Deploy a set of decoy systems with different OS and software configurations.
Decoy diversity is the deployment of decoy systems with varying Operating Systems and software configurations. Most enterprise networks contain systems which utilize different types and versions of operating systems and applications (Microsoft Windows, MacOS, Linux, Microsoft Office, Adobe Reader, etc.) Deploying decoy systems with such variations allows you to present a realistic environment to an adversary. It also allows you to see if they use different TTPs on systems with different configurations.
|There is an opportunity to discover who or what is being targeting by an adversary.
|There is an opportunity to present several public-facing application options to see what application(s) the adversary targets.
|There is an opportunity to use decoy accounts of varying types to see what an adversary is most interested in.
|There is an opportunity to supply a variety of different decoy network shares to an adversary to see what they are drawn to look at and use.
|A defender could use a decoy or set of decoys with different network addresses, operating systems, web browsers, language settings, and etc. to determine if every system that visits a compromised website receives its malicious payload or only specific systems receive it.
|A defender can use a diverse set of decoy systems to study an adversary and determine which types of public-facing applications they choose to exploit.
|A defender can add decoy systems to the network so an adversary can have a variety of network services available to them. The defender can observe which network services the adversary attempts to use.
|A defender can make a variety of decoy accounts and see if the adversary seems to be drawn to accounts of a specific type, with specific permissions, group access, etc.
|A defender can make a variety of decoy network shares available to an adversary and see if the adversary seems to be drawn to shares with specific names, permissions, etc.
|Use a Windows Virtual Machine (VM) and a Mac VM to visit a malicious website and note any differences in how the site functions based on the client that was used.
|Deploy multiple decoy systems, each with a unique network fingerprint (ports, services, connections, etc.) in order to provide an adversary a wide range of targets.
|Network Share Discovery
|Exploit Public-Facing Application
|Modify System Image