Create an account that is used for active defense purposes.
A decoy account is one that is created specifically for defensive or deceptive purposes. It can be in the form of user accounts, service accounts, software accounts, etc. The decoy account can be used to make a system, service, or software look more realistic or to entice an action.
|There is an opportunity to study the adversary and collect first-hand observations about them and their tools.
|There is an opportunity to introduce user accounts that are used to make a system look more realistic.
|In an adversary engagement operation, there is an opportunity to present decoy accounts to the adversary during the enumeration process.
|There is an opportunity to introduce decoy information, users, systems, etc. to influence an adversary's future actions.
|A defender can create decoy user accounts which are used to make a decoy system or network look more realistic.
|A defender can use decoy accounts and monitor them for any activity that might reveal adversary manipulation.
|During an adversary engagement operation, a defender can utilize decoy accounts to provide content to an adversary and encourage additional activity.
|Create a user account with a specified job function. Populate the user account's groups, description, logon hours, etc., with decoy data that looks normal in the environment.
|Create a user that has a valid email account. Use this account in such a way that the email address could be harvested by the adversary. This can be monitored to see if it is used in future attacks.
|Defense Evasion, Persistence, Privilege Escalation, Initial Access
|Gather Victim Identity Information
|Phishing for Information