Esc
Decoy Object
Definition
A Decoy Object is created and deployed for the purposes of deceiving attackers.
Synonyms: Lure .Technique Overview
Decoy objects are typically configured with detectable means of communication but do not have any legitimate business purpose. Any communication via or to these objects should be logged and analyzed to find potential indicators of compromise for a possible past or future attack against other systems.
loading...
Technique Subclasses
There are 7 techniques in this category, Decoy Object.
Name | ID | Definition | Synonyms |
---|---|---|---|
Decoy Object | D3-DO | A Decoy Object is created and deployed for the purposes of deceiving attackers. | Lure |
- Decoy File | D3-DF | A file created for the purposes of deceiving an adversary. | |
- Decoy Network Resource | D3-DNR | Deploying a network resource for the purposes of deceiving an adversary. | |
- Decoy Persona | D3-DP | Establishing a fake online identity to misdirect, deceive, and or interact with adversaries. | |
- Decoy Public Release | D3-DPR | Issuing publicly released media to deceive adversaries. | |
- Decoy Session Token | D3-DST | An authentication token created for the purposes of deceiving an adversary. | |
- Decoy User Credential | D3-DUC | A Credential created for the purpose of deceiving an adversary. |
loading...
D3FEND™
A knowledge graph of cybersecurity countermeasures