.

I think I like it too 👍